2024年SANS网络威胁会议(Cyber Threat Summit 2024)嘉宾演讲PPT合集(共15套打包)

2024年SANS网络威胁会议(Cyber Threat Summit 2024)嘉宾演讲PPT合集(共15套打包)

更新时间:2024-12-23 报告数量:15份

报告合集目录

报告预览

  • 2024年SANS网络威胁会议(Cyber Threat Summit 2024)嘉宾演讲PPT合集
    • 揭开Dark Pink的面纱——对APAC隐蔽的APT威胁的深入分析.pdf
    • STEPHEN BEGLEY - 保护今天的秘密免受明天的威胁.pdf
    • 一次受害永远受害:深入探究网络勒索(Cy-X)生态系统及其参与者的日益绝望.pdf
    • Tom McElroy and Anders Nielsen - 乞讨、借用或偷窃.pdf
    • Keynote记忆安全语言救不了你.pdf
    • Patrick Staubmann - TA577从你身边走过 - Pikabot中的间接系统调用.pdf
    • Or Chechik and Daniel Frank - 从侦察到毁灭——揭露伊朗 Agrius APT 最新 TTPs.pdf
    • Aleksandar Milenkoski and Julian-伪装与混乱——中国APTs玩勒索游戏的轨迹.pdf
    • Alemdar Islamoglu - 从获取到归因追踪中国移动监控行动.pdf
    • 揭秘价值百万美元的住宅代理服务.pdf
    • 当网络犯罪分子犯错时 - OPSEC Oopsies 和 Epic Falls.pdf
    • Tom Lancaster - 自上次边缘设备安全事件以来已经是零日Zero Days.pdf
    • Rebecca Taylor - 拥抱威胁情报的力量——网络安全的游戏规则改变者.pdf
    • APT41已从尘埃中崛起.pdf
    • Kyle Schmittle-俄罗斯Gamaredon APT 集团-移动监控工具.pdf
请点击导航文件预览
资源包简介:

1、Unveiling Dark Pink:An In-Depth Analysis of APACs Covert APT ThreatOUTLINEDark Pinks latest campaignTelegram Exfiltration and C2 demoTeleScoutDark Pinks TTPsI GOT AN EMAIL!(Group-IB,2023)ISO FILEISO 。

2、2022 Mandiant2024 MandiantSecuring todays secrets against tomorrows threatsThe quantum-cryptographic threat landscape19 March 2024Stephen BegleyPrincipal Consultant at Mandiant ConsultingIntroduction。

3、Once a victim,always a victimA dive into the ecosystem of Cyber Extortion(Cy-X)and the increasing desperation of itsparticipantsDiana Selck-Paulsson&Simone KrausLead Security ResearcherSenior CSI。

4、Beg,Borrow or StealTom McElroy&Anders NielsenMicrosoft Threat IntelligenceMicrosoft Threat IntelligenceMicrosoft Threat Intelligence Center(MSTIC)Protect Microsoft&our customersNation State&a。

5、Memory Safe Languages Wont Save YouYarden ShafirAbout me Security Engineer&Researcher Windows Internals researcher Former EDR developer Likes to research exploits,mitigations and post-exploitatio。

6、TA577 Walked Just Past YouIndirect Syscalls in PikabotPatrick StaubmannTeam Lead Threat AnalysisVMRay GmbH2Pikabot OverviewFirst SeenClassificationThreat ActorEvasion TechniquesEarly 2023(Down-)Loade。

7、From Recon to Ruin:Exposing the Iranian Agrius APT Latest TTPsOr ChechikDaniel FrankAbout Us Or ChechikPrincipal Security Researcher,Cortex XDR,Palo Alto NetworksDaniel FrankThreat Research Team Lead。

8、Camouflage and ChaosDr.Aleksandar Milenkoski(SentinelLabs,SentinelOne)Julian-Ferdinand Vgele(Insikt Group,Recorded Future)On the Trail of Chinese APTs Playing the Ransomware GameAgendaWhy Would APTs 。

9、Tracing Mobile Chinese Surveillance Operations fromAcquisition to AttributionKristina BalaamAlemdar Islamoglu Lookout,Inc.|Confidential and Proprietary2Who We AreAlemdar IslamogluSenior Staff Securit。

10、Well knock your SOCKS offInsights into a million-dollar residential proxy service whoamiHanno HeinrichsMission Lead:OJoel SnapeSenior R“Were good with computers”Subtitle HereLorem ipsum dolor sit ame。

11、When Cybercriminals Goof:OPSEC Oopsies and Epic Falls Will Thomas FOR589 Co-author and Instructor,SANS Institute CTI Researcher&Threat Hunter,Equinix Co-founder,Curated Intelligence$whoami Spent 。

12、 Volexity Inc.|Proprietary&ConfidentialIt Has Been 0 Days Since the Last Edge-Device Security Incident1Tom LancasterCyberThreat|December 2024TLP:WHITE Volexity Inc.|Proprietary&ConfidentialWh。

13、/Secureworks/Confidential-Limited External DistributionEmbracing the Power of Threat Intelligence:A Game-Changer in CybersecurityRebecca Taylor,Threat Intelligence Knowledge Manager&Human Intelli。

14、APT41 Has Risen from the DUST SANS Cyber Threat 2024Chris Eastwood,MandiantSebastian Demmer,MandiantProprietary&ConfidentialProprietary&ConfidentialMandiantGoogle CloudContents01Introductions。

15、Russian Gamaredon APT GroupMobile Surveillance Tools2Kyle Schmittle-CISSP,CCSPSenior Security Intelligence Researcher Threat Research Team Lookout15+years in Threat Intelligence3AgendaBackgroundLooko。

展开阅读全文
客服
商务合作
小程序
服务号
折叠