Jill and the BeenSTALKed

Posted on in Presentations

This presentation will discuss stalkerware fundamentals, its impact on victims, how victims can be assisted with regaining their personal freedom, and some tips to secure devices. In addition, the presenters will share how to hunt stalkerware using OSINT, some IOCs for known stalkerware variants, how to map stalkerware behaviors back to MITRE ATT&CK, and why stalkerware is a threat to enterprises, too.

Recommended Reading Available in Our Bookstore

Practical Social Engineering by Joe Gray

Chloe Messdaghi

Moderator, Participant

Strategy Consultant and Researcher, Stand Out In Tech

Joe Gray

Panelist, Participant

Investigator, SpyCloud

Xena Olsen

Panelist, Participant

Senior Cybersecurity Analyst , Fortune 500 Company

Analytics Intelligence & Response Hackers & Threats Mobile & IoT Security Privacy

hackers & threats mobile security privacy anti-malware threat intelligence



Share With Your Community