Posted on
in Presentations
What is this executable? Why is this binary showing up in logs? This talk will cover legitimate binaries and third-party tools threat actors leverage to target organizations today. Associated techniques will be mapped to real-world examples and threat hunting techniques will be discussed. Attendees will be equipped with tools that may save them from becoming the next victim.
Share With Your Community