Hacking Exposed: Beyond the Malware

  • Tuesday, April 21, 2015 | 4:40 PM – 5:30 PM | West | Room: 3014

View all Sessions

What do you do when adversaries don't use any malware or exploits? This session will demonstrate cutting edge techniques that we've observed from the most recent intrusions that are super stealthy and don't leave any malware footprint in your environment. In the typical raw Hacking Exposed style, we demonstrate these attacks and provide relevant countermeasures for detection and response.


This document was retrieved from on Mon, 15 Jul 2019 22:29:22 -0400.