Posted on
in Presentations
What is this executable? Why is this binary showing up in logs? This talk will cover legitimate binaries and third-party tools threat actors leverage to target organizations today. Associated techniques will be mapped to real-world examples and threat hunting techniques will be discussed. Attendees will be equipped with tools that may save them from becoming the next victim.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community