• ClipSaver
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign скачать в хорошем качестве

Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign 2 months ago

video

sharing

camera phone

video phone

free

upload

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign в качестве 4k

У нас вы можете посмотреть бесплатно Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign

Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign Against a Foreign Government Last year, we came face-to-face with a multi-headed beast after a threat hunt led us to uncover a long-running Chinese state-sponsored cyber espionage campaign, code-named "Crimson Palace" involving three distinct threat clusters coordinating activity to maintain persistent access to the same Southeast Asian government organization. Despite limitations, we were able to perform targeted response actions and monitor the organization's infected network for over a year to gain a rare and detailed insight into the evolving behaviors and capabilities of multiple state-sponsored APTs. In our talk, we will dissect the two-stages of the Crimson Palace campaign, detailing an observed shift by the actors from leveraging the target network as a testing ground for novel malware and evasive techniques to adopting a more aggressive approach after becoming aware of our countermeasures. We'll explore the diverse arsenal leveraged by the actors, including over a dozen different malware families (including several previously unreported variants), more than 15 distinct DLL sideloads, and multiple novel defense evasion techniques, such as a new malware variant capable of blackholing anti-virus (AV) communications. We'll also reveal previously undisclosed details from the second stage of the campaign, showcasing the actors' rapid adaptation and continual rotation of their C2 channels to maintain persistent access. Beyond the technical details, we'll also share the human story of how we navigated this complex intrusion using novel investigation techniques - and the challenges we faced in doing so. Our talk will equip attendees with concrete methods they can use to identify clusters of threat activity and analyze long-running APT intrusion campaigns. It will also provide them with tools and techniques we developed during the investigation for dissecting complex intrusions in their own environments. By: Morgan Demboski | Threat Intelligence Analyst, Sophos Mark Parsons | Senior Threat Hunter, Sophos Full Abstract and Presentation Materials: https://www.blackhat.com/us-24/briefi...

Comments
  • Surveilling the Masses with Wi-Fi Positioning Systems 2 months ago
    Surveilling the Masses with Wi-Fi Positioning Systems
    Опубликовано: 2 months ago
    182481
  • Living off Microsoft Copilot 3 months ago
    Living off Microsoft Copilot
    Опубликовано: 3 months ago
    70369
  • From Doxing to Doorstep: Exposing Privacy Intrusion Techniques used by Hackers for Extortion 2 months ago
    From Doxing to Doorstep: Exposing Privacy Intrusion Techniques used by Hackers for Extortion
    Опубликовано: 2 months ago
    10152
  • Cybersecurity Architecture: Detection 1 year ago
    Cybersecurity Architecture: Detection
    Опубликовано: 1 year ago
    91360
  • Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Korea 2 weeks ago
    Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Korea
    Опубликовано: 2 weeks ago
    11444
  • The rise of Xi Jinping, explained 1 year ago
    The rise of Xi Jinping, explained
    Опубликовано: 1 year ago
    11853107
  • What are some of the key issues facing Australia? - World Questions podcast, BBC World Service 4 months ago
    What are some of the key issues facing Australia? - World Questions podcast, BBC World Service
    Опубликовано: 4 months ago
    501772
  • Starship Update with Elon Musk 2025 1 hour ago
    Starship Update with Elon Musk 2025
    Опубликовано: 1 hour ago
    1784
  • Super Hat Trick: Exploit Chrome and Firefox Four Times 2 months ago
    Super Hat Trick: Exploit Chrome and Firefox Four Times
    Опубликовано: 2 months ago
    1614
  • Overtourism: How to be a responsible tourist - The Global Story podcast, BBC World Service 11 months ago
    Overtourism: How to be a responsible tourist - The Global Story podcast, BBC World Service
    Опубликовано: 11 months ago
    1552315

Контактный email для правообладателей: [email protected] © 2017 - 2025

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS