У нас вы можете посмотреть бесплатно 2026 Malware Trends: Hunting the Digital Parasite или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Attackers are getting quieter. In this Malware Trends webinar, we break down the key findings from the RED Report 2026 and explain why “Digital Parasite” behavior is becoming the dominant model: stealth, persistence, living off the land, and data theft over time. Picus Labs analyzed 1.1M malicious files and 15.5M adversary actions, mapped to the MITRE ATT&CK framework. The result is a clear shift: ransomware impact signals are fading, and defenders can’t rely on loud, disruptive indicators anymore. In this session, threat researcher John Bambenek and Picus’ Can Yuceel (co-author of the RED Report 2026) discuss: Why “quiet” intrusions are harder to detect than encryption events How self-aware malware evades sandboxes and virtualization analysis (T1497 and system checks) Why living off the land keeps winning (PowerShell, built-in tools, trusted processes) How attackers abuse common protocols like DNS and HTTPS for C2 and data exfiltration What SOC leaders should change in telemetry, detection engineering, and alert quality Why AI can help with translation and drafting, but still struggles with production-ready detection logic and tuning If you’re responsible for detection engineering, SOC operations, threat hunting, or validation, this webinar will help you align your effort with what adversaries are actually doing in the wild. 📌 Resources mentioned in the webinar: RED Report 2026: https://www.picussecurity.com/red-report MITRE ATT&CK datasheet: https://www.picussecurity.com/resourc... 00:07 Intro and welcome 01:30 Speaker intros (John Bambenek, Can Yuceel) 02:17 What is the RED Report and how the dataset was built (1.1M files, 15.5M actions) 03:13 Key theme: the rise of “Digital Parasites” and quieter intrusions 07:47 What this shift means for SOC teams and detection engineering 09:42 Why “nothing is happening” is the new problem (late discovery, silent exfiltration) 11:31 Self-aware malware and sandbox evasion (system checks, virtualization signals) 14:07 Living off the land: why legitimate tools are being abused more 18:10 Top 10 techniques overview and defender prioritization 20:57 DNS as C2 and evasion details (nslookup, tunneling, obfuscation) 22:03 Why signature rules are less effective vs fileless and tool-abuse behaviors 23:46 Identity pivoting and cloud log gaps (AWS, GCP, Azure, SharePoint) 24:54 Impaired defenses and why attackers disable logging and sensors 28:01 Where defenders should begin (telemetry, top techniques, cost focused prioritization) 32:54 Operationalizing the report with threat templates and technique variations 35:23 Live Q and A: recon patterns and automation vs targeted ops 40:40 Live Q and A: remote access shells via scripting and common attacker comms paths 46:05 SOC leader guidance: concrete changes for detecting ambiguous behavior 48:59 AI in detection engineering: where it helps, where it fails today 53:44 Wrap up and next webinar announcement