Главная
Study mode:
on
1
Intro
2
WHO AM I?
3
RSA FIRSTWATCH
4
PURPOSE OF THE TALK
5
AGENDA
6
CURRENT STATE...
7
LONE WOLF
8
ARMY OF ARMORED MALWARE
9
THE ATTACKER'S ARSENAL
10
DIY KITS
11
ARMORING TOOLS
12
AV SCANNERS
13
THE PROCESS
14
ADVANTAGES
15
EXPONENTIAL EFFECT
16
EASY MALWARE UPDATE
17
KNOCK AV OUT
18
PUTTING THEM TOGETHER
Description:
Explore malware automation techniques and their impact on cybersecurity in this BSidesLV 2013 conference talk. Delve into the current state of malware development, from lone wolf attackers to armies of armored malware. Examine the attacker's arsenal, including DIY kits, armoring tools, and AV scanners. Learn about the process of malware automation, its advantages, and the exponential effect it has on threat proliferation. Discover how easy malware updates and AV evasion techniques are changing the landscape of cyber threats. Gain insights from Christopher Elisan, an expert from RSA FIRSTWATCH, as he discusses the purpose and implications of malware automation in the evolving world of cybersecurity.

Malware Automation: Techniques and Advantages - BSidesLV 2013

Add to list