🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Apt

Focus Area: 🕵️ Threat Intelligence
13
Total Entries
16
Contributors

Top Contributors

Niranjan Jayanand(3) Sathwik RAM Prakki(2) A a Gafoor(1) A Shiju Rawther(1) Abhijith B R(1)

All Entries (13 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-10-02TalkVirusbulletin Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study Presentation Whitepaper Video Sathwik RAM Prakki#reverse-engineering#apt#malware-reverse-engineering
2024-08-09PanelDefcon Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors Abhijith B R, Nikhil Mittal, Adam Pennington, Ken Kato, Ashley Stryker#ransomware#apt#dfir+2
2023-09-24PanelNullcon Cyber Operations, Doctrine, And Geo-Politics Video Anand Venkatanarayanan, Manu Zacharia, John Lambert#cyber-war#cyber-crime#national-security+2
2023-09-23PanelNullcon THREAT INTEL SHARING IN OT COMMUNITY AND INDUSTRY Ramandeep Singh Walia, Yask Sharma, Sanjeev Sharma, Britto Sidhan, Rohit Sharma#ics-security#cyber-war#intelligence-sharing+3
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanand#apt#incident-management#threat-hunting
2023-08-07TalkC0c0n Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs Video Sathwik RAM Prakki#apt#reverse-engineering#incident-management
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanand#security-assessment#apt#exploit-kit+1
2019-10-03TalkVirusbulletin Curious tale of 8.t used by multiple campaigns against South Asia Niranjan Jayanand, Ivan Macalintal, Debalina Ghosh#reverse-engineering#apt#malware-reverse-engineering
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoor#blueteam#apt#network-defense+4
2017-08-18TalkC0c0n Cyber Threat Intelligence - Are We There , Yet…? A Shiju Rawther#threat-hunting#threat-modeling#ioc+3
2014-11-13TalkGroundzerosummit APT protection for the Enterprise Deepak Singla#blueteam#apt#security-strategy
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasi#red-teaming#apt#attack-surface+4
2012-08-03TalkC0c0n Cyber Weapons Sameer Saxena#security-assessment#exploitation#cyber-war+3