Artwork

محتوای ارائه شده توسط Firo Solutions LTD. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Firo Solutions LTD یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

Threat intelligence with Dan Demeter

1:35:02
 
اشتراک گذاری
 

Manage episode 334221764 series 3370924
محتوای ارائه شده توسط Firo Solutions LTD. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Firo Solutions LTD یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Dan Demeter, well-known security researcher in the Romanian information-security space.

In 2014, Dan joined Kaspersky as a malware Security researcher, since then he has worked with various advanced anti-malware solutions and

is currently working with Threat Intelligence in Kaspersky's Global Research and Analysis Team.

In this episode of Hacker talk, we deep dive into malware, threat intelligence, advanced persistent threats, security and defensive security with Dan.

Topics covered in this episode:

Getting into infosec

Romania in the early personal internet space, connecting rj45 network cables to potatoes

milw0rm, Bugtraq mailing list, backtrack, hell bond hackers

Capture the flag(CTF) competitions

Internet café

Threat intelligence

Security research

Kaspersky

Advanced persistence threats, what is an advanced persistence threat?

Finding advanced malware in the wild.

Threat levels for individuals

Threat modeling

Enterprise and consumer malware

Antivirus programs

targeted malware

malware for crypto-currency projects

finding advanced malware as a threat intelligence researcher

bypassing advanced malware checks

Reverse engineering malware

ollydbg, NSA decompiler

Malware obfuscation techniques

yara rules

wrapping malware with VM protect

Post exploitation

malware stages

Lazarus Malware, Bangladesh Cyber Bank Heist

Malware on sim-cards

Using satalite ip addresses

reporting malicious command and control servers

malware campaigns spreading in Romania

phishing and identity theft

Bring your own device policy

Stay safe working from home

Best ways to protect yourself online

Writing malware signatures and writing yara rules

malware similarity engines

Links:

https://hackthissite.org/

https://hbh.sh/home

https://en.wikipedia.org/wiki/Bugtraq

https://en.wikipedia.org/wiki/BackTrack

https://cnc-central.fandom.com/wiki/Command_%26_Conquer:_Red_Alert_-_Remastered

https://securelist.com/

https://securityespresso.org/

https://www.kaspersky.com/

https://twitter.com/kaspersky

https://twitter.com/_xdanx

https://en.wikipedia.org/wiki/OllyDbg

https://hex-rays.com/IDA-pro/

https://ghidra-sre.org/

https://vmpsoft.com/

https://github.com/ParrotSec/mimikatz

https://en.wikipedia.org/wiki/Lazarus_Group

https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery

https://www.kaspersky.com/cyber-crime-lazarus-swift

https://www.kaspersky.com/about/press-releases/2021_security-analyst-summit-back-online-on-september-28-29

https://securelist.com/equation-group-from-houston-with-love/68877/

https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/

https://www.nbcnews.com/tech/security/facebook-sues-israel-s-nso-group-over-alleged-whatsapp-hack-n1073511

https://en.wikipedia.org/wiki/Regular_expression

https://github.com/VirusTotal/yara

https://github.com/neo23x0

https://www.tripwire.com/state-of-security/featured/operation-shadowhammer-hackers-planted-malware-code-video-games/

https://en.wikipedia.org/wiki/Red_October_%28malware%29

  continue reading

19 قسمت

Artwork

Threat intelligence with Dan Demeter

Hacker Talk

16 subscribers

published

iconاشتراک گذاری
 
Manage episode 334221764 series 3370924
محتوای ارائه شده توسط Firo Solutions LTD. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Firo Solutions LTD یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Dan Demeter, well-known security researcher in the Romanian information-security space.

In 2014, Dan joined Kaspersky as a malware Security researcher, since then he has worked with various advanced anti-malware solutions and

is currently working with Threat Intelligence in Kaspersky's Global Research and Analysis Team.

In this episode of Hacker talk, we deep dive into malware, threat intelligence, advanced persistent threats, security and defensive security with Dan.

Topics covered in this episode:

Getting into infosec

Romania in the early personal internet space, connecting rj45 network cables to potatoes

milw0rm, Bugtraq mailing list, backtrack, hell bond hackers

Capture the flag(CTF) competitions

Internet café

Threat intelligence

Security research

Kaspersky

Advanced persistence threats, what is an advanced persistence threat?

Finding advanced malware in the wild.

Threat levels for individuals

Threat modeling

Enterprise and consumer malware

Antivirus programs

targeted malware

malware for crypto-currency projects

finding advanced malware as a threat intelligence researcher

bypassing advanced malware checks

Reverse engineering malware

ollydbg, NSA decompiler

Malware obfuscation techniques

yara rules

wrapping malware with VM protect

Post exploitation

malware stages

Lazarus Malware, Bangladesh Cyber Bank Heist

Malware on sim-cards

Using satalite ip addresses

reporting malicious command and control servers

malware campaigns spreading in Romania

phishing and identity theft

Bring your own device policy

Stay safe working from home

Best ways to protect yourself online

Writing malware signatures and writing yara rules

malware similarity engines

Links:

https://hackthissite.org/

https://hbh.sh/home

https://en.wikipedia.org/wiki/Bugtraq

https://en.wikipedia.org/wiki/BackTrack

https://cnc-central.fandom.com/wiki/Command_%26_Conquer:_Red_Alert_-_Remastered

https://securelist.com/

https://securityespresso.org/

https://www.kaspersky.com/

https://twitter.com/kaspersky

https://twitter.com/_xdanx

https://en.wikipedia.org/wiki/OllyDbg

https://hex-rays.com/IDA-pro/

https://ghidra-sre.org/

https://vmpsoft.com/

https://github.com/ParrotSec/mimikatz

https://en.wikipedia.org/wiki/Lazarus_Group

https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery

https://www.kaspersky.com/cyber-crime-lazarus-swift

https://www.kaspersky.com/about/press-releases/2021_security-analyst-summit-back-online-on-september-28-29

https://securelist.com/equation-group-from-houston-with-love/68877/

https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/

https://www.nbcnews.com/tech/security/facebook-sues-israel-s-nso-group-over-alleged-whatsapp-hack-n1073511

https://en.wikipedia.org/wiki/Regular_expression

https://github.com/VirusTotal/yara

https://github.com/neo23x0

https://www.tripwire.com/state-of-security/featured/operation-shadowhammer-hackers-planted-malware-code-video-games/

https://en.wikipedia.org/wiki/Red_October_%28malware%29

  continue reading

19 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع