Artwork

Nội dung được cung cấp bởi Firo Solutions LTD. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Firo Solutions LTD hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
Player FM - Ứng dụng Podcast
Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !

Threat intelligence with Dan Demeter

1:35:02
 
Chia sẻ
 

Manage episode 334221764 series 3370924
Nội dung được cung cấp bởi Firo Solutions LTD. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Firo Solutions LTD hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.

Dan Demeter, well-known security researcher in the Romanian information-security space.

In 2014, Dan joined Kaspersky as a malware Security researcher, since then he has worked with various advanced anti-malware solutions and

is currently working with Threat Intelligence in Kaspersky's Global Research and Analysis Team.

In this episode of Hacker talk, we deep dive into malware, threat intelligence, advanced persistent threats, security and defensive security with Dan.

Topics covered in this episode:

Getting into infosec

Romania in the early personal internet space, connecting rj45 network cables to potatoes

milw0rm, Bugtraq mailing list, backtrack, hell bond hackers

Capture the flag(CTF) competitions

Internet café

Threat intelligence

Security research

Kaspersky

Advanced persistence threats, what is an advanced persistence threat?

Finding advanced malware in the wild.

Threat levels for individuals

Threat modeling

Enterprise and consumer malware

Antivirus programs

targeted malware

malware for crypto-currency projects

finding advanced malware as a threat intelligence researcher

bypassing advanced malware checks

Reverse engineering malware

ollydbg, NSA decompiler

Malware obfuscation techniques

yara rules

wrapping malware with VM protect

Post exploitation

malware stages

Lazarus Malware, Bangladesh Cyber Bank Heist

Malware on sim-cards

Using satalite ip addresses

reporting malicious command and control servers

malware campaigns spreading in Romania

phishing and identity theft

Bring your own device policy

Stay safe working from home

Best ways to protect yourself online

Writing malware signatures and writing yara rules

malware similarity engines

Links:

https://hackthissite.org/

https://hbh.sh/home

https://en.wikipedia.org/wiki/Bugtraq

https://en.wikipedia.org/wiki/BackTrack

https://cnc-central.fandom.com/wiki/Command_%26_Conquer:_Red_Alert_-_Remastered

https://securelist.com/

https://securityespresso.org/

https://www.kaspersky.com/

https://twitter.com/kaspersky

https://twitter.com/_xdanx

https://en.wikipedia.org/wiki/OllyDbg

https://hex-rays.com/IDA-pro/

https://ghidra-sre.org/

https://vmpsoft.com/

https://github.com/ParrotSec/mimikatz

https://en.wikipedia.org/wiki/Lazarus_Group

https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery

https://www.kaspersky.com/cyber-crime-lazarus-swift

https://www.kaspersky.com/about/press-releases/2021_security-analyst-summit-back-online-on-september-28-29

https://securelist.com/equation-group-from-houston-with-love/68877/

https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/

https://www.nbcnews.com/tech/security/facebook-sues-israel-s-nso-group-over-alleged-whatsapp-hack-n1073511

https://en.wikipedia.org/wiki/Regular_expression

https://github.com/VirusTotal/yara

https://github.com/neo23x0

https://www.tripwire.com/state-of-security/featured/operation-shadowhammer-hackers-planted-malware-code-video-games/

https://en.wikipedia.org/wiki/Red_October_%28malware%29

  continue reading

20 tập

Artwork

Threat intelligence with Dan Demeter

Hacker Talk

16 subscribers

published

iconChia sẻ
 
Manage episode 334221764 series 3370924
Nội dung được cung cấp bởi Firo Solutions LTD. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Firo Solutions LTD hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.

Dan Demeter, well-known security researcher in the Romanian information-security space.

In 2014, Dan joined Kaspersky as a malware Security researcher, since then he has worked with various advanced anti-malware solutions and

is currently working with Threat Intelligence in Kaspersky's Global Research and Analysis Team.

In this episode of Hacker talk, we deep dive into malware, threat intelligence, advanced persistent threats, security and defensive security with Dan.

Topics covered in this episode:

Getting into infosec

Romania in the early personal internet space, connecting rj45 network cables to potatoes

milw0rm, Bugtraq mailing list, backtrack, hell bond hackers

Capture the flag(CTF) competitions

Internet café

Threat intelligence

Security research

Kaspersky

Advanced persistence threats, what is an advanced persistence threat?

Finding advanced malware in the wild.

Threat levels for individuals

Threat modeling

Enterprise and consumer malware

Antivirus programs

targeted malware

malware for crypto-currency projects

finding advanced malware as a threat intelligence researcher

bypassing advanced malware checks

Reverse engineering malware

ollydbg, NSA decompiler

Malware obfuscation techniques

yara rules

wrapping malware with VM protect

Post exploitation

malware stages

Lazarus Malware, Bangladesh Cyber Bank Heist

Malware on sim-cards

Using satalite ip addresses

reporting malicious command and control servers

malware campaigns spreading in Romania

phishing and identity theft

Bring your own device policy

Stay safe working from home

Best ways to protect yourself online

Writing malware signatures and writing yara rules

malware similarity engines

Links:

https://hackthissite.org/

https://hbh.sh/home

https://en.wikipedia.org/wiki/Bugtraq

https://en.wikipedia.org/wiki/BackTrack

https://cnc-central.fandom.com/wiki/Command_%26_Conquer:_Red_Alert_-_Remastered

https://securelist.com/

https://securityespresso.org/

https://www.kaspersky.com/

https://twitter.com/kaspersky

https://twitter.com/_xdanx

https://en.wikipedia.org/wiki/OllyDbg

https://hex-rays.com/IDA-pro/

https://ghidra-sre.org/

https://vmpsoft.com/

https://github.com/ParrotSec/mimikatz

https://en.wikipedia.org/wiki/Lazarus_Group

https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery

https://www.kaspersky.com/cyber-crime-lazarus-swift

https://www.kaspersky.com/about/press-releases/2021_security-analyst-summit-back-online-on-september-28-29

https://securelist.com/equation-group-from-houston-with-love/68877/

https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/

https://www.nbcnews.com/tech/security/facebook-sues-israel-s-nso-group-over-alleged-whatsapp-hack-n1073511

https://en.wikipedia.org/wiki/Regular_expression

https://github.com/VirusTotal/yara

https://github.com/neo23x0

https://www.tripwire.com/state-of-security/featured/operation-shadowhammer-hackers-planted-malware-code-video-games/

https://en.wikipedia.org/wiki/Red_October_%28malware%29

  continue reading

20 tập

Tất cả các tập

×
 
Loading …

Chào mừng bạn đến với Player FM!

Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.

 

Hướng dẫn sử dụng nhanh

Nghe chương trình này trong khi bạn khám phá
Nghe