Learn more about the top threats currently used to gain initial victim access! This talk provides an analysis of TTP overlaps & differences among them plus a link analysis of the later-stage crimeware payloads these threats are frequently used to deliver. https://youtu.be/JHN3izIUC48
After international sanctions were brought against Rus in the wake of their full-scale invasion of UA, ordinary Russian consumers resorted to various “workarounds” to obtain goods produced abroad. Learn more https://youtube.com/watch?v=ZX0d85ciuUs&list=PL_ru_VvzvvT-sZHPSQaOMGdzFU1jqg4w0&index=8…
Watch Squiblydoo share lessons learned from studying & documenting 50 Authenticode Certificates used by the SolarMarker malware actor over the course of 2 years. https://youtu.be/gkS0PU1mc7U
Hear more from Greg Lesnewich on the rapidly evolving initial access methods employed by one of North Korea's cybercriminal groups, TA444, and the context for why North Korea must resort to cybercrime. https://youtu.be/LYHmTjFW-nY
The legal cannabis industry has grown exponentially. And, like any business, they’re not immune to cybersecurity & physical security threats. Watch @infosecsherpa.bsky.socialhttps://youtu.be/E9rnK8hswZg
Using a comprehensive dataset of activity on Breached– from its emergence in March ‘22 to seizure in ‘23 - Megan Miller, Rhys Leahy, & Olivia Kantor, show how and why Breached became the largest criminal forum for hacked & leaked data. Watch now: https://youtube.com/watch?v=A7HvCx1oz2Y