My
Series
Login

Login

Email / username and / or password are not correct.

Hackers of CypherCon

0/ 10
45 min

Season 2, episode 14

Always Look a Gift (Trojan) Horse In the Mouth with James Arndt
In this talk, learn various tools and techniques that can be used to thoroughly analyze a malicious email attachment and everything that comes after it. In order to get as many stones as possible, we will want to leave no stone unturned. This information can then be used to look for indicators of compromise throughout your environment.
Release date: 20 December 2019
Network: