CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

Taiwan's Cybersecurity Researchers
701 Vulnerability Research Lab
  • May 6th (Thu)
  • 10:45 - 11:15
  • 7F 701H

Let’s talk about malware, the surreptitious tactics.

With advances in cybersecurity technology and diversified solutions providing protection from attackers, adversaries need more meticulously planned operations to hide their footprints, such as the fileless malware attack, or using a third-party legitimate program to perform malicious activities.

These surreptitious tactics leverage the power of operating systems and other trusted tools to achieve its malicious goals. The other post-exploitation techniques to steal money or confidential information is abusing the system module, including ransomware, cryptocurrency mining, keylogger, and backdoor.

Intermediate
Endpoint Security Endpoint Detection & ResponseCERT
Tom

Tom

Cyber Security Consultant, TeamT5

Security enthusiast tries to learn infosec {{{(>_<)}}}

Jason3e7

Jason3e7

Cyber Security Consultant, TeamT5

CyberSecurity engineer

Peter

Peter

Cyber Security Consultant, TeamT5

Security enthusiast tries to learn infosec