Переходьте в офлайн за допомогою програми Player FM !
Threat intelligence with Dan Demeter
Manage episode 334221764 series 3370924
Dan Demeter, well-known security researcher in the Romanian information-security space.
In 2014, Dan joined Kaspersky as a malware Security researcher, since then he has worked with various advanced anti-malware solutions and
is currently working with Threat Intelligence in Kaspersky's Global Research and Analysis Team.
In this episode of Hacker talk, we deep dive into malware, threat intelligence, advanced persistent threats, security and defensive security with Dan.
Topics covered in this episode:
Getting into infosec
Romania in the early personal internet space, connecting rj45 network cables to potatoes
milw0rm, Bugtraq mailing list, backtrack, hell bond hackers
Capture the flag(CTF) competitions
Internet café
Threat intelligence
Security research
Kaspersky
Advanced persistence threats, what is an advanced persistence threat?
Finding advanced malware in the wild.
Threat levels for individuals
Threat modeling
Enterprise and consumer malware
Antivirus programs
targeted malware
malware for crypto-currency projects
finding advanced malware as a threat intelligence researcher
bypassing advanced malware checks
Reverse engineering malware
ollydbg, NSA decompiler
Malware obfuscation techniques
yara rules
wrapping malware with VM protect
Post exploitation
malware stages
Lazarus Malware, Bangladesh Cyber Bank Heist
Malware on sim-cards
Using satalite ip addresses
reporting malicious command and control servers
malware campaigns spreading in Romania
phishing and identity theft
Bring your own device policy
Stay safe working from home
Best ways to protect yourself online
Writing malware signatures and writing yara rules
malware similarity engines
Links:
https://hackthissite.org/
https://hbh.sh/home
https://en.wikipedia.org/wiki/Bugtraq
https://en.wikipedia.org/wiki/BackTrack
https://cnc-central.fandom.com/wiki/Command_%26_Conquer:_Red_Alert_-_Remastered
https://securelist.com/
https://securityespresso.org/
https://www.kaspersky.com/
https://twitter.com/kaspersky
https://twitter.com/_xdanx
https://en.wikipedia.org/wiki/OllyDbg
https://hex-rays.com/IDA-pro/
https://ghidra-sre.org/
https://vmpsoft.com/
https://github.com/ParrotSec/mimikatz
https://en.wikipedia.org/wiki/Lazarus_Group
https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery
https://www.kaspersky.com/cyber-crime-lazarus-swift
https://www.kaspersky.com/about/press-releases/2021_security-analyst-summit-back-online-on-september-28-29
https://securelist.com/equation-group-from-houston-with-love/68877/
https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/
https://www.nbcnews.com/tech/security/facebook-sues-israel-s-nso-group-over-alleged-whatsapp-hack-n1073511
https://en.wikipedia.org/wiki/Regular_expression
https://github.com/VirusTotal/yara
https://github.com/neo23x0
https://www.tripwire.com/state-of-security/featured/operation-shadowhammer-hackers-planted-malware-code-video-games/
https://en.wikipedia.org/wiki/Red_October_%28malware%29
20 епізодів
Manage episode 334221764 series 3370924
Dan Demeter, well-known security researcher in the Romanian information-security space.
In 2014, Dan joined Kaspersky as a malware Security researcher, since then he has worked with various advanced anti-malware solutions and
is currently working with Threat Intelligence in Kaspersky's Global Research and Analysis Team.
In this episode of Hacker talk, we deep dive into malware, threat intelligence, advanced persistent threats, security and defensive security with Dan.
Topics covered in this episode:
Getting into infosec
Romania in the early personal internet space, connecting rj45 network cables to potatoes
milw0rm, Bugtraq mailing list, backtrack, hell bond hackers
Capture the flag(CTF) competitions
Internet café
Threat intelligence
Security research
Kaspersky
Advanced persistence threats, what is an advanced persistence threat?
Finding advanced malware in the wild.
Threat levels for individuals
Threat modeling
Enterprise and consumer malware
Antivirus programs
targeted malware
malware for crypto-currency projects
finding advanced malware as a threat intelligence researcher
bypassing advanced malware checks
Reverse engineering malware
ollydbg, NSA decompiler
Malware obfuscation techniques
yara rules
wrapping malware with VM protect
Post exploitation
malware stages
Lazarus Malware, Bangladesh Cyber Bank Heist
Malware on sim-cards
Using satalite ip addresses
reporting malicious command and control servers
malware campaigns spreading in Romania
phishing and identity theft
Bring your own device policy
Stay safe working from home
Best ways to protect yourself online
Writing malware signatures and writing yara rules
malware similarity engines
Links:
https://hackthissite.org/
https://hbh.sh/home
https://en.wikipedia.org/wiki/Bugtraq
https://en.wikipedia.org/wiki/BackTrack
https://cnc-central.fandom.com/wiki/Command_%26_Conquer:_Red_Alert_-_Remastered
https://securelist.com/
https://securityespresso.org/
https://www.kaspersky.com/
https://twitter.com/kaspersky
https://twitter.com/_xdanx
https://en.wikipedia.org/wiki/OllyDbg
https://hex-rays.com/IDA-pro/
https://ghidra-sre.org/
https://vmpsoft.com/
https://github.com/ParrotSec/mimikatz
https://en.wikipedia.org/wiki/Lazarus_Group
https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery
https://www.kaspersky.com/cyber-crime-lazarus-swift
https://www.kaspersky.com/about/press-releases/2021_security-analyst-summit-back-online-on-september-28-29
https://securelist.com/equation-group-from-houston-with-love/68877/
https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/
https://www.nbcnews.com/tech/security/facebook-sues-israel-s-nso-group-over-alleged-whatsapp-hack-n1073511
https://en.wikipedia.org/wiki/Regular_expression
https://github.com/VirusTotal/yara
https://github.com/neo23x0
https://www.tripwire.com/state-of-security/featured/operation-shadowhammer-hackers-planted-malware-code-video-games/
https://en.wikipedia.org/wiki/Red_October_%28malware%29
20 епізодів
Tous les épisodes
×Ласкаво просимо до Player FM!
Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.