LABScon

Labscon23 Greg Lesnewich Bg

LABScon23 Replay | macOS Components Used in North Korean Crypto-Heists

Greg Lesnewich takes us on a tour of North Korean APTs targeting macOS and explores techniques for tracking an increasingly active threat cluster.

Read More
Labscon23 Hakan Ftr

LABScon23 Replay | From Vulkan to Ryazan – Investigative Reporting from the Frontlines of Infosec

Covering investigations into Turla, Magna Bear and REvil, this talks offers a fascinating insight into how researchers unmask threat actor identities.

Read More
Meet The Iranian Company Powering Russias Drone War On Ukraine Header

LABScon23 Replay | Meet the Iranian Company Powering Russia’s Drone War on Ukraine

Take a unique look inside Iran's drone and missile program as Adam Rawnsley charts the rise of Mado, a key IRGC drone company.

Read More
Chasing Shadows The Rise Of A Prolific Espionage Actor 1

LABScon Replay | Chasing Shadows | The Rise of a Prolific Espionage Actor

Kris McConkey reveals the rise of a cyber espionage 'superpower,' impacting 35+ countries with sophisticated tools like ShadowPad.

Read More
Send Lawyers ‘Garchs And Money 5

LABScon Replay | Send Lawyers, ‘Garchs, and Money

From the Mueller report to the Steele Dossier, Liz Wharton explores the world of oligarch-funded lawyers and their attempts to discredit public research.

Read More
Spectre Strikes Again Introducing The Firmware Edition 1

LABScon Replay | Spectre Strikes Again: Introducing the Firmware Edition

Binarly's CEO Alex Matrosov dives deep into the fascinating world of speculative attacks against System Management Mode (SMM) on AMD-based devices.

Read More
Intellexa And Cytrox From Fixer Upper To Intel Agency Grade Spyware 1

LABSCon Replay | Intellexa and Cytrox: From Fixer-Upper to Intel Agency Grade Spyware

Vitor Ventura breaks down the processes one spyware organization takes to develop fully working spyware using a one-click zero-day exploit.

Read More
The Cyber Arm Of Chinas Soft Power Reshaping A Continent 2

LABScon Replay | The Cyber Arm of China’s Soft Power: Reshaping a Continent

Tom Hegel explores China's influence in Africa and highlights an opportunity for broader understanding of global cyber threat landscapes.

Read More
Quiver – Using Cutting Edge ML To Detect Interesting Command Lines For Hunters 2

LABScon Replay | Quiver – Using Cutting Edge ML to Detect Interesting Command Lines for Hunters

Gal Braun and Dean Langsam explore how LLMs can be trained to parse command lines and perform tasks like attribution and detection.

Read More
Star Gazing Using A Full Galaxy Of YARA Methods To Pursue An Apex Actor

LABScon Replay | Star-Gazing: Using a Full Galaxy of YARA Methods to Pursue an Apex Actor

Greg Lesnewich explores how to to pursue an apex predator using little more than a local instance of YARA and some publicly available open-source tooling.

Read More