
LABScon23 Replay | macOS Components Used in North Korean Crypto-Heists
Greg Lesnewich takes us on a tour of North Korean APTs targeting macOS and explores techniques for tracking an increasingly active threat cluster.
Read More
Greg Lesnewich takes us on a tour of North Korean APTs targeting macOS and explores techniques for tracking an increasingly active threat cluster.
Covering investigations into Turla, Magna Bear and REvil, this talks offers a fascinating insight into how researchers unmask threat actor identities.
Take a unique look inside Iran's drone and missile program as Adam Rawnsley charts the rise of Mado, a key IRGC drone company.
Kris McConkey reveals the rise of a cyber espionage 'superpower,' impacting 35+ countries with sophisticated tools like ShadowPad.
From the Mueller report to the Steele Dossier, Liz Wharton explores the world of oligarch-funded lawyers and their attempts to discredit public research.
Binarly's CEO Alex Matrosov dives deep into the fascinating world of speculative attacks against System Management Mode (SMM) on AMD-based devices.
Vitor Ventura breaks down the processes one spyware organization takes to develop fully working spyware using a one-click zero-day exploit.
Tom Hegel explores China's influence in Africa and highlights an opportunity for broader understanding of global cyber threat landscapes.
Gal Braun and Dean Langsam explore how LLMs can be trained to parse command lines and perform tasks like attribution and detection.
Greg Lesnewich explores how to to pursue an apex predator using little more than a local instance of YARA and some publicly available open-source tooling.