ATT&CK® Deep Dive: How to Detect Rootkits

Поделиться
HTML-код
  • Опубликовано: 13 янв 2025

Комментарии • 8

  • @AustinHypes
    @AustinHypes 7 месяцев назад

    This is my favorite webinar yet 😈

    • @AustinHypes
      @AustinHypes 7 месяцев назад

      also wanted to state that yea by default the sys would be UEFI secure boot or csm wit tpm. Thing is if they want that firmware rootkit they could tamper with the bios via a kernel rootkit changed to legacy etc then run whatver they want under under the hood !!

  • @ameerhamza4017
    @ameerhamza4017 4 года назад

    As a beginner in the field of Malware Analysis, i learnt a lot from this webinar. I also hope such type of webinar in future.

  • @gordon4024
    @gordon4024 4 года назад +1

    Thank you for sharing !

  • @MaxWell-wm9vw
    @MaxWell-wm9vw 4 года назад

    Good info! I have a suggestion.. I think you need to add a "sweet" counter and a "awesome" counter to keep track all the times either sweet or awesome was quietly whispered. See if the record can be beat in the next webinar

    • @RedCanary
      @RedCanary  3 года назад

      Noted! We will take this fine suggestion under consideration, lol.

  • @deimosok2003
    @deimosok2003 3 года назад

    I dont know anything about computers what can I do to get rid of rootkits?