The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents |
Black Hat Asia 2017
|
Account Jumping Post Infection Persistency & Lateral Movement in AWS |
Black Hat USA 2016
|
Applying Top Secret and Military Network Grade Security in the Real World |
RSAC USA 2016
|