Blog | G5 Cyber Security

Black Hat Europe 2015: The Best Response

This trio of Black Hat Europe 2015 Briefings grapple with different aspects of the art of intelligent counter-intelligence. The Domain Name System that makes the web so human-friendly is highly dynamic and continually changing. Microsoft’s Application Compatibility Toolkit can be leveraged to achieve persistence and privilege escalation via Shim Database Files. Linux’s increasing ubiquity, particularly in embedded applications, unfortunately makes it more attractive to malware authors. As such, researchers need better tools to analyze rogue programs. That’s where Limon comes in.”]

Source: https://www.darkreading.com/black-hat/black-hat-europe-2015-the-best-response/d/d-id/1322538

Exit mobile version