null Global Committee elections are coming up! See the election repository for more information.

D31ab3f1ccbe1e037e939ec4eac4c5f1

Abstract

The number of cyber attacks is undoubtedly on the rise targeting government, military, public, and private sectors. Most of these cyber attacks use malicious programs (Malware) for financial theft, espionage, intellectual property theft, and political motives.
These malware programs use various techniques to execute their malicious code and to remain undetected from the security products. With adversaries becoming sophisticated and carrying out advanced malware attacks, it is critical for cybersecurity professionals to detect and respond to such intrusions.
This presentation mainly focuses on the practical concept of memory forensics and shows how to use memory forensics to detect, investigate and understand the capabilities of malicious software.
In addition to that, with the help of various demonstrations, the presentation also covers various tricks and techniques used by the malware, including some stealth and evasive capabilities.

Speaker

Monnappa K A

Timing

Starts at Saturday February 15 2025, 12:45 PM. The sessions runs for about 1 hour.

Resources