all InfoSec news
Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation
Feb. 12, 2024, 5:47 p.m. | Black Hat
Black Hat www.youtube.com
0-day vulnerability advanced can endpoint endpoint security endpoint security solutions exploitation kernel kind manipulation object persistent post-exploitation presentation rootkit rootkits scenario security security solutions sensor solutions telemetry visibility vulnerability windows windows 0-day windows kernel
More from www.youtube.com / Black Hat
Locknote: Conclusions and Key Takeaways from Day 2
2 weeks, 2 days ago |
www.youtube.com
Locknote: Conclusions and Key Takeaways from Day 1
2 weeks, 2 days ago |
www.youtube.com
Keynote: My Lessons from the Uber Case
2 weeks, 2 days ago |
www.youtube.com
The Black Hat Europe Network Operations Center (NOC) Report
2 weeks, 3 days ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Principal Security Analyst - Threat Labs (Position located in India) (Remote)
@ KnowBe4, Inc. | Kochi, India
Cyber Security - Cloud Security and Security Architecture - Manager - Multiple Positions - 1500860
@ EY | Dallas, TX, US, 75219
Enterprise Security Architect (Intermediate)
@ Federal Reserve System | Remote - Virginia
Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Associate -- Dallas
@ Goldman Sachs | Dallas, Texas, United States
Vulnerability Management Team Lead - North Central region (Remote)
@ GuidePoint Security LLC | Remote in the United States