all InfoSec news
Master of Puppets: How to Tamper an EDR?
Jan. 17, 2023, 2:09 p.m. | SANS Offensive Operations
SANS Offensive Operations www.youtube.com
Speaker: Daniel Feichter, Founder, Infosec Tirol
More and more companies realize, trying to prevent malicious activities alone is not enough, therefore more and more companies are using EDR products in their environment. From red team perspective this gets more and more a challenge, because even if the red team has achieved a local privilege escalation, most well known EDR products are still be very annoying. In the last few months we saw a lot about bypassing …
challenge companies daniel edr environment escalation founder hackfest infosec local local privilege escalation malicious master pentest perspective privilege privilege escalation products red team sans team
More from www.youtube.com / SANS Offensive Operations
The Second Rule of Hacking: There Are No Rules
1 month, 1 week ago |
www.youtube.com
OT Pen-testing: How Not to Sink an Oil Rig
1 month, 1 week ago |
www.youtube.com
A Compendium of Exploits and Bypasses for eBPF-based Cloud Security
4 months, 1 week ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Penetration Tester
@ Resillion | Bengaluru, India
Senior Backend Software Engineer (Java) - Privacy Engineering (Open to remote across ANZ)
@ Canva | Sydney, Australia
(Senior) Information Security Professional (w/m/d)
@ IONOS | Deutschland - Remote
Information Security (Incident Response) Intern
@ Eurofins | Katowice, Poland
Game Penetration Tester
@ Magic Media | Belgrade, Vojvodina, Serbia - Remote