Hackers of CypherCon Season 2 Episode 14
In this talk, learn various tools and techniques that can be used to thoroughly analyze a malicious email attachment and everything that comes after it. In order to get as many stones as possible, we will want to leave no stone unturned. This information can then be used to look for indicators of compromise throughout your environment.
Serie: Hackers of CypherCon
Episode Title: Always Look a Gift (Trojan) Horse In the Mouth with James Arndt
Air Date: 2019-12-20