Find Out What We’ve Got Lined Up for #MVS2021

Our full agenda is available for you to view. Every presentation will also feature a Q&A and Discord activity — so be sure to join us live to get the most out of every session.

VIEW BELOW

MVS21 AGENDA

Discover What You’ll Learn at MVS2021

RESULTS:

May

27

TYPE

Lecture

THEME

Corporate Investigations

TIME

15:00 EDT

Detection in the Dark – Exploiting XSS Vulnerability in C&C Panels to detect Malwares

Shay Nachum

In this Lecture:

Numerous defense techniques exist for preventing and detecting malware on end stations and servers (endpoints). Although these techniques are widely deployed on enterprise networks, many types of malware manage to stay under the radar, executing their malicious actions time and again. Therefore, a more creative and effective solution is necessary, especially as classic threat detection techniques do not utilize all stages of the attack kill chain in their attempt to detect malicious behavior on endpoints. In this presentation, the novel approach for detecting malware is proposed. The approach uses offensive and defensive techniques for detecting active malware attacks by exploiting the vulnerabilities of their command and control panels and manipulating significant values in the operating systems of endpoints – in order to attack these panels and utilize trusted communications between them and the infected machine.

Expand

REGISTER NOW
Date Details Speaker Session Type Content Theme Timezone

May

27

Detection in the Dark – Exploiting XSS Vulnerability in C&C Panels to detect Malwares

Shay Nachum

Lecture

Corporate Investigations

15:00 EDT

In this Lecture:

Numerous defense techniques exist for preventing and detecting malware on end stations and servers (endpoints). Although these techniques are widely deployed on enterprise networks, many types of malware manage to stay under the radar, executing their malicious actions time and again. Therefore, a more creative and effective solution is necessary, especially as classic threat detection techniques do not utilize all stages of the attack kill chain in their attempt to detect malicious behavior on endpoints. In this presentation, the novel approach for detecting malware is proposed. The approach uses offensive and defensive techniques for detecting active malware attacks by exploiting the vulnerabilities of their command and control panels and manipulating significant values in the operating systems of endpoints – in order to attack these panels and utilize trusted communications between them and the infected machine.

Expand

REGISTER NOW
SELECT AND REGISTER FOR SESSIONS

Note: Once you’ve registered for MVS21, you will be able to manage all your events via your MVS21 event hub.

#MVS21 #MVS21

MVS MERCH

Get YOUR SUMMIT ON

We’re offering exclusive merch to help you get in the spirit of MVS! Check out what apparel we have available and remember that all profits go to Child Rescue Coalition.

Use code MVS2021 at checkout for 10% off!

BROWSE MERCH