Detecting malicious infrastructure is a crucial aspect of a cybersecurity professional’s jobs. There are a variety of tools and techniques, such as threat intelligence feeds, domain reputation analysis, and behavior analytics, to identify and neutralize these threats.
Join this interactive session led by Censys Security Researcher, Aidan Holland to dig into
- Analysis of a live sample of Vidar malware
- Find and investigate C2 and other malicious infrastructure
- Simplify finding devices and services of interest
- And more!