How To Start Tracking Malware Infrastructure - Practical Examples and Tips for Beginners

Curious on how to track malicious infrastructure but unclear on where to start? Join us for a collaborative lunch and learn between malware researcher Matthew (@embee_research) and Censys Senior Security Researcher Ariana Mirian to learn how! In this lunch and learn, Matthew will walk through real-world use cases using Censys' data, and show how YOU can start finding malicious infrastructure too!

Ariana Mirian
Ariana Mirian

Sr. Security Researcher, Censys 



matthew.png
Matthew (@embee_research)

Security Researcher and Technical Writer, Embee Research 



Stream Now

Block 1
editable text
Block 2 Top
editable text
Block 2 Bottom
editable text
grows to fill column
Block 3 Top
editable text
Block 3 Bottom
editable text
grows to fill column
Block 4
editable text
Block 1
editable text
Block 2 Top
editable text
Block 2 Bottom
editable text
grows to fill column
Block 3 Top
editable text
Block 3 Bottom
editable text
grows to fill column
Block 4
editable text