TEMPSMITTER Temperature As Covert Channel With the improvements in technology, hackers are also getting equipped with better rigs day by day. For every new technology being developed to secure the cyber space, hackers are trying to research various attack vectors to penetrate them, ultimately rendering them somewhat useless, if things go wrong (which go wrong… Continue reading TEMPSMITTER Temperature As Covert Channel
Category: Event
Series: A Journey in EDR-land
Series: A Journey in EDR-land The series will cover the building blocks of EDR, various ways to collect data, analysis and detection methods, and how to evade them.Session 1: EDR FundamentalsTopics to be covered——————–1. What is an EDR2. Building blocks of EDR3. Common EDR features4. Process events4.1 Common event sources4.1.1 Linux Audit Subsystem4.1.2 eBPF4.1.3 System… Continue reading Series: A Journey in EDR-land