CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
With advances in cybersecurity technology and diversified solutions providing protection from attackers, adversaries need more meticulously planned operations to hide their footprints, such as the fileless malware attack, or using a third-party legitimate program to perform malicious activities.
These surreptitious tactics leverage the power of operating systems and other trusted tools to achieve its malicious goals. The other post-exploitation techniques to steal money or confidential information is abusing the system module, including ransomware, cryptocurrency mining, keylogger, and backdoor.
Security enthusiast tries to learn infosec {{{(>_<)}}}
CyberSecurity engineer
Security enthusiast tries to learn infosec