5/16 (Thu.) 15:45 - 16:15 1F 1A

Your calendar is my C2 - the alchemy of disguised communication.

C2 communication plays an indispensable role in cyberattacks. In response to the ever-changing online environment, C2 techniques have evolved multiple times as attackers continuously seek new ways to evade defense mechanisms. According to MITRE ATT&CK T1102, attackers leverage cloud-based office services to evade detection of suspicious connections, increasing the difficulty of defending against network traffic exploitation. However, how can we effectively utilize network traffic to identify malicious connections to Google Calendar?

Sena Chia-Min Lai
SPEAKER
Senior Product Manager
PacketX Technology
Caner
SPEAKER
Senior Engineer
PacketX Technology

TOPIC / TRACK
Threat Research Forum

LOCATION
Taipei Nangang Exhibition Center, Hall 2
1F 1A

LEVEL
General General sessions explore new cybersecurity knowledge and non-technical topics, ideal for those with limited or no prior cybersecurity knowledge.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
Hackers & Threats
Application Security