The Fastest Way to Become a Backend Developer Online
AI, Data Science & Cloud Certificates from Google, IBM & Meta
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced evasion techniques used by modern threat actors in this 57-minute conference talk from HackMiami XII. Delve into the sophisticated methods cybercriminals employ to bypass the 20-30 security tools typically deployed in mid-sized organizations, examining how attackers have evolved their tactics over the past two decades to maintain stealth throughout their entire attack chain. Learn about cutting-edge obfuscation techniques including code obfuscation, HTML smuggling, resource concealment, and anti-bot protections such as sandbox evasion, while discovering how threat actors exploit legitimate cloud services and leverage service-based offerings within the cybercrime underground. Gain insights through accessible code reviews of real malware and phishing campaigns, designed for participants without programming expertise, and understand how attackers reverse-engineer security solutions to make subtle yet impactful modifications that render their malware, phishing schemes, and automated tools completely undetectable by existing defense mechanisms.
Syllabus
HackMiami XII -Flying under the radar from low visibility to no visibility. Danna Peller & Itay Maor
Taught by
HackMiami