演講日期 :2025-06-03
Instoduction: In an era where cyber threats are evolving at an unprecedented pace, understanding the underlying techniques of modern attack campaigns has never been more critical. This talk delves into recent, high-impact cyber incidents and the sophisticated tactics, techniques, and procedures (TTPs) used by adversaries. Drawing from real-world examples and threat intelligence reports, we will explore how attackers leverage advanced methods such as living-off-the-land binaries (LOLBins), fileless malware, and supply chain compromise to evade detection. To conclude, I will briefly present my current research on deep learning models guided by threat-informed principles—highlighting how AI can be used to detect adversarial behavior by learning patterns from system logs mapped to known attack techniques.
|