Mettez-vous hors ligne avec l'application Player FM !
130: Cyber Security with Colin Hardy
Manage episode 214305884 series 2410493
On this weeks show we are joined by Colin Hardy to discuss all things Cyber Security. We start off by explaining what got him interested in this branch of computing, highlight what Cyber Security is, and define some of the common terminology. From here, we move on to discuss how he analyses Malware samples (using Automated, Behavioural and Static means) and the diagnostic tooling present. Finally, we mention some high-profile attacks (Stuxnet, WannaCry), motives behind creating such Malware and how he stays current in this field.
Show Links
- Colin Hardy
- WannaCry 2.0 Ransomware - YouTube
- Kill chain
- WannaCry ransomware attack
- Understanding Malware Terminology for Beginners
- Stuxnet
- How Stuxnet attacked a nuclear plant
- Advanced Banload Analysis
- The Shadow Brokers
- Malware analysis
- Process Monitor
- Process Hacker
- Wireshark
- OllyDbg
- Emotet JavaScript dropper analysis and deobfuscation
- Cuckoo Sandbox - Automated Malware Analysis
- Virtual machine escape fetches $105,000 at Pwn2Own hacking contest
- Mobile malware evolution 2016
- Lazarus Group
- Bangladesh Bank robbery
- OWASP
- Malicious JavaScript downloader analysis
- SANS Institute - World Class Cyber Security Training
- Lenny Zeltser
- Practical Malware Analysis - No Starch Press
- Cybersecurity for IT Professionals
- Cybersecurity - Coursera
164 episodes
Manage episode 214305884 series 2410493
On this weeks show we are joined by Colin Hardy to discuss all things Cyber Security. We start off by explaining what got him interested in this branch of computing, highlight what Cyber Security is, and define some of the common terminology. From here, we move on to discuss how he analyses Malware samples (using Automated, Behavioural and Static means) and the diagnostic tooling present. Finally, we mention some high-profile attacks (Stuxnet, WannaCry), motives behind creating such Malware and how he stays current in this field.
Show Links
- Colin Hardy
- WannaCry 2.0 Ransomware - YouTube
- Kill chain
- WannaCry ransomware attack
- Understanding Malware Terminology for Beginners
- Stuxnet
- How Stuxnet attacked a nuclear plant
- Advanced Banload Analysis
- The Shadow Brokers
- Malware analysis
- Process Monitor
- Process Hacker
- Wireshark
- OllyDbg
- Emotet JavaScript dropper analysis and deobfuscation
- Cuckoo Sandbox - Automated Malware Analysis
- Virtual machine escape fetches $105,000 at Pwn2Own hacking contest
- Mobile malware evolution 2016
- Lazarus Group
- Bangladesh Bank robbery
- OWASP
- Malicious JavaScript downloader analysis
- SANS Institute - World Class Cyber Security Training
- Lenny Zeltser
- Practical Malware Analysis - No Starch Press
- Cybersecurity for IT Professionals
- Cybersecurity - Coursera
164 episodes
Усі епізоди
×Bienvenue sur Lecteur FM!
Lecteur FM recherche sur Internet des podcasts de haute qualité que vous pourrez apprécier dès maintenant. C'est la meilleure application de podcast et fonctionne sur Android, iPhone et le Web. Inscrivez-vous pour synchroniser les abonnements sur tous les appareils.