hitb2020sin https://news.hitb.org/index.php/ en A look at modern adversary behavior and the usage of open source tools in the enterprise https://news.hitb.org/index.php/content/look-modern-adversary-behavior-and-usage-open-source-tools-enterprise <article data-history-node-id="56115" role="article" class="node article teaser clearfix UTF-8"> <header> <h2 class="title text-center"><a href="/index.php/content/look-modern-adversary-behavior-and-usage-open-source-tools-enterprise" rel="bookmark"><span>A look at modern adversary behavior and the usage of open source tools in the enterprise</span> </a></h2> <div class="meta submit clearfix"> <div class="date text-right"> <span class="lowercase">posted on</span>July 20, 2020 </div> <div class="author"> <span class="lowercase">by</span> <span><span>l33tdawg</span></span> </div> </div> </header> <div class="image-default"> <div> <a href="/index.php/content/look-modern-adversary-behavior-and-usage-open-source-tools-enterprise" hreflang="en"><img loading="lazy" src="/sites/default/files/styles/medium/public/2020-07/defensive_security-leszek-mis.jpg?itok=1ILwea29" width="220" height="136" alt="Help Net Security" /> </a> </div> <div class="image-credit"> <strong>Credit:</strong> Help Net Security </div> </div> <div class="content"> <div><p>Leszek Miś is the founder of <a href="https://www.defensive-security.com">Defensive Security</a>, a principal trainer and security researcher with over 15 years of experience. Next week, he’s running an amazing online training course – <a href="https://conference.hitb.org/hitbsecconf2020sin/sessions/3-day-training-7-in-out-network-exfiltration-and-post-exploitation-techniques-red-edition/">In &amp; Out – Network Exfiltration and Post-Exploitation Techniques [RED Edition]</a> at HITBSecConf 2020 Singapore, so it was the perfect time for an interview.</p> </div> </div> <div class="meta link clearfix"> <div class="comment"> <span class="lowercase">no</span>comment </div> <div class="share text-center show-for-medium"> <span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/index.php/content/look-modern-adversary-behavior-and-usage-open-source-tools-enterprise" data-a2a-title="A look at modern adversary behavior and the usage of open source tools in the enterprise"><a class="a2a_button_facebook"><span class="fa fa-facebook"></span></a><a class="a2a_button_twitter"><span class="fa fa-twitter"></span></a><a class="a2a_button_linkedin"><span class="fa fa-linkedin"></span></a><a class="a2a_button_email"><span class="fa fa-envelope"></span></a></span> </div> <div class="read-more"><a href="/index.php/content/look-modern-adversary-behavior-and-usage-open-source-tools-enterprise"><span class="lowercase">&#8594;</span>READ MORE</a></div> </div> </article> Mon, 20 Jul 2020 22:53:27 +0000 l33tdawg 56115 at https://news.hitb.org