hitb2020sin
https://news.hitb.org/index.php/
enA look at modern adversary behavior and the usage of open source tools in the enterprise
https://news.hitb.org/index.php/content/look-modern-adversary-behavior-and-usage-open-source-tools-enterprise
<article data-history-node-id="56115" role="article" class="node article teaser clearfix UTF-8">
<header>
<h2 class="title text-center"><a href="/index.php/content/look-modern-adversary-behavior-and-usage-open-source-tools-enterprise" rel="bookmark"><span>A look at modern adversary behavior and the usage of open source tools in the enterprise</span>
</a></h2>
<div class="meta submit clearfix">
<div class="date text-right">
<span class="lowercase">posted on</span>July 20, 2020
</div>
<div class="author">
<span class="lowercase">by</span> <span><span>l33tdawg</span></span>
</div>
</div>
</header>
<div class="image-default">
<div> <a href="/index.php/content/look-modern-adversary-behavior-and-usage-open-source-tools-enterprise" hreflang="en"><img loading="lazy" src="/sites/default/files/styles/medium/public/2020-07/defensive_security-leszek-mis.jpg?itok=1ILwea29" width="220" height="136" alt="Help Net Security" />
</a>
</div>
<div class="image-credit">
<strong>Credit:</strong>
Help Net Security
</div>
</div>
<div class="content">
<div><p>Leszek Miś is the founder of <a href="https://www.defensive-security.com">Defensive Security</a>, a principal trainer and security researcher with over 15 years of experience. Next week, he’s running an amazing online training course – <a href="https://conference.hitb.org/hitbsecconf2020sin/sessions/3-day-training-7-in-out-network-exfiltration-and-post-exploitation-techniques-red-edition/">In & Out – Network Exfiltration and Post-Exploitation Techniques [RED Edition]</a> at HITBSecConf 2020 Singapore, so it was the perfect time for an interview.</p>
</div>
</div>
<div class="meta link clearfix">
<div class="comment">
<span class="lowercase">no</span>comment
</div>
<div class="share text-center show-for-medium">
<span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/index.php/content/look-modern-adversary-behavior-and-usage-open-source-tools-enterprise" data-a2a-title="A look at modern adversary behavior and the usage of open source tools in the enterprise"><a class="a2a_button_facebook"><span class="fa fa-facebook"></span></a><a class="a2a_button_twitter"><span class="fa fa-twitter"></span></a><a class="a2a_button_linkedin"><span class="fa fa-linkedin"></span></a><a class="a2a_button_email"><span class="fa fa-envelope"></span></a></span>
</div>
<div class="read-more"><a href="/index.php/content/look-modern-adversary-behavior-and-usage-open-source-tools-enterprise"><span class="lowercase">→</span>READ MORE</a></div>
</div>
</article>
Mon, 20 Jul 2020 22:53:27 +0000l33tdawg56115 at https://news.hitb.org