Media Summary: By Nick Landers This talk will discuss the methodology, selection process, and challenges of modern Nick Landers Technical Lead, Silent Break Security Location: Jasmine Date: Wednesday, August 7 4:00pm-4:50pm Format: ... Register for the 2018 Cyber Threat Intelligence Summit: Wave Your

Flying A False Flag Advanced C2 Trust Conflicts And Domain Takeover - Detailed Analysis & Overview

By Nick Landers This talk will discuss the methodology, selection process, and challenges of modern Nick Landers Technical Lead, Silent Break Security Location: Jasmine Date: Wednesday, August 7 4:00pm-4:50pm Format: ... Register for the 2018 Cyber Threat Intelligence Summit: Wave Your Brian Bartholomew, Security Researcher, Kaspersky Lab Juan Andrés Guerrero-Saade, Security Researcher, Kaspersky Lab ... Filmed at the 2016 SANS DFIR Summit in Austin TX in June. Jacob William's analysis is spot on of the DNC Hack. Jake Williams ... My BEST Content Is Now On SoundCloud: Schedule a Skype Meeting with Eli: ...

This presentation details multiple techniques that can be used to At Black Hat last year, we sat down with Kevin Mandia to talk about what's coming. His take: offense is going to accelerate with AI. On-Demand Sessions 5 hours of on-demand videos providing the latest insight into how to combat today's adversaries. View at ... For red teams, CDN is a good redirector and protector for their Have you ever wondered what happens when a trusted website links to an expired AI is transforming the cybersecurity threat landscape, enabling more sophisticated phishing, ransomware, and ...

Photo Gallery

Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
Wave Your False Flags! Deception Tactics Muddying Attribution - CTI Summit 2017
Hello False Flags! The Art of Deception in Targeted Attack Attribution
DFIR Summit 2016:  Potential for False Flag Operations in the DNC Hack
YouTube Contact About False Flag
SharpSCCM 2.0: Abusing Microsoft’s C2 Framework (Black Hat USA 2023 Booth Talk)
Kevin Mandia on AI-Powered Attacks: The Race Just Got Faster | Black Hat | Reach Security
Flagging Fake Users Part 2
Domain Borrowing: Catch My C2 Traffic if You Can
#Hacktivity2021 // C2Centipede: APT Level C2 Communications for Common Reverse HTTP Shell Tools
The Hidden Danger of Second-Order Domain Takeovers! | CyberSecurityTV
Sponsored
View Detailed Profile
Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover

Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover

By Nick Landers This talk will discuss the methodology, selection process, and challenges of modern

Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover

Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover

Nick Landers | Technical Lead, Silent Break Security Location: Jasmine Date: Wednesday, August 7 | 4:00pm-4:50pm Format: ...

Wave Your False Flags! Deception Tactics Muddying Attribution - CTI Summit 2017

Wave Your False Flags! Deception Tactics Muddying Attribution - CTI Summit 2017

Register for the 2018 Cyber Threat Intelligence Summit: http://www.sans.org/u/wOQ Wave Your

Hello False Flags! The Art of Deception in Targeted Attack Attribution

Hello False Flags! The Art of Deception in Targeted Attack Attribution

Brian Bartholomew, Security Researcher, Kaspersky Lab Juan Andrés Guerrero-Saade, Security Researcher, Kaspersky Lab ...

DFIR Summit 2016:  Potential for False Flag Operations in the DNC Hack

DFIR Summit 2016: Potential for False Flag Operations in the DNC Hack

Filmed at the 2016 SANS DFIR Summit in Austin TX in June. Jacob William's analysis is spot on of the DNC Hack. Jake Williams ...

Sponsored
YouTube Contact About False Flag

YouTube Contact About False Flag

My BEST Content Is Now On SoundCloud: https://soundcloud.com/elithecomputerguy Schedule a Skype Meeting with Eli: ...

SharpSCCM 2.0: Abusing Microsoft’s C2 Framework (Black Hat USA 2023 Booth Talk)

SharpSCCM 2.0: Abusing Microsoft’s C2 Framework (Black Hat USA 2023 Booth Talk)

This presentation details multiple techniques that can be used to

Kevin Mandia on AI-Powered Attacks: The Race Just Got Faster | Black Hat | Reach Security

Kevin Mandia on AI-Powered Attacks: The Race Just Got Faster | Black Hat | Reach Security

At Black Hat last year, we sat down with Kevin Mandia to talk about what's coming. His take: offense is going to accelerate with AI.

Flagging Fake Users Part 2

Flagging Fake Users Part 2

On-Demand Sessions 5 hours of on-demand videos providing the latest insight into how to combat today's adversaries. View at ...

Domain Borrowing: Catch My C2 Traffic if You Can

Domain Borrowing: Catch My C2 Traffic if You Can

For red teams, CDN is a good redirector and protector for their

#Hacktivity2021 // C2Centipede: APT Level C2 Communications for Common Reverse HTTP Shell Tools

#Hacktivity2021 // C2Centipede: APT Level C2 Communications for Common Reverse HTTP Shell Tools

Jose Garduño - C2Centipede: APT Level

The Hidden Danger of Second-Order Domain Takeovers! | CyberSecurityTV

The Hidden Danger of Second-Order Domain Takeovers! | CyberSecurityTV

Have you ever wondered what happens when a trusted website links to an expired

Fight Back Against AI Cyberattacks | Agentic AI Summit | April 2026

Fight Back Against AI Cyberattacks | Agentic AI Summit | April 2026

AI is transforming the cybersecurity threat landscape, enabling more sophisticated phishing, ransomware, and ...