Fileless Attacks and “Living off the Land binaries”: moving beyond just the “known bad” in security detection and response, and looking at how to prevent legitimate tools from being used in attacks (how to detect and respond)




About this session


Back to list of all Working Sessions