Today's Reverse Engineers have a daunting task - stay ahead of new zero-day threats. Recent updates to the Taidoor RAT (remote access trojan) illustrate how successful malware tools, particularly ones proven successful in targeted nation state attacks, continue to evolve. And it also provides an opportunity for modern reverse engineers to extract malware configuration data, understand how these malware updates behave, and document the IOCs and TTPs.
Here's your opportunity to hear directly from a Reverse Engineer involved in analyzing the latest Taidoor RAT update. In this session, we discuss:
• What is the Taidoor RAT, and how is it being used in nation state attacks
• How to think like a Reverse Engineer, and apply the tools of the trade
• How to leverage existing malware samples to search for similar threats and hunt using YARA
• How to apply this new intelligence on Taidoor to actively update your defenses