Hod FelberThe Containment Playbook for Combatting Deep FakesLearn how to deal with malicious abuse of deep fake technologies and sophisticated phishing attack from a real life case study.Apr 17Apr 17
Hod FelberinCYESECBehind the Veil: Identifying Stealthy Tunnels in Windows Event LogsWhat are tunneled connections? How to create them and how to detect them in Windows event logs?Aug 7, 20232Aug 7, 20232