ºÝºÝߣshows by User: ThomasRoccia / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: ThomasRoccia / Mon, 08 Oct 2018 07:07:58 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: ThomasRoccia TRITON: The Next Generation of ICS Malware /slideshow/triton-the-next-generation-of-ics-malware/118654213 tritoncnestroccia-181008070758
This presentation is about the industrial malware dubbed Triton that targeted Safety Industrial System in a oil and gas plant in 2017. It was presented during the CNES COMET event about Industrial Threats. ]]>

This presentation is about the industrial malware dubbed Triton that targeted Safety Industrial System in a oil and gas plant in 2017. It was presented during the CNES COMET event about Industrial Threats. ]]>
Mon, 08 Oct 2018 07:07:58 GMT /slideshow/triton-the-next-generation-of-ics-malware/118654213 ThomasRoccia@slideshare.net(ThomasRoccia) TRITON: The Next Generation of ICS Malware ThomasRoccia This presentation is about the industrial malware dubbed Triton that targeted Safety Industrial System in a oil and gas plant in 2017. It was presented during the CNES COMET event about Industrial Threats. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tritoncnestroccia-181008070758-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is about the industrial malware dubbed Triton that targeted Safety Industrial System in a oil and gas plant in 2017. It was presented during the CNES COMET event about Industrial Threats.
TRITON: The Next Generation of ICS Malware from Thomas Roccia
]]>
1762 5 https://cdn.slidesharecdn.com/ss_thumbnails/tritoncnestroccia-181008070758-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CoinMiners are Evasive - BsidesTLV /slideshow/coinminers-are-evasive-bsidestlv/102773721 coinminersareevasive-180621115946
CoinMiners are on the rise, trending so high that in the last couple of month they almost completely replaced ransomware in both media and the research community. Unlike ransomware which profit from rapid encryption of user’s data taken hostage, CoinMiners profit comes from high jacking computer resources. As long as the CoinMiner stays undetected and stealth, the higher its author profit. In this talk we will focus on the unexplored territory of CoinMiner evasive maneuver and functionality to avoid getting found by its victims and provide tactics and tools to combat them.]]>

CoinMiners are on the rise, trending so high that in the last couple of month they almost completely replaced ransomware in both media and the research community. Unlike ransomware which profit from rapid encryption of user’s data taken hostage, CoinMiners profit comes from high jacking computer resources. As long as the CoinMiner stays undetected and stealth, the higher its author profit. In this talk we will focus on the unexplored territory of CoinMiner evasive maneuver and functionality to avoid getting found by its victims and provide tactics and tools to combat them.]]>
Thu, 21 Jun 2018 11:59:46 GMT /slideshow/coinminers-are-evasive-bsidestlv/102773721 ThomasRoccia@slideshare.net(ThomasRoccia) CoinMiners are Evasive - BsidesTLV ThomasRoccia CoinMiners are on the rise, trending so high that in the last couple of month they almost completely replaced ransomware in both media and the research community. Unlike ransomware which profit from rapid encryption of user’s data taken hostage, CoinMiners profit comes from high jacking computer resources. As long as the CoinMiner stays undetected and stealth, the higher its author profit. In this talk we will focus on the unexplored territory of CoinMiner evasive maneuver and functionality to avoid getting found by its victims and provide tactics and tools to combat them. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/coinminersareevasive-180621115946-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> CoinMiners are on the rise, trending so high that in the last couple of month they almost completely replaced ransomware in both media and the research community. Unlike ransomware which profit from rapid encryption of user’s data taken hostage, CoinMiners profit comes from high jacking computer resources. As long as the CoinMiner stays undetected and stealth, the higher its author profit. In this talk we will focus on the unexplored territory of CoinMiner evasive maneuver and functionality to avoid getting found by its victims and provide tactics and tools to combat them.
CoinMiners are Evasive - BsidesTLV from Thomas Roccia
]]>
1853 5 https://cdn.slidesharecdn.com/ss_thumbnails/coinminersareevasive-180621115946-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
42 - Malware - Understand the Threat and How to Respond /slideshow/42-malware-understand-the-threat-and-how-to-respond/94831653 malware-42-roccia-lesueur-180424062501
Malware are becoming more and more complex. In this talk presenting with Jean-Pierre Lesueur at the School 42, we explained the business model behind as well provided an understanding of the Malware Threat.]]>

Malware are becoming more and more complex. In this talk presenting with Jean-Pierre Lesueur at the School 42, we explained the business model behind as well provided an understanding of the Malware Threat.]]>
Tue, 24 Apr 2018 06:25:00 GMT /slideshow/42-malware-understand-the-threat-and-how-to-respond/94831653 ThomasRoccia@slideshare.net(ThomasRoccia) 42 - Malware - Understand the Threat and How to Respond ThomasRoccia Malware are becoming more and more complex. In this talk presenting with Jean-Pierre Lesueur at the School 42, we explained the business model behind as well provided an understanding of the Malware Threat. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malware-42-roccia-lesueur-180424062501-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Malware are becoming more and more complex. In this talk presenting with Jean-Pierre Lesueur at the School 42, we explained the business model behind as well provided an understanding of the Malware Threat.
42 - Malware - Understand the Threat and How to Respond from Thomas Roccia
]]>
1919 7 https://cdn.slidesharecdn.com/ss_thumbnails/malware-42-roccia-lesueur-180424062501-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wannacry | Technical Insight and Lessons Learned /slideshow/wannacry-technical-insight-and-lessons-learned/82289028 wannacryanalysis-171118213037
This presentation is an overview of the Ransomware Wannacry. The slides talk about the techniques used and the lessons learned.]]>

This presentation is an overview of the Ransomware Wannacry. The slides talk about the techniques used and the lessons learned.]]>
Sat, 18 Nov 2017 21:30:37 GMT /slideshow/wannacry-technical-insight-and-lessons-learned/82289028 ThomasRoccia@slideshare.net(ThomasRoccia) Wannacry | Technical Insight and Lessons Learned ThomasRoccia This presentation is an overview of the Ransomware Wannacry. The slides talk about the techniques used and the lessons learned. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wannacryanalysis-171118213037-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is an overview of the Ransomware Wannacry. The slides talk about the techniques used and the lessons learned.
Wannacry | Technical Insight and Lessons Learned from Thomas Roccia
]]>
470 4 https://cdn.slidesharecdn.com/ss_thumbnails/wannacryanalysis-171118213037-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Sandbox Evasion Cheat Sheet /slideshow/sandbox-evasion-cheat-sheet/76307067 sandbox-cheatsheet-1-170524162654
This is a best practice cheat sheet to avoid malware sandbox evasion.]]>

This is a best practice cheat sheet to avoid malware sandbox evasion.]]>
Wed, 24 May 2017 16:26:54 GMT /slideshow/sandbox-evasion-cheat-sheet/76307067 ThomasRoccia@slideshare.net(ThomasRoccia) Sandbox Evasion Cheat Sheet ThomasRoccia This is a best practice cheat sheet to avoid malware sandbox evasion. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sandbox-cheatsheet-1-170524162654-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a best practice cheat sheet to avoid malware sandbox evasion.
Sandbox Evasion Cheat Sheet from Thomas Roccia
]]>
1357 4 https://cdn.slidesharecdn.com/ss_thumbnails/sandbox-cheatsheet-1-170524162654-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Malware Evasion Techniques /slideshow/malware-evasion-techniques/76306916 malwareevasiontechniques-170524162431
This talk was presented during the Security Day 2017. It presents an overview of the malware evasion techniques]]>

This talk was presented during the Security Day 2017. It presents an overview of the malware evasion techniques]]>
Wed, 24 May 2017 16:24:31 GMT /slideshow/malware-evasion-techniques/76306916 ThomasRoccia@slideshare.net(ThomasRoccia) Malware Evasion Techniques ThomasRoccia This talk was presented during the Security Day 2017. It presents an overview of the malware evasion techniques <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malwareevasiontechniques-170524162431-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This talk was presented during the Security Day 2017. It presents an overview of the malware evasion techniques
Malware Evasion Techniques from Thomas Roccia
]]>
4316 6 https://cdn.slidesharecdn.com/ss_thumbnails/malwareevasiontechniques-170524162431-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ransomware Teslacrypt Uncovered - Malware Analysis /slideshow/ransomware-teslacrypt-uncovered-malware-analysis/70113677 teslacryptwhitepapertr-161213214312
Analysis of Teslacrypt Ransomware]]>

Analysis of Teslacrypt Ransomware]]>
Tue, 13 Dec 2016 21:43:11 GMT /slideshow/ransomware-teslacrypt-uncovered-malware-analysis/70113677 ThomasRoccia@slideshare.net(ThomasRoccia) Ransomware Teslacrypt Uncovered - Malware Analysis ThomasRoccia Analysis of Teslacrypt Ransomware <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/teslacryptwhitepapertr-161213214312-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Analysis of Teslacrypt Ransomware
Ransomware Teslacrypt Uncovered - Malware Analysis from Thomas Roccia
]]>
932 7 https://cdn.slidesharecdn.com/ss_thumbnails/teslacryptwhitepapertr-161213214312-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Research Paper on Digital Forensic https://fr.slideshare.net/slideshow/research-paper-on-digital-forensic/68059091 memoirederechercheforensicroccia-161102133351
Paper about Digital Forensic Techniques and Malware hunting]]>

Paper about Digital Forensic Techniques and Malware hunting]]>
Wed, 02 Nov 2016 13:33:51 GMT https://fr.slideshare.net/slideshow/research-paper-on-digital-forensic/68059091 ThomasRoccia@slideshare.net(ThomasRoccia) Research Paper on Digital Forensic ThomasRoccia Paper about Digital Forensic Techniques and Malware hunting <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/memoirederechercheforensicroccia-161102133351-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Paper about Digital Forensic Techniques and Malware hunting
from Thomas Roccia
]]>
1769 7 https://cdn.slidesharecdn.com/ss_thumbnails/memoirederechercheforensicroccia-161102133351-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Windows Kernel Debugging /slideshow/kernel-debugpresentation/68058736 kernel-debug-presentation-161102132723
An introduction to Windows Kernel Debugging]]>

An introduction to Windows Kernel Debugging]]>
Wed, 02 Nov 2016 13:27:23 GMT /slideshow/kernel-debugpresentation/68058736 ThomasRoccia@slideshare.net(ThomasRoccia) Windows Kernel Debugging ThomasRoccia An introduction to Windows Kernel Debugging <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kernel-debug-presentation-161102132723-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An introduction to Windows Kernel Debugging
Windows Kernel Debugging from Thomas Roccia
]]>
984 5 https://cdn.slidesharecdn.com/ss_thumbnails/kernel-debug-presentation-161102132723-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Sec day cuckoo_workshop https://fr.slideshare.net/slideshow/sec-day-cuckooworkshop/68058608 secdaycuckooworkshop-161102132400
Malware analysis with Cuckoo Sandbox.]]>

Malware analysis with Cuckoo Sandbox.]]>
Wed, 02 Nov 2016 13:24:00 GMT https://fr.slideshare.net/slideshow/sec-day-cuckooworkshop/68058608 ThomasRoccia@slideshare.net(ThomasRoccia) Sec day cuckoo_workshop ThomasRoccia Malware analysis with Cuckoo Sandbox. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/secdaycuckooworkshop-161102132400-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Malware analysis with Cuckoo Sandbox.
from Thomas Roccia
]]>
519 6 https://cdn.slidesharecdn.com/ss_thumbnails/secdaycuckooworkshop-161102132400-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/tritoncnestroccia-181008070758-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/triton-the-next-generation-of-ics-malware/118654213 TRITON: The Next Gener... https://cdn.slidesharecdn.com/ss_thumbnails/coinminersareevasive-180621115946-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/coinminers-are-evasive-bsidestlv/102773721 CoinMiners are Evasive... https://cdn.slidesharecdn.com/ss_thumbnails/malware-42-roccia-lesueur-180424062501-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/42-malware-understand-the-threat-and-how-to-respond/94831653 42 - Malware - Underst...