Have you ever wondered how Kaspersky discovered some of the world’s most famous APT attacks? Now, the answer is within your reach. Watch the latest recorded webinar by Costin Raiu, director of Kaspersky’s Global Research and Analysis Team (GReAT), who will be sharing best practices on the use of YARA, an essential tool for APT hunters that can assist with the discovery of new malware samples, exploits and zero-days, speed up incident response, and increase your defenses by deploying custom rules inside your organization.
If you ever wanted to master YARA and achieve a new level of knowledge in APT detection, mitigation and response, now is your chance.
This brief webinar is based on Kaspersky’s exclusive training on YARA rules, which has already helped improve the APT detection strategies of many cybersecurity teams from leading businesses across the world. During the webinar, you will learn how to write test and improve effective YARA rules. You will also get a glimpse of some of our internal tools and learn how to maximize your knowledge for building effective APT detection strategies with YARA.
This practical webinar is useful for security researchers and incident response personnel, malware analysts, security engineers, network security analysts, APT researchers and IT security staff. The content is suitable for both beginners and seasoned YARA users.
During this webinar, you will learn about:
•YARA syntax
•Tips & tricks for creating fast and effective rules
•Using YARA-generators
•Testing YARA rules for false positives
•Hunting new undetected samples
•Using external modules within YARA for effective hunting
•Anomaly search
•Real-life examples
Don’t miss this opportunity to learn about APT threat detection from Kaspersky’s Global Research and Analysis Team.
Attendees’ requirements:
Technical level: medium
Prerequisites: knowledge of basic programming languages
Software to install: YARA 3.11.0 or newer (if any)