
Behind the DNS Detection of a Zero-Day Infostealer
When & Where
Details
Format:
Technology lecture
Language:
English
Session description
Go behind the scenes of a zero-day Infostealer caught by DNS-centric threat intelligence. This is the real-world detection of a sophisticated malware that evaded NGFW, EDR, IPS, and antivirus. Using unique data hidden in DNS traffic, we’ll dissect how subtle anomalies—starting with unexpected DNS TXT record patterns—first flagged the threat. Follow the forensic journey from delivery to exfiltration, and see how DNS became the key to exposing what other tools missed.
Sponsored by