{"id":11163,"date":"2018-01-18T08:30:24","date_gmt":"2018-01-18T16:30:24","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/18\/news-4934\/"},"modified":"2018-01-18T08:30:24","modified_gmt":"2018-01-18T16:30:24","slug":"news-4934","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/18\/news-4934\/","title":{"rendered":"Unlocking God Mode, a SAS 2018 preview podcast"},"content":{"rendered":"<p><strong>Credit to Author: Jeffrey Esposito| Date: Thu, 18 Jan 2018 15:52:51 +0000<\/strong><\/p>\n<p>On this special edition podcast, I talk with Sergey Golovanov about the upcoming SAS conference. We discuss the history of the conference, why you should attend, and why you may want to sign up for his training on analyzing APTs.<\/p>\n<p> <a href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2018\/01\/18105104\/hunting-apt-god-level-podcast-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2018\/01\/18105104\/hunting-apt-god-level-podcast-featured.jpg\" alt=\"Unlocking God Mode, a SAS 2018 preview podcast\" width=\"1460\" height=\"958\" class=\"aligncenter size-full wp-image-20742\" \/><\/a> <\/p>\n<p>More on the course: <em>Analyzing APT-level attacks requires a deep understanding of the APT toolkit to truly understand the extent of the capabilities and intentions of determined intruders. Only with this can companies ever be sure that their damage assessment and incident response efforts are accurate and effective. The only way to reach this level of understanding with true fidelity is to statically analyze the malicious code (no ifs, ands, or dynamic buts about it)<\/em>.<\/p>\n<p> <iframe loading=\"lazy\"  src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/6162863\/height\/90\/theme\/custom\/autoplay\/no\/autonext\/no\/thumbnail\/yes\/preload\/no\/no_addthis\/no\/direction\/backward\/render-playlist\/no\/custom-color\/87A93A\/\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe>  <\/p>\n<p style=\"text-align: center\"><a target=\"_blank\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2015\/05\/06015645\/badge_itunes-lrg.png\" alt=\"rss-podcasts\" width=\"110\" height=\"40\" class=\"size-full wp-image-16673\" \/><\/a> <a target=\"_blank\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2014\/11\/06042137\/rss-podcasts1.png\" alt=\"rss-podcasts\" width=\"116\" height=\"40\" class=\"size-full wp-image-6787\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/hunting-apt-god-level\/20739\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jeffrey Esposito| Date: Thu, 18 Jan 2018 15:52:51 +0000<\/strong><\/p>\n<p>On this Kaspersky Lab podcast, Jeff talks with Sergey Golovanov about his SAS 2018 training on APT hunting.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[16465,17229,17230,32,5820,1931,11760,17231],"class_list":["post-11163","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-thesas2018","tag-apt-hunting","tag-cancun","tag-news","tag-podcast","tag-research","tag-sas","tag-the-sas-2018"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11163"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11163\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11163"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}