Joshua St.Hilaire is currently a Principal SecurityResearcher at Vectra where he currently leads research on adversarial detection models. He has twenty years of experience in computer security focused on incident response, threat hunting and reverse-engineering.
Posts from
Joshua St. Hilaire
Network and endpoint defense technologies will have to either rapidly update signatures or use other investigative ways to detect command and control (C2). Uncover how threat actors evade security tools to execute C2 techniques to learn about what you should look for.
Learn how Command and Control (C2) frameworks are continuing to evolve in order to evade detection. Here we will examine a method known as JA3 signature randomization.
General: info@vectra.ai
Support: support@vectra.ai
Headquarters
550 S. Winchester Blvd., Suite 200
San Jose, CA, USA 95128
© 2022 Vectra AI, Inc. All rights reserved.