2026 Malware Trends: Hunting the Digital Parasite
Автор: Picus Security
Загружено: 2026-02-26
Просмотров: 94
Описание:
Attackers are getting quieter. In this Malware Trends webinar, we break down the key findings from the RED Report 2026 and explain why “Digital Parasite” behavior is becoming the dominant model: stealth, persistence, living off the land, and data theft over time.
Picus Labs analyzed 1.1M malicious files and 15.5M adversary actions, mapped to the MITRE ATT&CK framework. The result is a clear shift: ransomware impact signals are fading, and defenders can’t rely on loud, disruptive indicators anymore.
In this session, threat researcher John Bambenek and Picus’ Can Yuceel (co-author of the RED Report 2026) discuss:
Why “quiet” intrusions are harder to detect than encryption events
How self-aware malware evades sandboxes and virtualization analysis (T1497 and system checks)
Why living off the land keeps winning (PowerShell, built-in tools, trusted processes)
How attackers abuse common protocols like DNS and HTTPS for C2 and data exfiltration
What SOC leaders should change in telemetry, detection engineering, and alert quality
Why AI can help with translation and drafting, but still struggles with production-ready detection logic and tuning
If you’re responsible for detection engineering, SOC operations, threat hunting, or validation, this webinar will help you align your effort with what adversaries are actually doing in the wild.
📌 Resources mentioned in the webinar:
RED Report 2026: https://www.picussecurity.com/red-report
MITRE ATT&CK datasheet: https://www.picussecurity.com/resourc...
00:07 Intro and welcome
01:30 Speaker intros (John Bambenek, Can Yuceel)
02:17 What is the RED Report and how the dataset was built (1.1M files, 15.5M actions)
03:13 Key theme: the rise of “Digital Parasites” and quieter intrusions
07:47 What this shift means for SOC teams and detection engineering
09:42 Why “nothing is happening” is the new problem (late discovery, silent exfiltration)
11:31 Self-aware malware and sandbox evasion (system checks, virtualization signals)
14:07 Living off the land: why legitimate tools are being abused more
18:10 Top 10 techniques overview and defender prioritization
20:57 DNS as C2 and evasion details (nslookup, tunneling, obfuscation)
22:03 Why signature rules are less effective vs fileless and tool-abuse behaviors
23:46 Identity pivoting and cloud log gaps (AWS, GCP, Azure, SharePoint)
24:54 Impaired defenses and why attackers disable logging and sensors
28:01 Where defenders should begin (telemetry, top techniques, cost focused prioritization)
32:54 Operationalizing the report with threat templates and technique variations
35:23 Live Q and A: recon patterns and automation vs targeted ops
40:40 Live Q and A: remote access shells via scripting and common attacker comms paths
46:05 SOC leader guidance: concrete changes for detecting ambiguous behavior
48:59 AI in detection engineering: where it helps, where it fails today
53:44 Wrap up and next webinar announcement
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: