What happens when attackers deploy open-source malware Looking at open command and control servers to find attackers toolkits The problems when Red Teams copy attackers malware And the opportunities this all gives to defenders
Chris Doman works on the threat intelligence platform OTX. He's the founder of the research site ThreatCrowd, and previously worked in incident response and forensics.