Threat Expert, Global Expert Custom Defense, Trend Micro
Girard joined Trend Micro in May, 2010. He is a frequent speaker in Canada and abroad. He analyzes logs and malware samples, and presents on his findings. He writes testing malware and scripts for integration. He assists large enterprises in solution architecture, incident handling and proof of concepts.
What are the most common mechanisms used in the "Exploit" phase, many attacks simply take advantage of known vulnerabilities or network weaknesses that have not been addressed, in which cases the adversaries have no need to create custom malware. When they are employed, "Zero-day" attacks are often very difficult to...
Threat Expert, Global Expert Custom Defense, Trend Micro
Girard joined Trend Micro in May, 2010. He is a frequent speaker in Canada and abroad. He analyzes logs and malware samples, and presents on his findings. He writes testing malware and scripts for integration. He assists large enterprises in solution architecture, incident handling and proof of concepts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.