A dive into pattern matching and YARA rules, exploring their role, applications, and limitations in threat detection.
We are going to explore k-anonymity, l-diversity, t-closeness, differential privacy and some related python scripts.
An analysis on LockBit, on how it operates and how LockBit 3.0 code works
A brief description on what is the "Follow The Money" technique, how crypto tracking works and how it is avoided.
A schematic comparison between VPNs, Private Relay and Tor.
A short dive into steganography, steganalysis and some related algorithms.