Christopher Doman
What happens when attackers deploy open-source malware Looking at open command and control servers to find attackers toolkits The problems when Red Teams copy attackers malware And the opportunities this all gives to defenders