- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
[JSAC2026] A deep-dive into RapperBot C2 operation and DDoS attacks - English -
JSAC2026
[Title] A deep-dive into RapperBot C2 operation and DDoS attacks
[Speaker] Hideyuki Furukawa
[Slides]
https://jsac.jpcert.or.jp/archive/2026/pdf/JSAC2026_2_5_hideyuki-furukawa_en.pdf (English)
Видео [JSAC2026] A deep-dive into RapperBot C2 operation and DDoS attacks - English - канала JPCERT/CC
[Title] A deep-dive into RapperBot C2 operation and DDoS attacks
[Speaker] Hideyuki Furukawa
[Slides]
https://jsac.jpcert.or.jp/archive/2026/pdf/JSAC2026_2_5_hideyuki-furukawa_en.pdf (English)
Видео [JSAC2026] A deep-dive into RapperBot C2 operation and DDoS attacks - English - канала JPCERT/CC
Комментарии отсутствуют
Информация о видео
14 апреля 2026 г. 5:38:54
00:22:26
Другие видео канала

![[JSAC2022] 日本にシェアが集中するCMSを狙う特異な攻撃者と侵害ツールの調査](https://i.ytimg.com/vi/sOeQuN6OBKI/default.jpg)
![[JSAC2022] Emotet vs EmoCheck Emotet開発者との戦い](https://i.ytimg.com/vi/_XX8N5VbW2w/default.jpg)
![[JSAC2026] RapperBotのC2オペレーションとDDoS攻撃の詳細 - Japanese -](https://i.ytimg.com/vi/6avBa0qLXeo/default.jpg)
![[CODE BLUE 2019] MalConfScan - Overview](https://i.ytimg.com/vi/n36WAzgHldY/default.jpg)
![[Tool Demo] YAMA: Yet Another Memory Analyzer for malware detection - Detecting CobaltStrike Beacon](https://i.ytimg.com/vi/YM-nEMmnaIA/default.jpg)
![[JSAC2026] Infrastructure-less Adversary: C2 Laundering via Dead-Drop Resolvers and the Microsoft ..](https://i.ytimg.com/vi/7A_DU0kDOGI/default.jpg)
![[JSAC2025] Ransomware's Secret Tunnel: How Ransomware Groups Hijack ESXi and NAS for ... - English -](https://i.ytimg.com/vi/IDxN1803Bq4/default.jpg)
![[JSAC2020]ランサムウェアに標的型攻撃手法を求めるのは間違っているだろうか](https://i.ytimg.com/vi/S9W_VS8alVk/default.jpg)
![[JSAC2026] Konni’s New Arsenal: Unmasking GSRAT in North Korea-linked APT Operation - Japanese -](https://i.ytimg.com/vi/dvJOlDCwdxY/default.jpg)
![[JSAC2020]自作ツールを使用したMac Forensicsの調査効率化](https://i.ytimg.com/vi/qRAYKlF5RzU/default.jpg)
![[JSAC2025] Stealth in the Shadows: Dissecting Earth Freybug's Recent Campaign and ... - English -](https://i.ytimg.com/vi/jHg6ZTe9i2s/default.jpg)
![[JSAC2020]攻撃キャンペーン「Operation Bitter Biscuit」を実行した標的型攻撃グループに関する脅威情報](https://i.ytimg.com/vi/V2h-YmKJGnw/default.jpg)
![[JSAC2019] 公開サーバを狙った仮想通貨の採掘を強要する攻撃について](https://i.ytimg.com/vi/Yoj5H5jf4z4/default.jpg)
![[JSAC2025] China-aligned PlushDaemon APT compromises supply chain of Korean VPN - English -](https://i.ytimg.com/vi/iRISgBMeOrs/default.jpg)
![[JSAC2025] China-aligned PlushDaemon APT compromises supply chain of Korean VPN - Japanese -](https://i.ytimg.com/vi/QysGnVjXrfo/default.jpg)
![[JSAC2021] Workshop: Malware Analysis at Scale ~Defeating EMOTET by Ghidra~](https://i.ytimg.com/vi/rC5Em4xEyeA/default.jpg)
![[Tool Demo] YAMA: Yet Another Memory Analyzer for malware detection - Build YAMA with GitHub Actions](https://i.ytimg.com/vi/c0ip9_dvcYg/default.jpg)
![[JSAC2020]An Overhead View of the Royal Road](https://i.ytimg.com/vi/gAcmLojO0Kg/default.jpg)
![[JSAC2021] A41APT case ~Analysis of the Stealth APT Campaign Threatening Japan](https://i.ytimg.com/vi/HpUsMaiTW4g/default.jpg)
![[JSAC2026] The Betrayed Update: Beyond the Signpost - Japanese -](https://i.ytimg.com/vi/jGqVeEymYSo/default.jpg)