From Malware Analysis to Adversary Emulation
👌This session demonstrates the complete workflow from dissecting malicious documents (PDFs, Office files) to building executable threat emulation campaigns.
Learn how to extract TTPs from real malware samples, map them to MITRE ATT&CK, and use platforms like SCYTHE to validate whether your defenses would actually catch the attack in your environment.
