Feb

19

Threatray: Detection and Investigation of Evasive C2 Frameworks

Referat
Bookmark

Command-and-control (C2) frameworks running solely in memory can evade standard AV and EDR solutions. This talk demonstrates how Threatray detects these stealthy C2 tools and enhances threat investigations. We’ll showcase Threatray’s memory-based analysis, revealing how it identifies malicious code, detects payload modifications, and streamlines responses. Attendees will learn how these capabilities bridge the gap between initial detection and deeper analysis, helping teams respond more effectively to emerging threats.

the Swiss Cyber Security Days
17 - 18 February 2026

  • Homepage
  • About the Swiss Cyber Security Days
  • Program & Speakers 2025
  • Exhibitors 2025
  • Site plan

  • About this application