Modern advanced cyber-attacks (a practical demonstration) in 2026, and the impact at the Threat Intel level
André Lima, Telenor CyberDefence, Red Team Leader
Om foredraget
This talk is aimed at a CTI audience. It starts by demonstrating how MCP-driven systems can turn natural-language prompts into fluid intrusions, and then uses a live attack to show what these operations actually look like, so the audience can understand that this is not only a theoretical concern. The focus of the session is on what CTI teams must extract from such attacks - new IOCs, behavioural patterns, and evolving TTPs - and how to adapt intelligence workflows to a world where AI-generated compromises leave almost no traditional artefacts.
Om foredragsholder
Andre Lima is a Team Leader and Red Team operator doing it since 2011, who has worked in Portugal, Australia, and now leading the Red Team at Telenor CyberDefence in Oslo.
He is also a researcher and tries to publish as often as possible at his Youtube channel (https://www.youtube.com/@0x4ndr3), and blog (https://0x4ndr3.github.io/), while also doing presentations at security conferences (https://github.com/0x4ndr3/Presentations).
His main areas of expertise are reverse engineering, exploit development, and malware development with a focus on EDR bypasses.
When not working, he enjoys playing basketball, tennis, or simply watching Formula1.