YoVDO

Demystifying the Ransomware and IoT Threat

Offered By: LASCON via YouTube

Tags

LASCON Courses Cybersecurity Courses Ransomware Courses Device Security Courses DDoS Attacks Courses

Course Description

Overview

Explore the intricacies of ransomware attacks and IoT-based DDoS threats in this comprehensive LASCON conference talk. Delve into the stages of ransomware attacks, including deployment, installation, encryption, payment, and decryption methods. Gain insights into IoT-based DDoS attacks, examining the breakdown of IoT malware and its potential for future exploitation. Learn about analysis techniques for handling each stage of these cyber threats. Discover the alarming possibility of combined ransomware and IoT attacks becoming a major future security concern. Investigate specific topics such as HDA files, social media tactics, SVG files, and the Mirai botnet. Understand the timeline of these threats and acquire practical advice on securing IoT devices and changing passwords to enhance cybersecurity.

Syllabus

Introduction
HDA Files
Alerting
Attackers
The Host
Social Media
SVG
Red Dot
Grandma
What Sam saw
Special price
Try before buy
Downloading the file
Testing the file
Fake sales reports
Words of advice
IRS Scam
Mirai
How does Mirai work
Mirai source code is public
Dying DDoS attack
Timeline
Securing IoT devices
Changing device passwords


Taught by

LASCON

Related Courses

Comparing WAF and RASP - Why?
LASCON via YouTube
API Security - Is it the New Application Attack Surface and How to Secure at Enterprise Scale
LASCON via YouTube
Privacy Impact Assessments - How Much Privacy Is Enough?
LASCON via YouTube
Your Frontier Defense - Understanding Web Application Firewalls
LASCON via YouTube
Doing This One Crazy Thing Will Change Your AppSec Program Forever
LASCON via YouTube