Demystifying the Ransomware and IoT Threat
Offered By: LASCON via YouTube
Course Description
Overview
Explore the intricacies of ransomware attacks and IoT-based DDoS threats in this comprehensive LASCON conference talk. Delve into the stages of ransomware attacks, including deployment, installation, encryption, payment, and decryption methods. Gain insights into IoT-based DDoS attacks, examining the breakdown of IoT malware and its potential for future exploitation. Learn about analysis techniques for handling each stage of these cyber threats. Discover the alarming possibility of combined ransomware and IoT attacks becoming a major future security concern. Investigate specific topics such as HDA files, social media tactics, SVG files, and the Mirai botnet. Understand the timeline of these threats and acquire practical advice on securing IoT devices and changing passwords to enhance cybersecurity.
Syllabus
Introduction
HDA Files
Alerting
Attackers
The Host
Social Media
SVG
Red Dot
Grandma
What Sam saw
Special price
Try before buy
Downloading the file
Testing the file
Fake sales reports
Words of advice
IRS Scam
Mirai
How does Mirai work
Mirai source code is public
Dying DDoS attack
Timeline
Securing IoT devices
Changing device passwords
Taught by
LASCON
Related Courses
Comparing WAF and RASP - Why?LASCON via YouTube API Security - Is it the New Application Attack Surface and How to Secure at Enterprise Scale
LASCON via YouTube Privacy Impact Assessments - How Much Privacy Is Enough?
LASCON via YouTube Your Frontier Defense - Understanding Web Application Firewalls
LASCON via YouTube Doing This One Crazy Thing Will Change Your AppSec Program Forever
LASCON via YouTube