Deception at Scale - How Malware Abuses Trust
Offered By: Black Hat via YouTube
Course Description
Overview
Explore how attackers employ sophisticated techniques to disguise malware as legitimate files in this 30-minute Black Hat conference talk. Discover the various methods used, including leveraging reliable distribution channels, utilizing stolen certificates, concealing malicious files within legitimate applications, and exploiting system tools for deploying harmful activities. Gain valuable insights from security expert Gerardo Fernandez on the scale and complexity of modern malware deception tactics, enhancing your understanding of cybersecurity threats and defense strategies.
Syllabus
Deception at Scale: How Malware Abuses Trust
Taught by
Black Hat
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera Sicherheit im Internet
openHPI Cybersecurity Fundamentals
Rochester Institute of Technology via edX Network Security
Georgia Institute of Technology via Udacity Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent