YoVDO

Freaky Leaks from a Chic Geek

Offered By: Security BSides London via YouTube

Tags

Security BSides Courses Cybersecurity Courses Threat Intelligence Courses Data Protection Courses

Course Description

Overview

Explore the world of data leaks and cybersecurity vulnerabilities in this 29-minute conference talk from Security BSides London. Delve into the pervasive nature of leakware, leaked databases, and leaky applications, examining their impact on systems, businesses, infrastructure, and individuals. Learn about the challenges of sharing threat intelligence across different legal and regulatory landscapes. Discover how to identify and protect against easy-to-exploit systems using the OWASP Top Ten 2017 and information gathering techniques. Gain insights into the underground leak economy and the value of compromised data. Examine real-life examples of vulnerable assets from various industries, including banking, IT, multimedia, and energy sectors. Acquire practical strategies for protection, information sharing, and justifying security testing budgets to enhance your organization's proactive security posture.

Syllabus

Intro
Connectivity
Challenges
Threat landscape
Curiosity
Information Intelligence
Luxembourg Search
Security Challenges
WASP
Information Gathering
The Problem
Expired Certificates
Expired SSL Certificates
Not Contacted
DNC
European Police
Filezilla
Twitter
The Leak Economy
Bank
Power Station
extortion
ransomware
sharing information
Shamoon II
Bad Sharing
Leaks
Cat


Taught by

Security BSides London

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network