YoVDO

Where Should I Host My Malware?

Offered By: Cooper via YouTube

Tags

Hack.lu Courses Cybersecurity Courses Malware Analysis Courses

Course Description

Overview

Explore the cybersecurity risks associated with IoT devices in this 28-minute conference talk from Hack.lu 2016. Discover how cybercriminals exploit poorly configured devices, particularly those with FTP services, to launch attacks. Learn about the SophosLabs research using the "ScanR" framework, which revealed alarming statistics about vulnerable IoT devices. Gain insights into the exploitation of old Internet protocols on modern connected devices and understand the risks for both home and corporate users. Receive recommendations for better protection against these unsophisticated yet dangerous attack scenarios. Presented by Attila Marosi, a Senior Threat Researcher at SophosLabs with extensive experience in information security and international certifications.

Syllabus

Intro
Agenda
Details
Seagate Central
Conclusions


Taught by

Cooper

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy