Where Should I Host My Malware?
Offered By: Cooper via YouTube
Course Description
Overview
Explore the cybersecurity risks associated with IoT devices in this 28-minute conference talk from Hack.lu 2016. Discover how cybercriminals exploit poorly configured devices, particularly those with FTP services, to launch attacks. Learn about the SophosLabs research using the "ScanR" framework, which revealed alarming statistics about vulnerable IoT devices. Gain insights into the exploitation of old Internet protocols on modern connected devices and understand the risks for both home and corporate users. Receive recommendations for better protection against these unsophisticated yet dangerous attack scenarios. Presented by Attila Marosi, a Senior Threat Researcher at SophosLabs with extensive experience in information security and international certifications.
Syllabus
Intro
Agenda
Details
Seagate Central
Conclusions
Taught by
Cooper
Related Courses
Modern Pentest Tricks for Faster, Wider, Greater EngagementsCooper via YouTube Take Your Path Normalization Off and Pop 0days Out
Cooper via YouTube Finding the Best TI Provider for a Specific Purpose
Cooper via YouTube Make ARM Shellcode Great Again
Cooper via YouTube Digital Safety for Politically Vulnerable Organizations
Cooper via YouTube