• ClipSaver
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

The Dark Economy of Stolen Cloud Accounts in Phishing Attacks- Alessandro Brucato & Stefano Chierici скачать в хорошем качестве

The Dark Economy of Stolen Cloud Accounts in Phishing Attacks- Alessandro Brucato & Stefano Chierici 11 months ago

video

sharing

camera phone

video phone

free

upload

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
The Dark Economy of Stolen Cloud Accounts in Phishing Attacks- Alessandro Brucato & Stefano Chierici
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: The Dark Economy of Stolen Cloud Accounts in Phishing Attacks- Alessandro Brucato & Stefano Chierici в качестве 4k

У нас вы можете посмотреть бесплатно The Dark Economy of Stolen Cloud Accounts in Phishing Attacks- Alessandro Brucato & Stefano Chierici или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон The Dark Economy of Stolen Cloud Accounts in Phishing Attacks- Alessandro Brucato & Stefano Chierici в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



The Dark Economy of Stolen Cloud Accounts in Phishing Attacks- Alessandro Brucato & Stefano Chierici

Speakers: Alessandro Brucato (@_brucedh) & Stefano Chierici (@darryk10) Alessandro is a Sr. Threat Research Engineer at Sysdig with a background in penetration testing of web and mobile applications. His research includes cloud and container security, with a specific focus on supply chain attacks and cloud platform exploitation. While studying computer science and engineering at Politecnico di Milano, he participated in various bug bounty programs where he received rewards from several large companies. Alessandro is also a contributor to Falco, an incubation-level CNCF project. Stefano Chierici is a Threat Research Lead Manager at Sysdig, where his research focuses on defending containerized and cloud environments from attacks ranging from web to kernel. Stefano is one of the Falco contributors to an incubation-level CNCF project. He studied cyber security in Italy, and before joining Sysdig, he was a pentester. He obtained the OSCP Certification in 2019. He was a security engineer and a red team member. Abstract: Have you ever wondered what lies behind a phishing email? That may be the tip of the iceberg of a more complex dark economy of stolen cloud accounts to abuse email services. Illicitly buying compromised accounts with Amazon Simple Email Service (SES) ready to use is like having access to a phishing weapon that can be immediately leveraged against thousands of users. Join us in an insightful session that will bring light to the lucrative market for Amazon SES Accounts and uncover an offensive operation where the AWS account of a compromised organization is used to send phishing emails. We will share the techniques and tactics of the two threat actors involved: an Indonesian group that took over AWS accounts with Amazon SES enabled, and a French threat actor who later bought these accounts to launch a phishing campaign against French travel card users. Furthermore, we will talk about the multiple impacts of this attack. During the talk, we will reveal new detection methods we employed to detect events that are not logged in CloudTrail, specifically the APIs to send emails. Our procedure involves Amazon Simple Notification Service, CloudWatch and Lambda functions to log email events, configure alerts and implement incident response. Having the complete picture of the dark market and threat actors behind phishing emails in cloud-native environments allows defenders to neutralize those attacks more easily. https://fwdcloudsec.org/

Comments
  • From Intrusion to Insight: Lessons learned from of a month long AWS compromise - Korstiaan Stam 11 months ago
    From Intrusion to Insight: Lessons learned from of a month long AWS compromise - Korstiaan Stam
    Опубликовано: 11 months ago
    1108
  • Is AI Saving or Taking Jobs? Cybersecurity & Automation Impact 3 months ago
    Is AI Saving or Taking Jobs? Cybersecurity & Automation Impact
    Опубликовано: 3 months ago
    79158
  • Cloud-Conscious Tactics, Techniques, and Procedures (TTPs) – An Overview ~ Sebastian Walla 8 months ago
    Cloud-Conscious Tactics, Techniques, and Procedures (TTPs) – An Overview ~ Sebastian Walla
    Опубликовано: 8 months ago
    855
  • Web Server Concepts and Examples 4 years ago
    Web Server Concepts and Examples
    Опубликовано: 4 years ago
    296533
  • Nvidia CEO Jensen Huang Says More Growth Ahead For AI (Full Interview) 1 day ago
    Nvidia CEO Jensen Huang Says More Growth Ahead For AI (Full Interview)
    Опубликовано: 1 day ago
    12365
  • Visualising software architecture with the C4 model - Simon Brown, Agile on the Beach 2019 5 years ago
    Visualising software architecture with the C4 model - Simon Brown, Agile on the Beach 2019
    Опубликовано: 5 years ago
    474930
  • Get into AWS security research as a n00bcake - Daniel Grzelak 11 months ago
    Get into AWS security research as a n00bcake - Daniel Grzelak
    Опубликовано: 11 months ago
    2237
  • Doing bad things for the right reasons: A look at the AWS vulnerability disclosure[…] ~ Ryan Nolette 8 months ago
    Doing bad things for the right reasons: A look at the AWS vulnerability disclosure[…] ~ Ryan Nolette
    Опубликовано: 8 months ago
    173
  • Want to break into Cybersecurity? This is where the most jobs are at! 2 months ago
    Want to break into Cybersecurity? This is where the most jobs are at!
    Опубликовано: 2 months ago
    74942
  • Cybersecurity Architecture: Response 1 year ago
    Cybersecurity Architecture: Response
    Опубликовано: 1 year ago
    75076

Контактный email для правообладателей: [email protected] © 2017 - 2025

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS