Who’s in the Browser? Exploring Malicious Browser Extensions & Data Mining
In this webinar, we will explore the usage of browser extensions for malicious purposes and data mining. We will use several real-world examples as case studies to understand how we can find them in a corporate environment, investigate the data used and abused, and finally cover mitigation techniques applicable to firms of all sizes.
Speaker: Eric Poynton, Lead Network Threat Hunter, Awake Security
Eric successfully discovers and investigates compromised IoT, managed, and unmanaged devices in enterprise networks on a near daily basis. Additionally, Eric conducts research and development on methodologies to make Security Operations Center (SOC) teams more accurate and efficient. He is an active Board Member on EC-Council's Security Operations Center Advisory Board and is self-taught in computer science and several programming languages. Eric also graduated with honors from the University of Pittsburgh with a degree focused in Economics.
Видео Who’s in the Browser? Exploring Malicious Browser Extensions & Data Mining канала Awake Security
Speaker: Eric Poynton, Lead Network Threat Hunter, Awake Security
Eric successfully discovers and investigates compromised IoT, managed, and unmanaged devices in enterprise networks on a near daily basis. Additionally, Eric conducts research and development on methodologies to make Security Operations Center (SOC) teams more accurate and efficient. He is an active Board Member on EC-Council's Security Operations Center Advisory Board and is self-taught in computer science and several programming languages. Eric also graduated with honors from the University of Pittsburgh with a degree focused in Economics.
Видео Who’s in the Browser? Exploring Malicious Browser Extensions & Data Mining канала Awake Security
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Awake integrates with Splunk Adaptive Response](https://i.ytimg.com/vi/Fi5F_SNgeps/default.jpg)
![IoT Security in 2019: Risks and Cyber Resilience](https://i.ytimg.com/vi/ZJlaf0i1zkg/default.jpg)
![CISO Perspectives: People are the Perimeter – Managing Risk in a Zero Trust World](https://i.ytimg.com/vi/URZGyUt8Yvo/default.jpg)
![How to Detect and Contain Maze Ransomware Before It Wreaks Havoc](https://i.ytimg.com/vi/r0FTpIfa59U/default.jpg)
![CISO Perspectives: Preventing Ransomware While Prepping for the Worst](https://i.ytimg.com/vi/r0LCiSOPNb8/default.jpg)
![How do we Threat Hunt for User Agent Spoofing using The Awake Security Platform?](https://i.ytimg.com/vi/yo2aYchX67c/default.jpg)
![Encrypted Traffic Analysis (Part 1): Detect, Don’t Decrypt](https://i.ytimg.com/vi/DhJ_h4fa8PA/default.jpg)
![The Power of Integrated Network & Endpoint Detection and Response](https://i.ytimg.com/vi/ETIyaq4o-Wc/default.jpg)
![Visualize the Entire Kill Chain & Kiss Alert Fatigue Goodbye](https://i.ytimg.com/vi/xGl06wJRMNE/default.jpg)
![Security for the New Network SaaS, Cloud, IoT, Core, Perimeter,… Oh My!](https://i.ytimg.com/vi/iU9NjNM7mMA/default.jpg)
![The final wrap-up conversation on cybersecurity with Gary Golomb.](https://i.ytimg.com/vi/vGd4zHgTx7c/default.jpg)
![Awake Security Platform: Technology Walkthrough](https://i.ytimg.com/vi/6BK3STEusgg/default.jpg)
![Evaluating Network Traffic Analysis Systems – Requirements and Challenges](https://i.ytimg.com/vi/PY13tgYnu0s/default.jpg)
![Network Traffic Analysis Customer Testimonial - John Chesson](https://i.ytimg.com/vi/zkZzcKaJ5BM/default.jpg)
![AI For Security: What can we Learn from the Human Brain?](https://i.ytimg.com/vi/g9vXkz94Wxk/default.jpg)
![IoT Security Research](https://i.ytimg.com/vi/aAvDkkYK3kA/default.jpg)
![How to think about co-founders?](https://i.ytimg.com/vi/QesqHLu2w8g/default.jpg)
![CISO Perspectives: Ethical and Policy Implications for AI in Cyber Security](https://i.ytimg.com/vi/EQxRSP9KfQE/default.jpg)
![Awake Personal Email Phishing Use Case](https://i.ytimg.com/vi/SlrWaiCiBKU/default.jpg)
![(JA)3 Reasons to Rethink Your Encrypted Traffic Analysis Strategies](https://i.ytimg.com/vi/X_kK1aYkLNk/default.jpg)
![Identifying how a PlayStation device associates with other devices on your corporate network.](https://i.ytimg.com/vi/q2Jzh57uziQ/default.jpg)