Загрузка страницы

Who’s in the Browser? Exploring Malicious Browser Extensions & Data Mining

In this webinar, we will explore the usage of browser extensions for malicious purposes and data mining. We will use several real-world examples as case studies to understand how we can find them in a corporate environment, investigate the data used and abused, and finally cover mitigation techniques applicable to firms of all sizes.
Speaker: Eric Poynton, Lead Network Threat Hunter, Awake Security
Eric successfully discovers and investigates compromised IoT, managed, and unmanaged devices in enterprise networks on a near daily basis. Additionally, Eric conducts research and development on methodologies to make Security Operations Center (SOC) teams more accurate and efficient. He is an active Board Member on EC-Council's Security Operations Center Advisory Board and is self-taught in computer science and several programming languages. Eric also graduated with honors from the University of Pittsburgh with a degree focused in Economics.

Видео Who’s in the Browser? Exploring Malicious Browser Extensions & Data Mining канала Awake Security
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
15 мая 2020 г. 11:32:38
00:58:12
Яндекс.Метрика