Главная
Study mode:
on
1
Introduction
2
HDA Files
3
Alerting
4
Attackers
5
The Host
6
Social Media
7
SVG
8
Red Dot
9
Grandma
10
What Sam saw
11
Special price
12
Try before buy
13
Downloading the file
14
Testing the file
15
Fake sales reports
16
Words of advice
17
IRS Scam
18
Mirai
19
How does Mirai work
20
Mirai source code is public
21
Dying DDoS attack
22
Timeline
23
Securing IoT devices
24
Changing device passwords
Description:
Explore the intricacies of ransomware attacks and IoT-based DDoS threats in this comprehensive LASCON conference talk. Delve into the stages of ransomware attacks, including deployment, installation, encryption, payment, and decryption methods. Gain insights into IoT-based DDoS attacks, examining the breakdown of IoT malware and its potential for future exploitation. Learn about analysis techniques for handling each stage of these cyber threats. Discover the alarming possibility of combined ransomware and IoT attacks becoming a major future security concern. Investigate specific topics such as HDA files, social media tactics, SVG files, and the Mirai botnet. Understand the timeline of these threats and acquire practical advice on securing IoT devices and changing passwords to enhance cybersecurity.

Demystifying the Ransomware and IoT Threat

LASCON
Add to list