Demo: How Instegogram Uses Instagram & Image Steganography for C2 Attacks 🔍
Discover how cyber adversaries exploit Instagram by hiding command-and-control data within images using steganography. Learn the techniques behind this covert communication method and its implications for security.
About this video
Speaker Bio(s):
Amanda absolutely loves malware. She works as a Malware Researcher at Endgame who focuses on dynamic behavior detection both on Windows and OSX platforms.
Hyrum Anderson is a data scientist at Endgame who researches problems in adversarial machine learning and deploys solutions for large scale malware classification. He received a PhD in signal processing and machine learning from the University of Washington.
Daniel Grant is a data scientist at Endgame focusing on behavioral analysis and anomaly detection. He received a MS in Operations Research from Georgia Tech and likes building things that find bad guys when they are being sneaky.
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.
1 user review
Write a Review
User Reviews
0 reviewsBe the first to comment...
Video Information
Total views since publication
User likes and reactions
Video length
Release date
Video definition
About the Channel
Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
This video is currently trending in Turkey under the topic 'g'.
Share This Video
SOCIAL SHAREShare this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!