February Threat Spotlight: Post-Compromise Attacks πŸ”

Highlighting the rise of post-compromise attacks, especially targeting network devices for espionage and cybercrime activities.

February Threat Spotlight: Post-Compromise Attacks πŸ”
Cisco Talos Intelligence Group
165 views β€’ Feb 1, 2024
February Threat Spotlight: Post-Compromise Attacks πŸ”

About this video

We’ve been talking quite a bit about networking devices recently and the concern we have about APTs heavily targeting them for espionage, and then cyber criminals following suit and targeting them for things like ransomware. That concern is heavily influenced by the fact that networking devices offer a lot of access to an attacker, and a lot of that access is propelled by post compromise attacks. Joe and Hazel talk about what Talos is seeing in this space, and how the ghost of VPN Filter continues to haunt. We also mention a new report from the Network Resilience Coalition - get that report at https://www.centerforcybersecuritypolicy.org/initiatives/network-resilience-coalition

Plus, get the latest security headlines from Decipher including the Midnight Blizzard attacks, and new research on AI.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

165

Likes

9

Duration

11:05

Published

Feb 1, 2024

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.

Trending Now