February Threat Spotlight: Post-Compromise Attacks π
Highlighting the rise of post-compromise attacks, especially targeting network devices for espionage and cybercrime activities.

Cisco Talos Intelligence Group
165 views β’ Feb 1, 2024

About this video
Weβve been talking quite a bit about networking devices recently and the concern we have about APTs heavily targeting them for espionage, and then cyber criminals following suit and targeting them for things like ransomware. That concern is heavily influenced by the fact that networking devices offer a lot of access to an attacker, and a lot of that access is propelled by post compromise attacks. Joe and Hazel talk about what Talos is seeing in this space, and how the ghost of VPN Filter continues to haunt. We also mention a new report from the Network Resilience Coalition - get that report at https://www.centerforcybersecuritypolicy.org/initiatives/network-resilience-coalition
Plus, get the latest security headlines from Decipher including the Midnight Blizzard attacks, and new research on AI.
Plus, get the latest security headlines from Decipher including the Midnight Blizzard attacks, and new research on AI.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
165
Likes
9
Duration
11:05
Published
Feb 1, 2024
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now