Aamir Lakhani - Anubis Clock
From Katie Gentilello
views
comments
From Katie Gentilello
Bad guys live forever, and they adapt and become legends. The threat landscape has completely changed. In the last twelve months we have seen supply chain attacks, an increase in ransomware (with an explosion of cryptocurrency value), and a dedication from attackers against industrial control and IoT systems. Attackers are using more sophisticated methods to engage in cybercrime, hacking, and disruption strategies.
We will explore behind the curtain and show the techniques on how attackers use technology to attack systems, social engineer, and bypass security defense solutions.
We are now studying, working, communicating, and interacting in ways that are different then they have been in the past and attackers are taking advantage of post-pandemic lifestyles. Attackers are targeting VPNs, remote desktop systems, growing more advanced with phishing attacks, targeting home-based IoT systems, remote conferencing applications, and gaming systems.
Let me introduce you to the bad guy and how we are all on borrowed time against the attackers and the Anubis Clock.