Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime

  • Sprocket Security
  • 2025-12-02
  • 34
F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime
  • ok logo

Скачать F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime

Live from Black Hat USA 2025, host Casey Cammilleri sat down with cyber threat-intelligence researcher Megan Squire to break down one of the fastest-growing — and most misunderstood — pillars of modern cybercrime: infostealers.

Megan, a computer-science PhD and seasoned threat-tracking expert, walks us through how infostealers have evolved into a massive underground economy powering identity theft, fraud, and initial-access brokering. She unpacks what happens the moment a machine is infected, why attackers covet browser autofill data and screenshots, and how terabytes of stolen logs expose painful patterns in real victim behavior.

Casey and Megan dig into everything from synthetic log generation to the flood of fake and duplicated logs polluting marketplaces — and why gaming mods and “quick download” culture are driving infections at scale. Megan also shares how red teams can responsibly leverage infostealer artifacts for richer attack paths, sharper assessments, and a much clearer picture of how users actually think and behave.

If you want an unfiltered look at how infostealers are reshaping the threat landscape — and what organizations should be doing right now to stay ahead — this is an episode you won’t want to miss.

00:00 – Welcome to Ahead of the Breach at Black Hat 2025
00:27 – What Megan Is Presenting at DEF CON
01:05 – How Megan Became Obsessed with Infostealers
02:00 – The Scale of the Infostealer Problem
03:15 – Where Infostealer Logs Come From
03:55 – What Researchers Look For in the Data
04:55 – Using Data Science to Analyze Infostealers
06:35 – Why Fake Logs Exist
07:15 – Understanding Infostealer Families & Data Points
08:20 – Building Synthetic Infostealer Logs
09:30 – What the Stolen Data Actually Contains
10:45 – Disturbing Findings in Victim Screenshots
12:15 – How Infostealers Impact Households & Multiple Users
13:10 – Red Team Use Cases for Infostealers
14:25 – Personal Devices vs. Corporate Exposure
15:30 – Demographics of Victims
17:00 – The Human Impact of Infostealers
18:00 – The Most Damaging Data She’s Found
19:30 – Infostealers as a Red Team Intel Source
20:15 – What’s Next in Megan’s Research
21:20 – Who Builds Infostealers & the Economics Behind Them
22:45 – How Valuable Stolen Data Really Is
24:00 – Where to Follow Megan’s Work
24:30 – Casey’s Closing & Sprocket Security Message

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]