使用Player FM应用程序离线!
值得一听的播客
赞助


214 - What are polyglot files and how bad are they?
Manage episode 471347210 series 2872461
Enjoying the content? Let us know your feedback!
In this episode, we’ll be exploring a particularly intriguing file types: polyglot files. These digital shapeshifters have become a powerful tool in the arsenal of cyber attackers, capable of bypassing security measures, confusing systems, and delivering malicious payloads in ways that are both creative and devastating.
Over the next 20 to 30 minutes or so, we’ll break down what polyglot files are, how they work, and why they’re so dangerous. We’ll also examine some real-world examples where polyglot files were used in cyberattacks. We will reference the MITRE ATT&CK framework to understand how these techniques fit into the broader landscape of adversarial tactics. Finally, we’ll discuss mitigation strategies and close with a cybersecurity myth that needs busting
Before we dive into the main topic, lets glance what is happening on the security front:
- UEFI Secure Boot bypass vulnerability
- https://en.wikipedia.org: Polyglot
- https://attack.mitre.org: Masquerading
- https://arxiv.org: Where the Polyglots Are: How Polyglot Files Enable Cyber Attack Chains and Methods for Detection & Disarmament
- https://medium.com: Polyglot Files A Hackers Best Friend
- https://www.bleepingcomputer.com: New polyglot malware hits aviation, satellite communication firms
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
217集单集
Manage episode 471347210 series 2872461
Enjoying the content? Let us know your feedback!
In this episode, we’ll be exploring a particularly intriguing file types: polyglot files. These digital shapeshifters have become a powerful tool in the arsenal of cyber attackers, capable of bypassing security measures, confusing systems, and delivering malicious payloads in ways that are both creative and devastating.
Over the next 20 to 30 minutes or so, we’ll break down what polyglot files are, how they work, and why they’re so dangerous. We’ll also examine some real-world examples where polyglot files were used in cyberattacks. We will reference the MITRE ATT&CK framework to understand how these techniques fit into the broader landscape of adversarial tactics. Finally, we’ll discuss mitigation strategies and close with a cybersecurity myth that needs busting
Before we dive into the main topic, lets glance what is happening on the security front:
- UEFI Secure Boot bypass vulnerability
- https://en.wikipedia.org: Polyglot
- https://attack.mitre.org: Masquerading
- https://arxiv.org: Where the Polyglots Are: How Polyglot Files Enable Cyber Attack Chains and Methods for Detection & Disarmament
- https://medium.com: Polyglot Files A Hackers Best Friend
- https://www.bleepingcomputer.com: New polyglot malware hits aviation, satellite communication firms
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
217集单集
所有剧集
×


1 213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them 50:53






欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。