Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore vulnerabilities in application whitelisting through malware case studies in this conference talk from BSidesLV 2013. Delve into Jared Sperl's analysis of real-world examples, uncovering weaknesses in whitelisting approaches and their exploitation by malicious actors. Gain insights into the limitations of application whitelisting as a security measure and learn about potential attack vectors that bypass these controls. Understand the implications for cybersecurity professionals and organizations relying on whitelisting techniques for protection against malware threats.
Syllabus
BSidesLV 2013 3 2 4 Vulnerabilities in Application Whitelisting Malware Case Studies Jared Sperl