Foundations of Data Visualization - Self Paced Online
Learn Generative AI, Prompt Engineering, and LLMs for Free
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore offensive cybersecurity strategies for infiltrating and disrupting ransomware group operations in this DEF CON 32 conference presentation. Learn methodologies for targeting and exploiting vulnerabilities in ransomware web panels and APIs used during data exfiltration. Discover techniques for gaining unauthorized access to command and control centers, gathering intelligence on threat actors, and potentially identifying APT operators. Gain insights into turning defense into offense by targeting the infrastructure ransomware groups depend on for managing their malicious activities, ultimately disrupting their ability to conduct attacks and cause widespread damage across sectors.
Syllabus
DEF CON 32 - Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panel - Vangelis Stykas
Taught by
DEFCONConference