Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn about a comprehensive five-year cybersecurity campaign in this 35-minute DEF CON 33 conference talk that exposes how China-based threat actors have systematically targeted enterprise firewall infrastructure across multiple vendors. Discover the complete timeline and methodology of persistent attacks against perimeter network defenses, including detailed analysis of custom exploits and bespoke malware specifically engineered to compromise enterprise firewalls in customer environments. Examine the sophisticated tactics, techniques, and procedures employed by well-resourced adversaries who have maintained cyclical pressure against major network security providers throughout the industry. Explore the countermeasures developed by firewall vendors to combat these threats, including technical deep-dives into specific exploits and the malware payloads deployed within compromised firewall systems. Understand how this campaign represents a broader industry-wide challenge that affects most large network security providers, requiring collective defense strategies rather than isolated vendor responses. Gain insights into the urgent need for collaborative approaches to cybersecurity defense when facing persistent, high-volume attacks from nation-state level adversaries targeting critical network infrastructure components.
Syllabus
DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew Brandt
Taught by
DEFCONConference