Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Delve into the intricacies of the Neutrino Exploit Kit in this 55-minute conference talk from BSidesLV 2016. Explore the inner workings, vulnerabilities, and potential threats associated with this malicious software toolkit. Gain valuable insights into cybersecurity challenges and defense strategies as the speaker uncovers the "naughty bits" of Neutrino EK, providing a comprehensive understanding of its mechanisms and impact on digital security landscapes.