AI Engineer - Learn how to integrate AI into software applications
Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Delve into the world of mobile espionage with this 45-minute Black Hat conference talk. Explore the technical capabilities of mobile attacks used for espionage, focusing on Pegasus, a lawful intercept product. Examine its features and exploit chain, and learn how researchers discovered and tracked the developer's infrastructure before the attack. Gain insights into how a sample of the elusive malcode was caught being used against a prominent human rights defender. Presented by Andrew Blaich, Max Bazaliy, and Seth Hardy, this briefing offers a comprehensive look at nation-state level attacks in the mobile landscape.
Syllabus
Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks
Taught by
Black Hat