Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how third-party APIs can be exploited as command and control infrastructure in this eye-opening conference talk from Derbycon 7. Delve into the innovative techniques presented by Stephen Hilt Lord, demonstrating how attackers can leverage seemingly innocuous services to establish covert communication channels with compromised systems. Gain valuable insights into this emerging threat vector and learn about potential defensive strategies to protect against such sophisticated attack methodologies.