Posted on
in Presentations
The presenters will examine a recent case to show how fraudsters and foreign adversaries use phishing redirects, payload drops, crypto-mining, keylogging and bloatware to infiltrate social media, apps and news sites. The goal is to underscore the urgent need to hold to account third-party code suppliers, who know our and our children’s behaviors, preferences, and other sensitive information.
Pre-Requisites: Understanding of website operations. DevSecOps and app/sec experience helpful.
Pre-Requisites: Understanding of website operations. DevSecOps and app/sec experience helpful.
Share With Your Community