Image steganography is becoming the attack vector of choice for cyber criminals. This session explains what Stegware is, how it is being used (anti-virus evasion, covert command & control channels, data exfiltration), how it works (redundant data, LSB injection, ordering), why detection strategies will continue to fail to tackle the problem and how transformation can annihilate it.
1: Learn why steganography is now the attack vector of choice for cybercriminals.
2: Understand precisely how it renders detection-based cybersecurity ineffective.
3: Discover a ground-breaking approach to destroying the steganography threat.