Image steganography is becoming the attack vector of choice for cyber criminals. This session explains what Stegware is, how it is being used (anti-virus evasion, covert command & control channels, data exfiltration), how it works (redundant data, LSB injection, ordering), why detection strategies will continue to fail to tackle the problem and how transformation can annihilate it.
Learning Objectives: 1: Learn why steganography is now the attack vector of choice for cybercriminals. 2: Understand precisely how it renders detection-based cybersecurity ineffective. 3: Discover a ground-breaking approach to destroying the steganography threat.