From Leak to Breach: How Hackers Use AI to Exploit Stolen Source Code


Posted on in Presentations

AI is revolutionizing cyberattacks, enabling hackers to swiftly analyze years of leaked source code, turning systemic risk into immediate threats. This session will showcase AI-powered tools used to exploit code and share defense strategies to protect against these evolving risks. Witness firsthand how hackers gain an AI advantage—and how defenders can fight back.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Sherri Davidoff

Speaker

CEO, LMG Security

Matt Durrin

Speaker

Director of Training & Research, LMG Security


Share With Your Community