Explore how attackers employ sophisticated techniques to disguise malware as legitimate files in this 30-minute Black Hat conference talk. Discover the various methods used, including leveraging reliable distribution channels, utilizing stolen certificates, concealing malicious files within legitimate applications, and exploiting system tools for deploying harmful activities. Gain valuable insights from security expert Gerardo Fernandez on the scale and complexity of modern malware deception tactics, enhancing your understanding of cybersecurity threats and defense strategies.
Overview
Syllabus
Deception at Scale: How Malware Abuses Trust
Taught by
Black Hat