Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a detailed analysis of the March 2023 "Vulkan files" leak in this DEF CON 31 conference talk that examines Russian state-sponsored cyber operations and their broader implications. Dive into the ambitious programs revealed in the leak, including "Scan-V" and "Amezit," which demonstrate advanced capabilities in infrastructure management and network warfare operations. Compare these revelations with historical precedents such as Russia's SORM framework, China's Great Firewall and Great Cannon programs, and the US's alleged "Quantum" program exposed in the Snowden leaks. Understand how these developments represent a significant evolution in automated exploitation and infrastructure management for cyber operations, while considering the implications of capability proliferation among various state actors. Learn how the systematization and scaling of cyber programs have progressed over the past decade, and gain insights into how similar capabilities might be adopted by other entities moving beyond traditional botnet approaches to more sophisticated distributed systems for intelligence gathering and cyber operations.