Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical role of trust in business and cybersecurity through this 48-minute Black Hat conference talk. Delve into the analysis and exploitation of trust relationships between code, platforms, developers, and organizations. Learn about the definition and root of trust, networking, exploitation techniques, and real-world examples. Discover how unit tests and command and control systems can be leveraged in attacks. Gain insights into initial foothold strategies, backdoor techniques, and mitigation measures. Enhance your understanding of trust-based vulnerabilities and their impact on organizational security.