Overview
Watch a 14-minute cybersecurity video where Principal Intelligence Analyst Jeff Felling explains how attackers exploit JavaScript to compromise systems. Discover the mechanics behind JavaScript-based threats like SocGholish and Gootloader, understand how these attacks bypass traditional security measures, and learn practical defense strategies using basic tools like a text editor and Group Policy Objects (GPO). Follow along through key segments covering JavaScript lures, attack mechanics, prevention techniques, and additional mitigation strategies to better protect your organization from these emerging threats. Gain actionable insights into implementing effective security controls while understanding the technical details of how these JavaScript-based attacks operate and succeed in compromising systems.
Syllabus
Intro
Threats using JavaScript lure
Mechanics of the attack
Preventing execution of malicious JavaScript
Other ways to mitigate
Taught by
Red Canary