Attacks on Rutube Live issues, postmortem analysis

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=em1r-Zzrlic



Duration: 21:47
0 views
0


Positive Hack Days - PHDays 11 - English Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2024-01-26Infosec trends
2024-01-26Cyberbattle day one results Conversation with The Standoff organizers
2024-01-26NetworkPolicy, a native Kubernetes firewall
2024-01-26Cyberbattle preliminary results
2024-01-26Investigation of information security incidents caused by employees how to detect and catch
2024-01-26API keys storage
2024-01-26Cyberexercises on Positive Technologies infrastructure How to hack a cybersecurity company
2024-01-26Assessing the maturity of SOC processes based on MITRE ATT&CK
2024-01-26IR revolution a new approach to investor relations
2024-01-26On premise SOC how to build it without pain
2024-01-26Attacks on Rutube Live issues, postmortem analysis
2024-01-26IT and infosec market analytics new time, new opportunities
2024-01-26Open Source finals
2024-01-26Opening of the PHDays 11 forum
2024-01-26Opening POSIDev organizers' welcome speech
2024-01-25Кризис время возможностей для MSSP
2024-01-25Двухфакторная аутентификация что, зачем, почему
2024-01-25Новый подход к автоматизированной генерации эксплойтов для больших веб приложений
2024-01-25Кризис время возможностей для СОИ, специализированной облачной инфраструктуры
2024-01-25Подведение итогов конкурса open source проектов Образование в сфере ИБ
2024-01-25Революция в IR новый подход к работе с инвесторами



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering