SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw

Subscribers:
64,200
Published on ● Video Link: https://www.youtube.com/watch?v=CdXZnoOSZmI



Category:
Show
Duration: 47:50
2,445 views
46


Microsoft addressed a critical flaw in the Windows 10 and Windows Server 2016 version of crypt32.dll. Crypt32.dll implements the Windows CryptoAPI, which provides various cryptographic features used by software to verify digital signatures. This flaw was originally discovered by the NSA, but has not been used in attacks yet.

In this webcast, you will learn more about the nature of the vulnerability, how it could be exploited, and current recommendations to implement the patches as efficiently as possible.

Speakers:
Jake Williams @malwarejake
Jake Williams is a computer science and information security expert, U.S. Army veteran, certified SANS instructor, and course author. Jake has over a decade of experience in secure network design, penetration testing, incident response, forensics, and malware reverse engineering space. He is a former Network Exploitation operator with the DoD where he is one of less than 15 people to date who have earned the designation of ‘Master CNE Operator’. Leveraging experience and insight with advanced persistent threats help Jake "think like the attacker" and determine the attacker's likely hiding spots.

Johannes Ullrich @johullrich
Johannes Ullrich, dean of research at the SANS Technology Institute, is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. His research interests include IPv6, network traffic analysis and secure software development. In 2004, Network World named Johannes one of the 50 most powerful people in the networking industry, and SC Magazine named him one of the top five influential IT security thinkers for 2005. Prior to working for SANS, Johannes served as a lead support engineer for a web development company and as a research physicist.




Other Videos By SANS Institute


2020-02-18Learning from Breach Reports to Improve Cross-platform Endpoint Monitoring | SANS SOC Summit 2019
2020-02-13Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
2020-02-10Cloud Security Automation: From Infrastructure to App | SANS Cloud Security Summit 2019
2020-02-03Virtuous Cycles: Rethinking the SOC for Long-Term Success | SANS Security Operations Summit 2019
2020-01-31Build Effective Cybersecurity Team Skills | SANS Team-Based Training
2020-01-30The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 2019
2020-01-27A SOC Technology/Tools Taxonomy – And Some Uses for It | SANS Security Operations Summit 2019
2020-01-24Who Done It? Gaining Visibility and Accountability in the Cloud | SANS Cloud Security Summit
2020-01-22SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 2019
2020-01-17Keep it Flexible: How Cloud Makes it Easier and Harder to Detect Bad Stuff | SANS Cloud Summit
2020-01-15SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
2020-01-13Mental Models for Effective Searching | SANS Security Operations Summit 2019
2020-01-08Lessons Learned Applying ATT&CK-Based SOC Assessments | SANS Security Operations Summit 2019
2020-01-02What you Need To Know About The Critical Citrix Gateway (Netscaler) Vulnerability CVE-2019-19781
2019-12-10Introducing Core NetWars Continuous 2
2019-11-19Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
2019-11-19Including details most readers don't need - Common Cybersecurity Writing Mistakes
2019-11-19Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
2019-11-19Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes
2019-11-19Not using parallel structure - Common Cybersecurity Writing Mistakes
2019-11-19Using more words than necessary - Common Cybersecurity Writing Mistakes



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
crypt32.dll
cryptoapi
PatchTuesday
Microsoft
Windows CryptoAPI