In another one, tracing from the beginning and from the end allowed us to find a piece of two missing in between them. In one case of self-spreading malware, we made our way close enough to “Patient Zero”, stopping just short of reaching the final (or perhaps initial?) stop. A tale about offensive protection without breaking the law and 20 years of tracking criminals using an industry creative approach. Welcome to: Booby-trapping the hacker’s tools. Isn’t this approach better than the mass surveillance alternative? Yet our work consists in finding loopholes and gaps in the law and in the criminal’s architecture that would make it easier, or even possible, for us to track these individuals and pass the results to the law enforcement for legal action. We are the janitors of the Internet and we should be proud of that. We, as an industry, have to follow the law. Additionally, CaaS (Crime as a Service) is being offered in darknet and underground markets and our critical infrastructure systems are more interconnected than ever. We have insecure IOTs numbering in the millions and growing, script kiddies utilizing phishing kits, and CEO fraud is on the rise. This keynote will highlight the challenges we are facing. When we agree on that – even if it’s controversial – we might need to adapt to a more aggressive and offensive approach if we want to make a change and win the battle. When we “Go back to the roots”, we soon realize that both the rules of the game and the threat landscape have changed. The security industry as a whole is down played in numbers and the odds are against us that we will be able to prevent these attacks from happening in the future.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |