To watch the video recording, click the button below and complete registration
Watch nowMOVEit or Lose it: Supply Chain Threats are Cloud Security Risks
Even months later, organizations and news outlets are still discussing the MOVEit Transfer exploitation -- and rightfully so! Third party software and dependencies always pose a risk to your security stack and especially your cloud environments.
Watch John pull back the curtain on the complete MOVEit attack chain, from the initial SQL injection weakness to the deserialization vulnerability, and dig through the post-exploitation code to examine how the threat actors exfiltrated data from Azure components. As well as explores what current threats might still be on the horizon.
Speakers
John Hammond is a cybersecurity researcher, educator and content creator. As part of the Research & Development Threat Operations team at Huntress, John spends his days analyzing malware and making hackers earn their access. Previously, as a Department of Defense Cyber Training Academy instructor, he taught the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages and the adversarial mindset. He has developed training material and information security challenges for events such as PicoCTF and competitions at DEFCON US. John speaks at security conferences such as BsidesNoVA, to students at colleges such as the US Naval Academy, and other online events including the SANS Holiday Hack Challenge/KringleCon. He is an online YouTube personality showcasing programming tutorials, CTF video walkthroughs and other cyber security content.
Didn't find what you were looking for?
Check out our live training sessions for Wiz users (requires login)