Lecture

Cybersecurity: Vulnerabilities and Exploits

Description

This lecture covers the motivation, means, and attacks used by nation agents in cybersecurity, the definition of vulnerabilities and their exploitation, the process from vulnerability discovery to patch deployment, the Zerodium payout for various exploits, sectors of vulnerabilities in ICT, network attack surfaces, DNS poisoning, SQL injection, ransomware attacks, and the CWE Top 25-2020. It also discusses phishing attacks during crises like Covid-19, the human attack surface, and the Social-Engineer Toolkit for social engineering attacks.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.