Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the motivation, means, and attacks used by nation agents in cybersecurity, the definition of vulnerabilities and their exploitation, the process from vulnerability discovery to patch deployment, the Zerodium payout for various exploits, sectors of vulnerabilities in ICT, network attack surfaces, DNS poisoning, SQL injection, ransomware attacks, and the CWE Top 25-2020. It also discusses phishing attacks during crises like Covid-19, the human attack surface, and the Social-Engineer Toolkit for social engineering attacks.