How Blackhats do it


Details
Join us for an exclusive event where we'll delve into the world of cyber
threats and explore how the "blackhats" operate. This meetup is designed
to provide a unique perspective on the tactics, techniques, and procedures (TTPs) used by malicious actors to compromise security systems, steal sensitive data, and conduct phishing campaigns.
Understanding the Threat Landscape
In this event, we'll examine the various methods used by blackhats to:
-
Extract card data through skimming devices and point-of-sale hacking
-
Create and distribute malware using zero-day exploits and code obfuscation techniques
-
Conduct sophisticated phishing campaigns leveraging social engineering tactics
-
Identify vulnerabilities in web applications and exploit them to gain unauthorized access
Expert Insights
Our speaker, Conor Rynne, is a seasoned cybersecurity expert with
extensive experience in understanding the tactics used by blackhats. They
will share their knowledge on the latest blackhat strategies and provide
insights into how these threats are evolving.
Agenda:
-
Introduction to the world of cyber threats
-
Card data extraction methods
-
Malware creation and distribution techniques
-
Advanced phishing tactics and social engineering strategies
-
The evolving threat landscape: what we can learn from blackhat operations
Who Should Attend:
Cybersecurity professionals, IT managers, and individuals interested in
staying ahead of emerging threats. This event is a unique opportunity to
learn from an expert, network with peers, and gain valuable insights into
the world of cybercrime.
Date: 29/11/2024
Time: 19:00-21:00
Location: TBC
Don't miss this chance to understand the tactics used by cybercriminals
and enhance your cybersecurity skills. Register now for "How the Blackhats Do It"!

How Blackhats do it