March 21, 2024, 4:47 p.m. | Black Hat

Black Hat www.youtube.com

Privacy has become an asset for individuals and a target for cyber-attackers. However, there is an increasing number of instances where privacy by design is not sufficient as a stand-alone principle, in particular, due to the innovativeness of attackers. Have all organizations considered how this "new oil" will motivate cyber-attackers to come up with innovative exploitation scenarios? A new approach consists of pretending to submit an apparently valid data protection request with an attached executable file that represents their data …

address asset attackers cyber data data protection delete design oil organizations privacy privacy by design protection requests target

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States