March 27, 2024, 4:30 p.m. | Black Hat

Black Hat www.youtube.com

Cloud synchronized browser settings provide consistent configurations between devices. A considerable number of these features directly affect the security of the browser. If a cloud-synched browser session is compromised, it is trivial to extract passwords and credit card information, but it can also be leveraged in unexpected ways such as forcing users to browse to malicious URLs. This functionally allows you to bypass the social engineering portion of cracking the perimeter by guaranteeing your malicious links are always clicked. However, …

browser can card cloud compromised credit credit card devices extract features information passwords perimeter security session settings

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior InfoSec Manager - Risk and Compliance

@ Federal Reserve System | Remote - Virginia

Security Analyst

@ Fortra | Mexico

Incident Responder

@ Babcock | Chester, GB, CH1 6ER

Vulnerability, Access & Inclusion Lead

@ Monzo | Cardiff, London or Remote (UK)

Information Security Analyst

@ Unissant | MD, USA