March 21, 2024, 4:47 p.m. | Black Hat

Black Hat www.youtube.com

Privacy has become an asset for individuals and a target for cyber-attackers. However, there is an increasing number of instances where privacy by design is not sufficient as a stand-alone principle, in particular, due to the innovativeness of attackers. Have all organizations considered how this "new oil" will motivate cyber-attackers to come up with innovative exploitation scenarios? A new approach consists of pretending to submit an apparently valid data protection request with an attached executable file that represents their data …

address asset attackers cyber data data protection delete design oil organizations privacy privacy by design protection requests target

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network Security Engineer

@ Meta | Menlo Park, CA | Remote, US

Security Engineer, Investigations - i3

@ Meta | Washington, DC

Threat Investigator- Security Analyst

@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC

Security Operations Engineer II

@ Microsoft | Redmond, Washington, United States

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States