
Sign up to save your podcasts
Or
Enjoying the content? Let us know your feedback!
One of the go tools for attackers are Web shells. In this episode we will explore what these are, their background, how they are used and how you can avoid be turned against you.
These deceptive tools bring immense power to the hands of hackers, acting as covert entry door to infiltrate and control the machines that power the Internet, web servers.
Before we get into that, lets review top of mind security news.
- https://www.enisa.europa.eu: NIS visual tool
- https://www.enisa.europa.eu:New NIS directive
https://www.bleepingcomputer.com: Critical bug in OwnCloud file sharing app exposes admin passwords
- https://blog.talosintelligence.com: What is a web shell?
- https://www.nsa.gov: Detect prevent cyber attackers from exploiting web servers via web shell malware
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
Enjoying the content? Let us know your feedback!
One of the go tools for attackers are Web shells. In this episode we will explore what these are, their background, how they are used and how you can avoid be turned against you.
These deceptive tools bring immense power to the hands of hackers, acting as covert entry door to infiltrate and control the machines that power the Internet, web servers.
Before we get into that, lets review top of mind security news.
- https://www.enisa.europa.eu: NIS visual tool
- https://www.enisa.europa.eu:New NIS directive
https://www.bleepingcomputer.com: Critical bug in OwnCloud file sharing app exposes admin passwords
- https://blog.talosintelligence.com: What is a web shell?
- https://www.nsa.gov: Detect prevent cyber attackers from exploiting web servers via web shell malware
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
111,235 Listeners