התחל במצב לא מקוון עם האפליקציה Player FM !
214 - What are polyglot files and how bad are they?
Manage episode 471347210 series 2872461
Enjoying the content? Let us know your feedback!
In this episode, we’ll be exploring a particularly intriguing file types: polyglot files. These digital shapeshifters have become a powerful tool in the arsenal of cyber attackers, capable of bypassing security measures, confusing systems, and delivering malicious payloads in ways that are both creative and devastating.
Over the next 20 to 30 minutes or so, we’ll break down what polyglot files are, how they work, and why they’re so dangerous. We’ll also examine some real-world examples where polyglot files were used in cyberattacks. We will reference the MITRE ATT&CK framework to understand how these techniques fit into the broader landscape of adversarial tactics. Finally, we’ll discuss mitigation strategies and close with a cybersecurity myth that needs busting
Before we dive into the main topic, lets glance what is happening on the security front:
- UEFI Secure Boot bypass vulnerability
- https://en.wikipedia.org: Polyglot
- https://attack.mitre.org: Masquerading
- https://arxiv.org: Where the Polyglots Are: How Polyglot Files Enable Cyber Attack Chains and Methods for Detection & Disarmament
- https://medium.com: Polyglot Files A Hackers Best Friend
- https://www.bleepingcomputer.com: New polyglot malware hits aviation, satellite communication firms
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
223 פרקים
Manage episode 471347210 series 2872461
Enjoying the content? Let us know your feedback!
In this episode, we’ll be exploring a particularly intriguing file types: polyglot files. These digital shapeshifters have become a powerful tool in the arsenal of cyber attackers, capable of bypassing security measures, confusing systems, and delivering malicious payloads in ways that are both creative and devastating.
Over the next 20 to 30 minutes or so, we’ll break down what polyglot files are, how they work, and why they’re so dangerous. We’ll also examine some real-world examples where polyglot files were used in cyberattacks. We will reference the MITRE ATT&CK framework to understand how these techniques fit into the broader landscape of adversarial tactics. Finally, we’ll discuss mitigation strategies and close with a cybersecurity myth that needs busting
Before we dive into the main topic, lets glance what is happening on the security front:
- UEFI Secure Boot bypass vulnerability
- https://en.wikipedia.org: Polyglot
- https://attack.mitre.org: Masquerading
- https://arxiv.org: Where the Polyglots Are: How Polyglot Files Enable Cyber Attack Chains and Methods for Detection & Disarmament
- https://medium.com: Polyglot Files A Hackers Best Friend
- https://www.bleepingcomputer.com: New polyglot malware hits aviation, satellite communication firms
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
223 פרקים
כל הפרקים
×
1 221 - FBI’s 2024 Annual Internet Crime Report 32:16

1 220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces 32:41

1 218 - Fast Flux-The Cybercriminal's Hide and Seek 26:49

1 217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2 28:32

1 216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1 32:15

1 215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks 37:04

1 214 - What are polyglot files and how bad are they? 31:58

1 213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them 50:53

1 212 - Behind the login Screen - Understanding OS Authentication - Part 2 49:05

1 211 - Behind the login Screen: Understanding OS Authentication - Part 2 35:22

1 210 - Adversarial Misuse of Generative AI 50:21

1 208 - Lets Encrypt on shortening certification lifetime to just 6 days! 32:38

1 207 - Microsoft Windows Actively Exploited Vulnerabilities 37:47

1 206 - Cybersecurity Resolutions for 2025 - Best Practices for Individuals and Organizations 32:56

1 205 - Vulnerability Scanners-The Heroes and Hidden Limits of Cybersecurity 28:48

1 204 - Recap of the best episodes of 2024 1:31:38

1 203 - Tips In Securing Your Organization - When the Security Team is Away 22:04


1 201 - Digital Breadcrumbs - Tracing the Hidden Trails for Evidence 30:20

1 200 - Incident Response Playbook- Turning Chaos into Control 34:09

1 199 - FBI-CISA-NSA's list of the most exploited vulnerabilities of 2023 35:37


1 197 - Advanced Malware evasion Techniques And Their Counter Measures 27:34

1 196 - What are Shared Fate Model and Trust Anchors? 28:46

1 195 - Top Common Password Attacks and How to Defend Against Them 38:15

ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.