Professional Documents
Culture Documents
College
Ajay,Nitesh,Harshit,Sahil,Pankaj
Agenda
Attacker Ransom
Organisation
Security Loopholes
Unauthorized Access
Credential stuffing
(Credential stuffing attacks can involve the use of botnets that use automated scripts to
try to access an account until a legitimate set of credentials permit the hijacking of at
least one account.)
ry
ito
os
Cloud
p
Re
Git Token Stored Password
R
UBER Developer
BE
$
ac
Token
ub
th
gi
$ 100,000
Attacker
Target Tool
Most countries
have legislation To determine the
notify the right it’s time to audit
around security scope of a
people at the and address
breaches and breach, assemble
you’ll need to right time other
a team of experts
follow them after about a breach vulnerabilities
IR
a breach.
SECURITY
THANK YOU