yeah seems like getting info through a proxy where they just do file/packet analysis would be relatively easy, as he explains just mask the data and re-assemble it in the browser-pc lol "we will release an open-source attack toolkit for researchers and red teams to test these attacks on their security solutions and better understand their security exposure." thats pretty cool
@07markus2 күн бұрын
that`s why the answer to this is "Multilayer security", not only traffic to and from browser but also endpoint itself.
@saultube443 күн бұрын
People code like maniacs, generate lots of bugs, screws up the hierarchy of data and code, or just padding, unfinish code structures, etc. A lot Programs/Apps these days are a big messy spaghetti that nobody wants to debug with patient, way too many errors to fix. And nobody talks about this
@PropheticShadeZ3 күн бұрын
They dont want to pay for no change to their product Security is only a concern when something breaks
@saultube443 күн бұрын
@@PropheticShadeZ Yes, the bottom line first; what a toxic culture
@effsixteenblock503 күн бұрын
The SWG lets all these attacks through but what about the client browser itself? Surely some of them could be detected?
@bhnjhbjhbkgkkvhnhmbm3 күн бұрын
And as soon as the assembled malicious file is saved, the EDR quarantines it
@batangx6592 күн бұрын
I think you are missing the point. There are a lot of things that it can carry ;)
@Mr.Viking4 күн бұрын
Great talk 👍
@ImKidriani4 күн бұрын
❤❤
@5m00v3 күн бұрын
When he says the code is open source, is he just saying the browser.security page is public? Lol
@the_sandman003 күн бұрын
This is kind of industry changing research. 🥸
@LostInTheRush3 күн бұрын
What are you talking about? People have been doing this for 10+ years.