Chapter

How Hackers Conduct Targeted Attacks
Hackers can spend weeks collecting information about a target organization to gain intelligence on its systems and protocols, and then deploy tools and exploits undetected by the organization's antivirus and security software, enabling them to access sensitive data.
Clips
The speaker describes how his team spends weeks collecting information about their target organization to plan for a cyber attack using undetectable exploits.
10:59 - 16:36 (05:37)
Summary
The speaker describes how his team spends weeks collecting information about their target organization to plan for a cyber attack using undetectable exploits.