AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Exploring Telemetry Collection and Security Implications
This chapter delves into the workings of a keystroke-capturing implant used by cyber attackers, highlighting technical demonstrations with Vim and Perl. It also invites audience participation through a Twitter poll regarding the ethics of EDR vendors using similar implants for data collection.