Learning how invisible layers can trick users into clicking buttons they never intended to touch.
Analyzing how compromised enterprise dashboards can be used to exfiltrate sensitive data, similar to recent high-profile breaches.
While traditional hacking often conjures images of green text on a black terminal, this session explores how attackers manipulate the visual elements we trust. Key topics include: