Tag: conference
-
DEF CON 32 Laundering Money
by
in SecurityNews
Tags: conferenceAuthor/Presenter: Michael Orlitzky Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-laundering-money/
-
Enhance Microsoft security by ditching your hybrid setup for Entra-only join
by
in SecurityNews
Tags: ai, authentication, business, cloud, compliance, conference, credentials, email, firewall, group, identity, infrastructure, intelligence, Internet, microsoft, network, ntlm, office, powershell, risk, service, switch, technology, tool, vpn, windowsArtificial intelligence is top of mind for nearly everything Microsoft is doing these days, but there’s another goal the company would like to see its users strive to attain, one that may not be easily obtained, and that’s to be Entra-joined only.That means no more Active Directory (AD) and no more traditional domain: instead, your…
-
DEF CON 32 Measuring the Tor Network
by
in SecurityNewsAuthors/Presenters: Silvia Puglisi, Roger Dingledine Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-measuring-the-tor-network/
-
DEF CON 32 Exploiting Cloud Provider Vulnerabilities for Initial Access
by
in SecurityNewsAuthor/Presenter: Nick Frichette Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-exploiting-cloud-provider-vulnerabilities-for-initial-access/
-
it-sa 2024: Zwischen KI-gestützter Bedrohungsabwehr und digitaler Identität Von reaktiver Gefahrenabwehr zu proaktivem Risikomanagement
by
in SecurityNewsDie Messehallen in Nürnberg verwandelten sich auch 2024 wieder zum Epizentrum der IT-Sicherheitsbranche. Die it-sa bestätigte einmal mehr ihre Position als Europas führende Fachmesse für Cybersecurity. Die Rekordbeteiligung internationaler Aussteller unterstrich dabei den Stellenwert der Veranstaltung weit über den deutschsprachigen Raum hinaus. Während die Gänge von geschäftigem Treiben erfüllt waren, kristallisierten sich rasch die dominierenden…
-
DEF CON 32 Gotta Cache ‘Em All Bending The Rules Of Web Cache Exploitatio
by
in SecurityNews
Tags: conferenceAuthors/Presenters: Martin Doyhenard Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-gotta-cache-em-all-bending-the-rules-of-web-cache-exploitatio/
-
DEF CON 32 Feet Feud (Another Fascinating DEF CON Game Show)
by
in SecurityNews
Tags: conferenceOur sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-feet-feud-another-fascinating-def-con-game-show/
-
DEF CON 32 HookChain A New Perspective For Bypassing EDR Solutions
by
in SecurityNewsAuthors/Presenters: Helvio Carvalho Junior Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-hookchain-a-new-perspective-for-bypassing-edr-solutions/
-
DEF CON 32 Leveraging Private APNs For Mobile Network Traffic Analysis
by
in SecurityNewsAuthor/Presenter: Aapo Oksman Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-leveraging-private-apns-for-mobile-network-traffic-analysis/
-
Review of Blackhat EMEA 2024
by
in SecurityNewsA review of some interesting briefings and tools found at Blackhat EMEA 2024. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/review-of-blackhat-emea-2024/
-
DEF CON 32 Iconv, Set The Charset To RCE Exploiting glibc To Hack The PHP Engine
by
in SecurityNewsAuthor/Presenter: Charles Fox Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-iconv-set-the-charset-to-rce-exploiting-glibc-to-hack-the-php-engine/
-
DEF CON 32 Hi-Intensity Deconstruction: Chronicles Of A Cryptographic Heist Hi-Intensity Deconstruction: Chronicles of a Cryptographic Heist
by
in SecurityNews
Tags: conferenceAuthors/Presenters: – Babak Javadi, Aaron Levy, Nick Draffen Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-hi-intensity-deconstruction-chronicles-of-a-cryptographic-heist-hi-intensity-deconstruction-chronicles-of-a-cryptographic-heist/
-
DEF CON 32 Fireside Chat The Dark Tangent and National Cyber Director Harry Coker, Jr
by
in SecurityNewsOur sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-fireside-chat-the-dark-tangent-and-national-cyber-director-harry-coker-jr/
-
MSP Update: MSP MA-Themed Conferences Growing in Popularity
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/msp-update-msp-ma-themed-conferences-growing-in-popularity
-
DEF CON 32 MobileMesh RF Network Exploitation Getting the Tea from goTenna
by
in SecurityNewsAuthors/Presenters: Erwin Karincic, Woody Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-mobilemesh-rf-network-exploitation-getting-the-tea-from-gotenna/
-
DEF CON 32 Cultivating M4D SK1LLZ In the DEF CON Community
by
in SecurityNews
Tags: conferenceAuthors/Presenters: Yan Shoshitaishvili, Perri Adams Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-cultivating-m4d-sk1llz-in-the-def-con-community/
-
Merger Mania: MSP MA-Themed Conferences Growing in Popularity
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/analysis/merger-mania-msp-ma-themed-conferences-growing-in-popularity
-
Artificial Intelligence Looms Large at Black Hat Europe
by
in SecurityNewsOpen Questions: What’s Next Killer Use Case? Can Output Be Better Validated?. The topic of AI reality versus hype, as well as what the next killer use cases might be, dominated the wrap-up Locknote panel at this year’s annual Black Hat Europe in London, comprised of conference Review Board members detailing this year’s hot topics,…
-
Thales and Imperva Win Big in 2024
by
in SecurityNews
Tags: access, api, application-security, attack, authentication, banking, business, ciso, cloud, communications, compliance, conference, control, cyber, cybersecurity, data, ddos, defense, encryption, firewall, gartner, group, guide, iam, identity, infosec, insurance, intelligence, malicious, mfa, microsoft, monitoring, privacy, risk, saas, service, software, strategy, threat, usaThales and Imperva Win Big in 2024 madhav Fri, 12/13/2024 – 09:36 At Thales and Imperva, we are driven by our commitment to make the world safer, and nothing brings us more satisfaction than protecting our customers from daily cybersecurity threats. But that doesn’t mean we don’t appreciate winning the occasional award. In the year…
-
DEF CON 32 Using ALPC Security Features To Compromise RPC Services
by
in SecurityNewsAuthors/Presenters: WanJunJie Zhang, Yisheng He Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-using-alpc-security-features-to-compromise-rpc-services/
-
DEF CON 32 Digital Emblems-When Markings Are Required, But You Have No Rattle-Can
by
in SecurityNews
Tags: conferenceAuthors/Presenters: Bill Woodcock Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-digital-emblems-when-markings-are-required-but-you-have-no-rattle-can/
-
Top Tech Conferences Events to Add to Your Calendar in 2025
by
in SecurityNewsA great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our tech events guide. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/top-tech-conferences-events/
-
Black Hat Europe: Chaos Puts Cybersecurity in the Hot Seat
by
in SecurityNewsAccelerationism Drives Questions of Control for Cybersecurity and the Internet. With everything in the world lately seeming to reach end states faster – sometimes referred to as the super cycle or accelerationism – cybersecurity professionals must help their organizations organize to operate, said Black Hat Europe conference founder Jeff Moss at this year’s annual event.…
-
DEF CON 32 Changing Global Threat Landscape
by
in SecurityNewsAuthors/Presenters: Rob Joyce, The Dark Tangent Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-changing-global-threat-landscape/
-
Auguria Streamlines Management of Security Log Data
by
in SecurityNewsAuguria today at the Black Hat Europe conference, in addition to providing five additional integrations with other platforms, revealed it has added an explainability graph capability that makes it simple to understand why log data collected is either irrelevant or warrants further investigation. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/auguria-streamlines-management-of-security-log-data/
-
Black Hat: Latest news and insights
by
in SecurityNewsThe infosecurity world decamps to London this week, with research on vulnerabilities in AI systems at the fore of the latest edition of Black Hat Europe.The four-day program runs from Dec. 9-12, with two-and four-day options of hands-on trainings, but the main event at ExCeL London occurs on Dec. 11 and 12 featuring the latest research, developments,…
-
Black Hat Europe preview: Cryptographic protocol attacks and AI in the spotlight
by
in SecurityNews
Tags: access, ai, application-security, attack, authentication, backdoor, best-practice, computer, conference, control, cybercrime, cybersecurity, data, dns, encryption, exploit, finance, github, government, hacker, healthcare, identity, injection, Internet, LLM, malicious, microsoft, mitigation, office, open-source, radius, RedTeam, risk, service, sophos, technology, tool, training, vulnerability, vulnerability-management, windowsThis week in London Black Hat Europe will feature a diverse range of talks and presentations covering the latest developments in cybersecurity.The opening keynote on Wednesday will be delivered by Frédérick Douzet, a professor of geopolitics at the University of Paris 8, and director of the French Institute of Geopolitics research team. No preview is…
-
DEF CON 32 Fireside Chat The Dark Tangent and DNSA
by
in SecurityNews
Tags: conferenceAuthors/Presenters: Anne Neuberger Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-fireside-chat-the-dark-tangent-and-dnsa/