Tag: conference
-
Surviving the Weekly CVE Review Gauntlet
by
in SecurityNewsEvery week, IT and security teams gather be it in a virtual conference room or a cramped huddle space prepared to spend an hour or two wincing at massive lists of “Critical” and “High” severity vulnerabilities. The vulnerability management tools have done their job, dutifully regurgitating every fresh CVE from public feeds. On… Read More…
-
DEF CON 32 Compromising Electronic Logger Creating Truck2Truck Worm
by
in SecurityNewsAuthors/Presenters: Jake Jepson, Rik Chatterjee Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-compromising-electronic-logger-creating-truck2truck-worm/
-
DEF CON 32 Prime Cuts from Hacker History: 40 Years of 31337 Cult Of The Dead Cow And Friends
by
in SecurityNewsAuthors/Presenters: Deth Veggie, Walter J. Scheirer, Patrick “Lord Digital” Kroupa, John Threat, Emmanuel Goldstein, X, TommydCat Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on…
-
Suspected Russian hackers target Ukrainian defense enterprises in new espionage campaign
by
in SecurityNewsUkraine’s military computer emergency response team said the group sent phishing emails disguised as invitations to a legitimate defense conference that took place in Kyiv last week.]]> First seen on therecord.media Jump to article: therecord.media/suspected-russian-hackers-target-ukrainian-enterprises-espionage
-
DEF CON 32 Clash, Burn And Exploit Manipulate Filters To Pwn kernelCTF
by
in SecurityNewsAuthors/Presenters: HexRabbit Chen Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-clash-burn-and-exploit-manipulate-filters-to-pwn-kernelctf/
-
DEF CON 32 Encrypted Newspaper Ads In The 19th Century
by
in SecurityNews
Tags: conferenceAuthors/Presenters: Elonka Dunin, Klaus Schmeh Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-encrypted-newspaper-ads-in-the-19th-century/
-
DEF CON 32 DC101 Panel
by
in SecurityNews
Tags: conferenceOur sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-dc101-panel/
-
Expertenstatements von der Nürnberger Sicherheitsmesse it-sa 2024
by
in SecurityNews
Tags: conference25.830 Fachbesucher und 897 Aussteller: setzte neue Bestmarken als führendes IT-Security-Event in 2024. Doch nicht nur die Nürnberger Messe glänzte, sondern auch die zahlreichen Aussteller warteten mit unzähligen Highlights auf. Zudem hat Netzpalaver einige Statements zur it-sa 2024 eingefangen. Aussteller- und Besucherrekord Vier Messehallen und neue Bestmarken in allen relevanten Dimensionen: Mit 25.830 […] First…
-
DEF CON 32 Bug Hunting In VMware Device Virtualization
by
in SecurityNewsAuthors/Presenters: JiaQing Huang, Hao Zheng, Yue Liu Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-bug-hunting-in-vmware-device-virtualization/
-
DEF CON 32 Nano Enigma Uncovering The Secrets In eFuse Memories
by
in SecurityNews
Tags: conferenceAuthors/Presenters: Michal Grygarek, Martin Petr Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-nano-enigma-uncovering-the-secrets-in-efuse-memories/
-
DEF CON 32 The Way To Android Root: Exploiting Smartphone GPU
by
in SecurityNewsAuthors/Presenters: Xiling Gong, Eugene Rodionov Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-the-way-to-android-root-exploiting-smartphone-gpu/
-
DEF CON 32 Atomic Honeypot A MySQL Honeypot That Drops Shells
by
in SecurityNews
Tags: conferenceAuthors/Presenters: Alexander Rubin, Martin Rakhmanov Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-atomic-honeypot-a-mysql-honeypot-that-drops-shells/
-
First-ever Linux UEFI bootkit turns out to be student project
by
in SecurityNews
Tags: antivirus, attack, authentication, awareness, computer, conference, cybersecurity, firmware, linux, malicious, malware, microsoft, risk, software, technology, threat, training, update, windowsBootkitty, a recently discovered boot-level UEFI rootkit for Linux, was evidently created by students participating in a cybersecurity training program at the South Korean Information Technology Research Institute (KITRI).The bootkit, found and analyzed by researchers from antivirus vendor ESET last week, showed signs of being a proof of concept rather than production-ready malware. Nevertheless, the…
-
First-ever Linux UEFI bootkit turns out to be research project
by
in SecurityNews
Tags: antivirus, attack, authentication, awareness, computer, conference, cybersecurity, firmware, linux, malicious, malware, microsoft, risk, software, technology, threat, training, update, windowsBootkitty, a recently discovered boot-level UEFI rootkit for Linux, was evidently created by students participating in a cybersecurity training program at the South Korean Information Technology Research Institute (KITRI).The bootkit, found and analyzed by researchers from antivirus vendor ESET last week, showed signs of being a proof of concept rather than production-ready malware. Nevertheless, the…
-
AWS launches automated service for incident response
by
in SecurityNewsAWS Security Incident Response, which launched ahead of the re:Invent 2024 conference this week, can automatically triage and remediate events detected in Amazon GuardDuty. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366616525/AWS-launches-automated-service-for-incident-response
-
Sophos zeigt seine modernen Cybersecurity Services auf der it-sa 2024
by
in SecurityNewsFirst seen on infopoint-security.de Jump to article: www.infopoint-security.de/sophos-zeigt-seine-modernen-cybersecurity-services-auf-der-it-sa-2024/a38090/
-
Airlock zeigt auf der it-sa 2024 die (R)evolution der digitalen Identität
by
in SecurityNews
Tags: conferenceFirst seen on infopoint-security.de Jump to article: www.infopoint-security.de/airlock-zeigt-auf-der-it-sa-2024-die-revolution-der-digitalen-identitaet/a38624/
-
Nomios Germany präsentiert auf der it-sa 2024 die neuesten Lösungen im Bereich Cyber- und Netzwerksicherheit
by
in SecurityNewsHackerangriffe u.a. aus Russland, NIS2-Anforderungen und Fachkräftemangel stehen im Spannungsfeld mit künstlicher Threat-Intelligence, automatisierter… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/nomios-germany-praesentiert-auf-der-it-sa-2024-die-neuesten-loesungen-im-bereich-cyber-und-netzwerksicherheit/a38662/
-
Practical fault attacks against SM4
by
in SecurityNewsDuring the Hardwear.io 2022 conference, Nicolas and I presented hardware attacks against the SM4 block cipher. In this post, I’ll give more details ab… First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2022/11/15/practical-fault-attacks-against-sm4/
-
Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light
by
in SecurityNewsIn a presentation at the POC 2024 conference, cybersecurity expert Andrey Konovalov revealed a novel method for covertly disabling the LED indicator of the ThinkPad X230’s webcam, highlighting ongoing vulnerabilities in USB-connected devices. Like many laptops, the ThinkPad X230 has a built-in webcam that connects via USB. During his presentation, Konovalov detailed his journey of…
-
The CSO guide to top security conferences
by
in SecurityNews
Tags: access, cio, cloud, compliance, conference, cyber, cybersecurity, email, germany, guide, identity, india, intelligence, international, jobs, law, resilience, risk, risk-management, threat, tool, training, updateThere is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions answered by experts. Fortunately, plenty of great conferences are coming up in the months ahead.…
-
DEF CON 32 Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panel
by
in SecurityNewsAuthors/Presenters: Vangelis Stykas Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/def-con-32-behind-enemy-lines-engaging-and-disrupting-ransomware-web-panel/
-
The Elephant in AppSec Talks Highlight: Shifting Left Doesn’t Mean Anything Anymore
by
in SecurityNewsDiscover key highlights from Tanya Janca’s talk at The Elephant in AppSec Conference on shifting security to be present throughout the entire Software Development Lifecycle. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/the-elephant-in-appsec-talks-highlight-shifting-left-doesnt-mean-anything-anymore/
-
DEF CON 32 The Rise and Fall of Binary Exploitation
by
in SecurityNewsAuthors/Presenters: Stephen Sims Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/def-con-32-the-rise-and-fall-of-binary-exploitation/
-
Crosspoint to Invest $5M in Each Innovation Sandbox Finalist
by
in SecurityNewsMoney Aims to Simplify Fundraising for RSA Conference Innovation Sandbox Finalists. Finalists selected for RSA Conference’s Innovation Sandbox competition will now each receive a $5 million investment from Crosspoint Capital. Managing Partner Hugh Thompson said this initiative ensures top cybersecurity startups are equipped to handle increased demand and scale effectively. First seen on govinfosecurity.com Jump…
-
DEF CON 32 From Getting JTAG On The iPhone 15 To Hacking Apple’s USB-C Controller
by
in SecurityNewsAuthors/Presenters: Stacksmashing Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/def-con-32-from-getting-jtag-on-the-iphone-15-to-hacking-apples-usb-c-controller/
-
DEF CON 32 Behind Enemy Lines: Going Undercover To Breach LockBit Ransomware Op
by
in SecurityNewsAuthors/Presenters: Jon DiMaggio Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/def-con-32-behind-enemy-lines-going-undercover-to-breach-lockbit-ransomware-op/
-
17 hottest IT security certs for higher pay today
by
in SecurityNews
Tags: access, ai, attack, automation, blockchain, business, ceo, cisa, ciso, cloud, communications, conference, container, control, credentials, cryptography, cyber, cybersecurity, data, defense, detection, encryption, exploit, finance, fortinet, google, governance, group, guide, hacker, incident response, infosec, infrastructure, intelligence, Internet, jobs, monitoring, network, penetration-testing, privacy, reverse-engineering, risk, risk-management, skills, software, technology, threat, tool, training, windowsWith the New Year on the horizon, many IT professionals may be looking to improve their careers in 2025 but need direction on the best way. The latest data from Foote Partners may provide helpful signposts.Analyzing more than 638 certifications as part of its 3Q 2024 “IT Skills Demand and Pay Trends Report,” Foote Partners…
-
Walking the Walk: How Tenable Embraces Its >>Secure by Design<< Pledge to CISA
by
in SecurityNews
Tags: access, application-security, attack, authentication, best-practice, business, cisa, cloud, conference, container, control, credentials, cve, cvss, cyber, cybersecurity, data, data-breach, defense, exploit, Hardware, identity, infrastructure, injection, Internet, leak, lessons-learned, mfa, open-source, passkey, password, phishing, risk, saas, service, siem, software, sql, strategy, supply-chain, theft, threat, tool, update, vulnerability, vulnerability-managementAs a cybersecurity leader, Tenable was proud to be one of the original signatories of CISA’s “Secure by Design” pledge earlier this year. Our embrace of this pledge underscores our commitment to security-first principles and reaffirms our dedication to shipping robust, secure products that our users can trust. Read on to learn how we’re standing…
-
UK Launches AI Security Lab to Combat Russian Cyber Threats
by
in SecurityNewsUK Minister Pat McFadden will say in a speech at a NATO conference that adversaries are looking at using AI on the physical and cyber battlefield First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/uk-ai-security-lab-russia/