POPULARITY
In this Risky Business News sponsor interview, Catalin Cimpanu talks with Thinkst CTO Marco Slaviero about a concept called Defending off the Land, a way to detect attacks and even deceive and frustrate attackers. Show notes Defending off the land: Agentless defenses available today Assortment of scripts and tools for our Blackhat EU 2024 talk Thinkst Citation Create a Canarytoken. Deploy it somewhere.
Beskrivelse: I episode 1 har vi vært så heldige å få besøk av Karim El-Melhaoui som jobber som sikkerhetsarkitekt hos oljefondet (NBIM). Vi diskuterer hvorfor Security Champions har vokst frem, hvorfor de trengs og hvordan man innfører Security Champions i egen bedrift/organisasjon. Teknisk nivå: 1/5 Overordnet agenda med tidspunkt: 00:00 - 08:56: Introduksjon av deltakere/tema, definere og forklare "Security Champions" 08:45 - 21:40: Hvorfor Security Champions? 21:40 - 23:28: Kilder og mer informasjon, avslutning Kilder som nevnes/anbefales: - Sikkerhetskonferanser om Security Champions på Youtube, eksempelvis https://www.youtube.com/watch?v=gpGl3guuyDw&t=1648s (Blackhat EU, 2018) - https://owasp.org/ (The Open Web Application Security Project) - The Unicorn Project (Gene Kim, 2019) - The Phoenix Project (Gene Kim, 2014) Medvirkende: - Olav Østbye, Cloudworks - Olav Bø-Hernes, Bouvet - Oleg Andrushko, The Cloud People - Karim El-Melhaoui, Oljefondet (NBIM) Ris og ros? Gi oss gjerne en tilbakemelding, både positive og forbedringspotensiale. Dette kan du gjøre via kontakt oss i menyen på nettsiden vår, CastO3.no Forslag til nye episoder? Skulle du ha noen ønsker/forslag til nye episoder så ta gjerne kontakt med oss på den måten du selv ønsker, se nettsiden vår CastO3.no
I episode 1 har vi vært så heldige å få besøk av Karim El-Melhaoui som jobber som sikkerhetsarkitekt hos oljefondet (NBIM). Vi diskuterer hvorfor Security Champions har vokst frem, hvorfor de trengs og hvordan man innfører Security Champions i egen bedrift/organisasjon. Du kan spille av episoden direkte i nettleseren (se avspillingsboks under bildet) eller spill av episoden på en av plattformene lenket nedenfor (ikoner). Teknisk nivå: 1/5 Overordnet agenda med tidspunkt: 00:00 - 08:56: Introduksjon av deltakere/tema, definere og forklare "Security Champions" 08:45 - 21:40: Hvorfor Security Champions? 21:40 - 23:28: Kilder og mer informasjon, avslutning Kilder som nevnes/anbefales: - Sikkerhetskonferanser om Security Champions på Youtube, eksempelvis https://www.youtube.com/watch?v=gpGl3guuyDw&t=1648s (Blackhat EU, 2018) - https://owasp.org/ (The Open Web Application Security Project) - The Unicorn Project (Gene Kim, 2019) - The Phoenix Project (Gene Kim, 2014) Medvirkende: - Olav Østbye, Cloudworks - Olav Bø-Hernes, Bouvet - Oleg Andrushko, The Cloud People - Karim El-Melhaoui, Oljefondet (NBIM) Ris og ros? Gi oss gjerne en tilbakemelding, både positive og forbedringspotensiale. Dette kan du gjøre via kontakt oss i menyen. Forslag til nye episoder? Skulle du ha noen ønsker/forslag til nye episoder så ta gjerne kontakt med oss på den måten du selv ønsker.
Matthew Keys is in jail for not giving up a source - http://arstechnica.com/tech-policy/2016/11/speaking-from-prison-incarcerated-reporter-maintains-innocence/ Go Secure botnet analysis - https://gosecure.net/2016/11/02/exposing-the-ego-market-the-cybercrime-performed-by-the-linux-moose-botnet/ Blackhat EU talks - https://www.blackhat.com/eu-16/ getting root on wemos - https://www.invincealabs.com/blog/tag/wemo/
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Matteo-Becarro-Matteo-Collura-Extracting-The-Painful-Bluetooth.pdf Extracting the Painful (blue)tooth Matteo Beccaro Matteo Collura Do you know how many Bluetooth-enabled devices are currently present in the world? With the beginning of the IoT (Internet of Things) and Smart Bluetooth (Low energy) we find in our hands almost a zillion of them. Are they secure? What if I tell you I can unlock your Smartphone? What if I tell you I'm able to open the new shiny SmartLock you are using to secure your house's door? In this talk we will explain briefly how the Bluetooth (BDR/EDR/LE) protocols work, focusing on security aspects. We will show then some known vulnerabilities and finally we will consider deeply undisclosed ones, even with live demonstrations. Matteo Beccaro is a young security researcher. His interest focus on WiFi networks, networking and NFC implementations. He finished high school studies in July 2013 and actually he is a student at Politecnico di Torino in Computer Engineering course. He has been selected as speaker at DEF CON 21, 30C3, BlackHat US Arsenal, DEF CON 22's Skytalks and BlackHat EU 2014 and Tetcon, for his research in vulnerabilities of NFC transport systems. Since 2013 he is also pentester and security engineer at Secure Network s.r.l. Since 2015 he is also technical leader of the Security Research Team of OPFOR, the physical security division of Secure Network s.r.l. Twitter: @_bughardy_ Matteo Collura is a student of Electronics Engineering at Politecnico di Torino. He has been studying Wireless networks and in the last few years he focused on NFC. He presented the results of a progressive work of research at several conferences: DEF CON 21 (Las Vegas, 2013), 30C3 (Hamburg 2013), DEF CON Skytalks (Las Vegas, 2014), BlackHat USA 2014 Arsenal (Las Vegas). Currently he is studying Bluetooth protocols and their implementations. Twitter: @eagle1753
Detta är det andra intervjuavsnittet av Säkerhetspodcasten, i vilket Mattias Jidhage intervjuar Justin Searle, en av talarna på Blackhat EU 2013. Justin Searle är en penetrationstestare som fokuserar främst på styrsystem för infrastruktur (SCADA) och Smart Grid.
Avsnitt 11 (egentligen tolv) av säkerhetspodcasten, i vilket panelen bland annat tar del av Mattias berättelser från BlackHat EU i Amsterdam, dissikerar kinesiska hackergrupper och lär sig allt man behöver veta om Swating.
This week we're joined by Ryan Ward to discuss the news and the #BSidesLondon Schedule, as well as chatting about out competition to win your way into the conference. Philip Polstra joins us to chat about his recent talk and trip to Blackhat EU as well as some of his plans for 44Con
Took us nearly 6 months, but we're back FTW's 6 month hiatus has been ended. A show with the FTW lads catching up and preping for future shows. Take it as read this is not safe for work! 44Con, DeepSec, BerlinSides, BSidesVienna, Blackhat-EU and more. Enjoy!!!!
Securabit Episode 77: Return to the Rabbit HoleMarch 9, 2011Hosts:Anthony Gartner – @anthonygartner http://anthonygartner.comChris Gerling – @chrisgerlingChristopher Mills – @thechrisamJason Mueller – @securabit_jayTony Huffman (myne-us) – @myne_usAndrew Borel – @andrew_secbitGuests:Rafal Los - @wh1t3RabbitGeneral topics:Preview the upcoming BlackHat EU talk "Defying Logic."Researchers Build Tool That Roots Out Business Logic Flaws In Web Appshttp://www.darkreading.com/database-security/167901020/security/application-security/229300667/researchers-build-tool-that-roots-out-business-logic-flaws-in-web-apps.html--News-Malware on the andoid market place. (DroidDream)List of infected app http://blog.mylookout.com/2011/03/security-alert-malware-found-in-official-android-market-droiddream/-Google nukes 150,000 email accounts on accidenthttp://gmailblog.blogspot.com/2011/02/gmail-back-soon-for-everyone.htmlUse our discount code "Connect_SecuraBit10" to get 10% off of ANY training course. The discount code is good for all SANS courses in all formats.Upcoming eventsBlackHat Europe 2011 (17 - 18 Mar 2011)#BSidesChicago (16 - 17 Apr 2011)#BSides London, (20 Apr 2011)#BSidesROC Rochester, NY (21 May 2011)#BSidesDetroit (3 - 4 Jun 2011)Links:http://securabit.comChat with us on IRC at irc.freenode.net #securabitiTunes Podcast - http://itunes.apple.com/us/podcast/securabit/id280048405iPhone App Now Available - http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8