Attacks on Windows Infrastructure (Blue Team edition)

Attacks on Windows Infrastructure (Blue Team edition)

Bogdan Vennyk is security researcher for last 5 years. He started his career as penetration tester at UnderDefense. Malware analyst in the past, Splunk enthusiast and also maintaining blog about Threat hunting and Malware Analysis in his free time....
Why can’t developers make it secure?

Why can’t developers make it secure?

Julia is a Security Software Engineer at Cossack Labs, building convenient and affordable data security and encryption solutions. With background experience in mobile application development, she helps customers to choose and implement security controls for their...
DFA and code control flow obfuscation: a real-world example

DFA and code control flow obfuscation: a real-world example

Dima says that he is not too public person, so we will tell you a few words about his talk.During Dima’s talk, we will analyze code control flow obfuscation, based on deterministic finite automata (DFA), in a third-party iOS application downloaded from AppStore.The...