NEWS AND ANNOUNCEMENTS
FOLLOW THIS FEED TO STAY UP TO DATE!
During this workshop we will ensure, that network logs are one of the most efficient sources to hunt adversaries, but building good analytics capabilities require a deep understanding of benign activity and attacker behavior.
“DIAL: Did I just alert lambda?”
This session aims to demonstrate our open-source application, Damn Vulnerable Bank. This application provides an interface for folks interested in android application security to assess their skills.
Dzień dobry, you’re hacked. Review of the biggest recent security incidents related to state, business, and mass sectors in Poland
So, what makes such a good basis in Poland for the book to appear? What is the cyber threat landscape? What were the biggest hacks and incidents recently? Why does the biggest cybersecurity community in Poland have more than 135K followers? Let’s take a look at Poland together…
The speaker will demonstrate three security benefits of the options pattern for object initialization by showing three examples. They will also suggest and explain a small but significant improvement to the options pattern that increases security even more.
In this talk we will describe what industrial remote access solutions are, their common architecture, why most of them are using OpenVPN behind the scenes to control the encrypted tunnel, and how they manage the VPN tunnel using the OpenVPN Management Interface.
The goal for my talk is to demonstrate different kind of structures in the binaries as a PDF…
Beside detection of the most popular tactics, techniques and procedures like network discovery and lateral movement, are you ready for incidents where adversaries abuse windows infrastructure to achieve their goals?
Julia is wondering if you have ever seen a situation when the company hires highly skilled software developers, but the resulting product fails security review completely?
Dima says that he is not too public person, so we will tell you a few words about his talk.