Security Conferences

/Security Conferences

Week 26 In Review – 2016

Events Related

BSides Cleveland 2016 Videos – www.irongeek.com
These are the videos from the Bsides Cleveland conference.

Resources

MonitorDarkly – github.com
This repo contains the exploit for the Dell 2410U monitor. It contains utilities for communicating with and executing code on the device.

148 Projects – bestpractices.coreinfrastructure.org

Tools

BadUSB 2.0 USB MITM POC – github.com

Other News

Judge says the FBI can […]

Week 25 In Review – 2016

Events Related

Circle City Con 2016 Videos – www.irongeek.com

Area41 – 2016 – confseclive.wordpress.com
I had the opportunity this year to attend Area41 conference in Zurich. The conference is organised by the DEFCON Switzerland group and the talks are mainly technical.

ShowMeCon 2016 Videos – www.irongeek.com

Recordings of talks and speakers at Security Fest 2016 – securityfest.com

Resources

ActBlue […]

Week 23 In Review – 2016

Resources

Out-of-Box Exploitation: A Security Analysis of OEM Updaters – duo.com
Original Equipment Manufacturers (OEM) refer to the first boot of a new PC as the out-of-box experience (OOBE). As you battle your way through modal dialogues for questionable software, and agree to some exciting 30 day antivirus trials, it’s pretty forgivable to want to throw your […]

Information Security Events For June

Here are information security events in North America this month:
 

eCrime 2016 : June 1 to 3 in Toronto, ON, Canada

 

SecureWorld Atlanta 2016 : June 1 to 2 in Atlanta, GA, USA

 

CISO Executive Summit Atlanta : June 1 in Atlanta, GA, USA

 

RVAsec 2016 : June 2 to 3 in Richmond, VA, USA

 

Techno Security & Forensics Investigations […]

May 31st, 2016|Security Conferences, Security Training|0 Comments

Week 22 In Review – 2016

Events Related

NolaCon 2016 – www.irongeek.com

Resources

BlueCoat now has a CA signed by Symantec – twitter.com

hitbsecconf2016ams – conference.hitb.org

Tools

Practical Malware Analysis Starter Kit – bluesoul.me
This package contains most of the software referenced in Practical Malware Analysis. Some of the links have broken over time, some companies have folded or been bought.

1 alpha 20160525 (oe.eo) […]

Week 20 In Review – 2016

Events Related

Cybersecurity sleuths learn to think like hackers – www.cnet.com
About 35 high-school students sit at neatly arranged rows of tables in the university’s gym. Another 115 college-level contestants surround the high schoolers. The room is pretty quiet, with only the occasional rattle from the New York subway tunnels below cutting into the hushed conversations.

Techniques

[…]

Week 19 In Review – 2016

Resources

Phrack – phrack.org

Tools

Can’t Hack a Hacker: Reverse Engineering a Discovered ATM Skimmer – trustfoundry.net
Brian Krebs has produced numerous articles on ATM skimmers. He has essentially become the “go to” journalist on ATM fraud. From reading his stuff, I have learned how the “bad guys” think when it comes to ATM fraud.

exploit-poc – […]

Information Security Events For May

Here are information security events in North America this month:
 

IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2016) : May 3 to 5 in McLean, VA, USA

 

Cyber Security Summit Dallas 2016 : May 3 in Dallas, TX, USA

 

SecureWorld Kansas City 2016 : May 4 in Kansas City, MO, USA

 

THOTCON 0x7 : May 5 […]

May 2nd, 2016|Security Conferences, Security Training|1 Comment

Week 18 In Review – 2016

Events Related

OWASP AppSec California 2016 – www.youtube.com

Resources

SyScan360 Singapore 2016 slides and exploit code – reverse.put.as
The exploit for the bug I presented last March at SyScan360 is today one year old so I decided to release it. I wasn’t sure if I should do it or not since it can be used in the wild but […]

Week 16 In Review – 2016

Events Related

CanSecWest – www.slideshare.net

BSides Nashville 2016 Videos – www.irongeek.com

Infiltrate 2016 – infiltratecon.com

Resources

Ransomware: Past, Present, and Future – blog.talosintel.com
The rise of ransomware over the past year is an ever growing problem. Businesses often believe that paying the ransom is the most cost effective way of getting their data back – and this may also be the […]