Vendor News

/Vendor News

Week 29 In Review – 2016

Events Related

Converge 2016 Videos – www.irongeek.com
These are the videos from the Converge Information Security Conference.

BSides Detroit 2016 Videos – www.irongeek.com
These are the videos from the BSides Detroit 2016 Conference.

AppSecEU 16 – Abhay Bhargav – SecDevOps: A View from the Trenches – www.youtube.com

Resources

KeeThief – A Case Study in Attacking KeePass Part 2 – www.harmj0y.net
The […]

Week 25 In Review – 2016

Events Related

Circle City Con 2016 Videos – www.irongeek.com

Area41 – 2016 – confseclive.wordpress.com
I had the opportunity this year to attend Area41 conference in Zurich. The conference is organised by the DEFCON Switzerland group and the talks are mainly technical.

ShowMeCon 2016 Videos – www.irongeek.com

Recordings of talks and speakers at Security Fest 2016 – securityfest.com

Resources

ActBlue […]

Week 20 In Review – 2016

Events Related

Cybersecurity sleuths learn to think like hackers – www.cnet.com
About 35 high-school students sit at neatly arranged rows of tables in the university’s gym. Another 115 college-level contestants surround the high schoolers. The room is pretty quiet, with only the occasional rattle from the New York subway tunnels below cutting into the hushed conversations.

Techniques

[…]

Week 15 In Review – 2016

Events Related

Tailoring the NIST Cybersecurity Framework for a Precise Fit – www.tenable.com
One thing caught my attention right away: there were two digital clocks prominently displayed on either side of the auditorium. Both clocks were synchronized, and according to my phone, they were accurate to the second. It makes sense because NIST is the keeper of […]

Week 7 In Review – 2016

Events Related

BSidesNYC2016 – github.com

Resources

mediatek mt6261 rom dumping via the vibration motor – www.sodnpoo.com

McAfee SiteList.xml password decryption – funoverip.net
Recently, a very good friend of mine pointed me out the story of a pentester who recovered the encrypted passwords from a McAfee SiteList.xml file, using Responder.

Brute-forcing Microsoft Lync via NTLM – www.hackwhackandsmack.com
NTLM like many other services is made […]

Week 6 In Review – 2016

Events Related

Shmoocon 2016 – archive.org
ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues.

BSides Huntsville 2016 Videos – www.irongeek.com
These are the videos from the BSides Huntsville conference.

Recon 2015 – recon.cx

Tools

Routerhunter-2.0 – github.com
Testing vulnerabilities in […]

Week 46 In Review – 2015

Events Related

SecureWV2015 Videos – www.irongeek.com
These are the videos of the presentations from Secure West Virginia 2015.

HouSecCon v6 2015 Videos – www.irongeek.com

New 4G LTE Hacks Punch Holes In Privacy – www.darkreading.com
Black Hat Europe researchers to demonstrate newly found flaws in 4G mobile that expose privacy and disrupt phone service.

Black Hat Europe 2015

Black Hat Europe 2015 Wrap-Up – […]

Week 43 In Review – 2015

Events Related

HouSecCon v6 2015 Videos – www.irongeek.com

Hack.lu 2015
Today started the 11th edition of hack.lu in Luxembourg. Being one of my preferred event, I drove to Luxembourg this morning direction to the Alvisse Parc hotel!

Hack.lu 2015 Wrap-Up Day #1 – blog.rootshell.be
Hack.lu 2015 Wrap-Up Day #2 – blog.rootshell.be
Hack.lu 2015 Wrap-Up Day #3 – blog.rootshell.be

BruCON – www.youtube.com
Organized in Belgium, […]

Week 42 In Review – 2015

Events Related

Videos and Slide Decks from the re:Invent 2015 Security and Compliance Track – blogs.aws.amazon.com
Whether you want to review a Security and Compliance track session you attended at re:Invent 2015, or you want to experience a session for the first time, videos and slide decks from the Security and Compliance track are now available.

Resources

Calculating the […]

Week 39 In Review – 2015

Events Related

The CIA Campaign to Steal Apple’s Secrets – theintercept.com
The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics.

Resources

Reversing Mobile Traffic Lights – www.bastibl.net
I wanted to have a look at the signal. I once heard […]