Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'DeepSec' | www.SecurityPhresh.com
Security News from 'DeepSec'
Showing 'Security News from 'DeepSec'' from 21 to 30
Setting Up An Opensource Threat Detection Program - Lance Buttars
11th Feb 2020 [one year ago] from DeepSec
Through the use of event detection monitoring and do it yourself monitoring techniques on a Linux Apache PHP MySQL stack, I will demonstrate how you can create different alarms and reporting surfaces that alert you when your application...
SD-WAN Secure Communications Design And Vulnerabilities - Denis Kolegov
11th Feb 2020 [one year ago] from DeepSec
In this talk, we describe most common classes of design flaws and vulnerabilities in SD-WAN secure communication mechanisms, and disclose a set of reported and already patched vulnerabilities in popular SD-WAN products. We present the new...
Saving Private Brian - Michael Burke
11th Feb 2020 [one year ago] from DeepSec
This talk will be given as the story of Brian, an aid worker operating in a hostile third country. When hes stopped going in at the border he had his iPhone taken from him and then returned to him 15 minutes later. Now he cant be sure if...
S.C.A.R.E. - Static Code Analysis Recognition Evasion - Andreas Wiegenstein
11th Feb 2020 [one year ago] from DeepSec
Companies increasingly rely on static code analysis tools in order to scan (their) (custom) code for security risks. But can they really rely on the results? The typical SCA tool is designed to detect security issues in code that were created...
Practical Security Awareness - Lessons Learnt And Best Practices - Stefan Schumacher
5th Feb 2020 [one year ago] from DeepSec
This talk will show lessons learnt from awareness campaigns I ran in several organisations. The focus lies on the instructional design of staff training to motivate the staff, enable them to work with complexity and helping them to transfer...
Overcoming The Limitations Of TLS Fingerprinting For Malware Detection - Blake Anderson
5th Feb 2020 [one year ago] from DeepSec
TLS fingerprinting maps data contained within the TLS ClientHello to a set of possible applications or TLS libraries such as Chrome 74.0 or OpenSSL 1.1.0k. We have developed a system that continuously fuses endpoint and network data from...
Once Upon A Time In The West - A Story On DNS Attacks - Valentina Palacin, Ruth Esmeralda Barbacil
5th Feb 2020 [one year ago] from DeepSec
Just like in Old West movies, we are going through a land riddled with well-known gunmen: OceanLotus, DNSpionage and OilRig, who roam at ease, while the security cowboys sleep. This presentation will uncover the toolset and techniques used...
New Tales Of Wireless Input Devices - Matthias Deeg
5th Feb 2020 [one year ago] from DeepSec
In our talk, we will present new security tales of wireless mice, keyboards, and presenters using 2.4 GHz radio communication that we have collected over the last two years. In 2016, we published the results of our research project "Of...
Mobile Network Hacking, All-over-IP Edition - Luca Melette, Sina Yazdanmehr
5th Feb 2020 [one year ago] from DeepSec
Mobile networks have gone through a decade of security improvements ranging from better GSM encryption to stronger SIM card and SS7 configurations. These improvements were driven by research at this and other hacking conferences. Meanwhile,...
Mastering AWS Pentesting And Methodology - Ankit Giri
4th Feb 2020 [one year ago] from DeepSec
There have been patterns that have been found in AWS environment while exploring insecure S3 buckets, misconfiguration and compromised credentials flaws. These flaws are an outcome of the way the particular environment was configured and...
« Newer 1 2 3 4 5 6 7 8 Older »