Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'DeepSec' | www.SecurityPhresh.com
Security News from 'DeepSec'
Showing 'Security News from 'DeepSec'' from 61 to 70
Attacks On Mobile Operators
19th Dec 2018 [one year ago] from DeepSec
"Id like to talk about telecom security. My research contains information about security of mobile operators: classic and new (or very rare) attack vectors and vulnerabilities. This presentation will consist of three main parts: First,...
ROOTS_Keynote: Automatic Exploitation - The DARPA Cyber Grand Challenge, What Came After, And What Is Next
19th Dec 2018 [one year ago] from DeepSec
The automatic exploitation of vulnerabilities has long been a holy grail for software security. However, even manual exploitation by experienced security analysts and researchers has become ever more challenging due to the increased complexity...
DeepSec2017 - The Future Of The Internet
4th Jan 2018 [2 years ago] from DeepSec
Where are we headed with all our things as they become connected to the internet? Everything is already so vulnerable, but companies are building convenient products and services so fast without thinking about the security issues. This...
DeepSec2017 - Uncovering And Visualizing Botnet Infrastructure And Behavior
4th Jan 2018 [2 years ago] from DeepSec
How much information about a botnet can one find using a single IP address, domain name or indicator of compromise (IOC)? What kind of behavior can be determined when looking at attacker and victim infrastructure? In an attempt to discover...
DeepSec2017 - XFLTReaT: A New Dimension In Tunnelling
4th Jan 2018 [2 years ago] from DeepSec
This presentation will sum up how to do tunnelling with different protocols and will feature different perspectives in detail. For example, companies are fighting hard to block exfiltration from their network: They use http(s) proxies,...
DeepSec2017 - Lock, Stock And Two Smoking Apples - XNU Kernel Security
4th Jan 2018 [2 years ago] from DeepSec
This talk will aim to cover the research which has been undertaken following on from the Defcon presentation on MWRs platform agnostic kernel fuzzing, to automatically identify critical flaws within Apple macOS. It was observed that there...
ROOTS 2017 - Paying The Price For Disruption: A FinTech Allowed Account Takeover
4th Jan 2018 [2 years ago] from DeepSec
In this paper, we look at N26, a pan-European banking startup and the poster child for young FinTechs, to see how security is treated by startups that provide disruptive technologies in the financial sector. We find out that, in an area...
ROOTS 2017 - A Survey On Automated Dynamic Malware Analysis Evasion And Counter-Evasion: PC, Mobile, And Web
4th Jan 2018 [2 years ago] from DeepSec
Automated dynamic malware analysis systems are important in combating the proliferation of modern malware. Unfortunately, malware can often easily detect and evade these systems. Competition between malware authors and analysis system developers...
ROOTS 2017 - Enhancing Control Flow Graph Based Binary Function Identification
4th Jan 2018 [2 years ago] from DeepSec
Detection of binary functions in compiled code is a major stepping stone towards any advanced binary analysis technique. Nucleus [1] is a novel algorithm based on the idea of using the interprocedural control flow graph to detect function...
ROOTS 2017 - On The (In-)Security Of JavaScript Object Signing And Encryption
4th Jan 2018 [2 years ago] from DeepSec
JavaScript Object Notation (JSON) has evolved to the de-facto standard file format in the web used for application configuration, cross- and same-origin data exchange, as well as in Single Sign-On (SSO) protocols such as OpenID Connect....
« Newer 1 2 3 4 5 6 7 8 Older »