Home | Latest News | Popular News | Our Network | About | Contact
Latest Security Videos | www.SecurityPhresh.com
Latest Security Videos
Showing 'Latest Security Videos' from 1 to 10
DeepSec 2018 Closing
10th Apr 2019 [14 days ago] from DeepSec
Closing of DeepSec In-Depth Security 2018 (motto „I like to mov &6974,%bx“).Cast: DeepSec Conference
Manipulating Human Memory For Fun And Profit
9th Apr 2019 [15 days ago] from DeepSec
Cast: DeepSec Conference
Can Not See The Wood For The Trees - Too Many Security Standards For Automation Industry
9th Apr 2019 [15 days ago] from DeepSec
Plant operators and manufacturers are currently faced with many challenges in the field of automation. Issues such as digitization, Industry 4.0, legal requirements or complex business processes that connect IT and OT are paramount. Related...
Leveraging Endpoints To Boost Incident Response Capabilities
9th Apr 2019 [15 days ago] from DeepSec
In our day to day we constantly see how most of the organisations fail to respond properly to real incidents and a lot of times this is due to the lack of visibility on endpoints. The aim of this talk is to help the Blue teams to understand...
Offpath Attacks Against PKI
31st Jan 2019 [3 months ago] from DeepSec
The security of Internet-based applications fundamentally rely on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a very weak off-path attacker can effectively subvert the trustworthiness...
Open Source Network Monitoring
31st Jan 2019 [3 months ago] from DeepSec
Id like to offer an introduction into Network System Monitoring using different open tools available in linux. The talk is a technical approach to identify the best sniffing points in a network and how to orchestrate a full analysis of...
Orchestrating Security Tools With AWS Step Functions
31st Jan 2019 [3 months ago] from DeepSec
Increasingly frequent deployments make it impossible for security teams to manually review all of the code before it is released. We wrote a Terraform-deployed application to solve this problem by tightly integrating into the developer...
Pure In-Memory (Shell)Code Injection In Linux Userland
31st Jan 2019 [3 months ago] from DeepSec
A lot of research has been conducted in recent years on performing code injection in the Windows operating system without touching the disk. The same cannot be said about *NIX (and Linux specifically). Imagine yourself sitting in front...
RFID Chip Inside The Body: Reflecting The Current State Of Usage, Triggers, And Ethical Issues
31st Jan 2019 [3 months ago] from DeepSec
Chipping humans can be seen as one of the most invasive biometric identification technologies. RFID (Radio Frequency Identification) as the key technology in the field of the Internet of Things produces many applications. For example, human...
New Attack Vectors For The Mobile Core Networks
31st Jan 2019 [3 months ago] from DeepSec
Structure of the talk: - Introduction & background - Introduction to interconnection network (What is it, how does it work) - Why is it important for all of us? - Where does it come from? (Basics to understand the problems) - Existing...
1 2 3 4 5 6 7 8 9 10 Older »