Home | Latest News | Popular News | Our Network | About | Contact
Latest Security Videos | www.SecurityPhresh.com
Latest Security Videos
Showing 'Latest Security Videos' from 31 to 40
Once Upon A Time In The West - A Story On DNS Attacks - Valentina Palacin, Ruth Esmeralda Barbacil
5th Feb 2020 [one year ago] from DeepSec
Just like in Old West movies, we are going through a land riddled with well-known gunmen: OceanLotus, DNSpionage and OilRig, who roam at ease, while the security cowboys sleep. This presentation will uncover the toolset and techniques used...
CVE In The Hook – Monthly Vulnerability Review (January 2020 Issue)
5th Feb 2020 [one year ago] from ToolsWatch
Every day, new common vulnerabilities and exploits are publicly exposed. While this brings these flaws to the public’s attention and allows users to patch them, it also alerts potential attackers to...[[ This is a content summary only....
New Tales Of Wireless Input Devices - Matthias Deeg
5th Feb 2020 [one year ago] from DeepSec
In our talk, we will present new security tales of wireless mice, keyboards, and presenters using 2.4 GHz radio communication that we have collected over the last two years. In 2016, we published the results of our research project "Of...
Mobile Network Hacking, All-over-IP Edition - Luca Melette, Sina Yazdanmehr
5th Feb 2020 [one year ago] from DeepSec
Mobile networks have gone through a decade of security improvements ranging from better GSM encryption to stronger SIM card and SS7 configurations. These improvements were driven by research at this and other hacking conferences. Meanwhile,...
Mastering AWS Pentesting And Methodology - Ankit Giri
4th Feb 2020 [one year ago] from DeepSec
There have been patterns that have been found in AWS environment while exploring insecure S3 buckets, misconfiguration and compromised credentials flaws. These flaws are an outcome of the way the particular environment was configured and...
Lost In (DevOps) Space – Practical Approach For “Lightway” Threat Modeling As A Code - Vitaly Davidoff
1st Feb 2020 [one year ago] from DeepSec
Threat Modeling is a main method to identify potential security weaknesses, and is an important part of any secure design. Threat Modeling provides a model to analyze how to best protect your assets, prevent attacks, harden your systems,...
Top 5 Critical CVEs Vulnerability From 2019 That Every CISO Must Patch Before He Gets Fired !
25th Jan 2020 [one year ago] from ToolsWatch
The number of vulnerabilities continues to increase so much that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent tasks. Therefore we...[[ This is a content summary only....
Objective By The Sea & ToolsWatch To Release The First Edition Of MacOS “Aloha” Armory
9th Dec 2019 [one year ago] from ToolsWatch
We are extremely pleased and excited to announce our recent partnership with the renowned Objective By The Sea to promote a security hacking tools demonstration area exclusively macOS oriented....[[ This is a content summary only. Visit...
Introducing The 1st Arsenal Lab USA 2019
29th Jun 2019 [2 years ago] from ToolsWatch
After several years of a dazzling success of the famous Black Hat Arsenal, the team has brainstormed to offer some new entertainment.Several ideas have been reviewed however the principle of an...[[ This is a content summary only. Visit...
DeepSec 2018 Closing
10th Apr 2019 [2 years ago] from DeepSec
Closing of DeepSec In-Depth Security 2018 (motto „I like to mov &6974,%bx“).Cast: DeepSec Conference
« Newer 1 2 3 4 5 6 7 8 9 10 Older »