Home | Latest News | Popular News | Our Network | About | Contact
Latest Security Videos | www.SecurityPhresh.com
Latest Security Videos
Showing 'Latest Security Videos' from 41 to 50
Manipulating Human Memory For Fun And Profit
9th Apr 2019 [2 years ago] from DeepSec
Cast: DeepSec Conference
Can Not See The Wood For The Trees - Too Many Security Standards For Automation Industry
9th Apr 2019 [2 years ago] from DeepSec
Plant operators and manufacturers are currently faced with many challenges in the field of automation. Issues such as digitization, Industry 4.0, legal requirements or complex business processes that connect IT and OT are paramount. Related...
Leveraging Endpoints To Boost Incident Response Capabilities
9th Apr 2019 [2 years ago] from DeepSec
In our day to day we constantly see how most of the organisations fail to respond properly to real incidents and a lot of times this is due to the lack of visibility on endpoints. The aim of this talk is to help the Blue teams to understand...
Offpath Attacks Against PKI
31st Jan 2019 [2 years ago] from DeepSec
The security of Internet-based applications fundamentally rely on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a very weak off-path attacker can effectively subvert the trustworthiness...
Open Source Network Monitoring
31st Jan 2019 [2 years ago] from DeepSec
Id like to offer an introduction into Network System Monitoring using different open tools available in linux. The talk is a technical approach to identify the best sniffing points in a network and how to orchestrate a full analysis of...
Orchestrating Security Tools With AWS Step Functions
31st Jan 2019 [2 years ago] from DeepSec
Increasingly frequent deployments make it impossible for security teams to manually review all of the code before it is released. We wrote a Terraform-deployed application to solve this problem by tightly integrating into the developer...
Pure In-Memory (Shell)Code Injection In Linux Userland
31st Jan 2019 [2 years ago] from DeepSec
A lot of research has been conducted in recent years on performing code injection in the Windows operating system without touching the disk. The same cannot be said about *NIX (and Linux specifically). Imagine yourself sitting in front...
RFID Chip Inside The Body: Reflecting The Current State Of Usage, Triggers, And Ethical Issues
31st Jan 2019 [2 years ago] from DeepSec
Chipping humans can be seen as one of the most invasive biometric identification technologies. RFID (Radio Frequency Identification) as the key technology in the field of the Internet of Things produces many applications. For example, human...
New Attack Vectors For The Mobile Core Networks
31st Jan 2019 [2 years ago] from DeepSec
Structure of the talk: - Introduction & background - Introduction to interconnection network (What is it, how does it work) - Why is it important for all of us? - Where does it come from? (Basics to understand the problems) - Existing...
Moving Money: Inside The Global Watchlist For Banking Across Borders
31st Jan 2019 [2 years ago] from DeepSec
Its a rare glimpse of an otherwise tightly guarded datastore - and its worrying: many innocent people and organizations find themselves in the World Check database, which protects banks against potentially dangerous customers. This was...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »