Events

A space dedicated to sharing our thoughts on the latest cybersecurity news, trends, and threats

Subscribe

Subscribe to Blog via Email

Filter by Date:

See all

Tags:

See all

Popular Posts:

SummerCon 2019 - Sliver


Sliver is a cross-platform general purpose implant framework written in Golang and designed to be an open source alternative to Cobalt Strike. Sliver supports asymmetrically encrypted C2 over DNS, HTTP, HTTPS, and Mutual TLS using per-binary X.509 certificates signed by a per-instance certificate authority and supports multiplayer mode for collaboration.

Black Hat USA 2019 Arsenal - Smarter Home Invasion with ZigDiggity

Do you feel safe in your home with the security system armed? You may reconsider after watching a demo of our new hacking toolkit, ZigDiggity, where we target door & window sensors using an "ACK Attack". ZigDiggity will emerge as the weapon of choice for testing ZigBee-enabled systems, replacing all previous efforts.

Bishop Fox Partner Christie Terrill to Present Dark Reading Keynote

CircleCityCon 6.0 - What the Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing

Millions of people rely on mobile e-ticketing applications to get from Point A to Point B every day. These applications serve as vital components for mass transit and essentially power America’s major cities.

(ISC)2 Phoenix - Developing and Testing an Effective Incident Response Program

If your organization doesn’t have a plan for handling a major data breach, you’re already in trouble. In order to swiftly and effectively respond to a cyber compromise, you must develop a program for first response in the data center, and downstream response in the business units and in the public eye. This session offers some guidance on how to build an incident response plan, and how to test and practice that plan so that you’re ready for the real thing.

Bishop Fox Sponsors Summercon 2019

Bishop Fox is a Gold sponsor of SummerCon 2019, which will be held in Brooklyn, NY from June 14-15, 2019. SummerCon is one of the oldest hacker conventions, and the longest running such conference in America.

CircleCityCon 6.0 - Cuckoo Sandbox Setup: Malware Detection Through Detonation

This workshop is a crash course for anyone wanting to detonate malware and set up Cuckoo Sandbox. Students will receive hands-on experience in Cuckoo Sandbox’s malware analysis, reverse-engineering, and forensic capabilities. By providing step-by-step instructions during setup and first-time use, this workshop aims to remove the complexity and initial frustrations of setting up Cuckoo Sandbox alone.

THOTCON - What the Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing

Millions of people rely on mobile e-ticketing applications to get from Point A to Point B every day. These applications serve as vital components for mass transit and essentially power America's major cities. But thanks to Frida - a well-known but not very popular dynamic instrumentation framework - you can easily reverse engineer mobile e-ticketing applications. In this talk, we'll explore new application-specific attack avenues using Frida. We will be leaving the jailbreak bypasses and SSL pinning bypasses of yesteryear by the wayside as we explore a new attack vector. We'll use Frida's code injection and module loading capabilities to demonstrate e-ticket forging and e-ticket "stealing." (And your commute just became that much less of a pain). Expect to learn the analysis of intermediate-level obfuscation measures such as encrypted HTTP body and encrypted application storage in mobile applications, which can be instrumental in uncovering security vulnerabilities.

DC480 - Cuckoo Sandbox Setup: Malware Detection Through Detonation

IT Security Analyst Mark Demarest will be presenting a Cuckoo Sandbox Setup: Malware Detection Through Detonation workshop for the Arizona Hacker Collective DefCon Group - Four Eight Zero on Tuesday, May 14, 2019.

STE - How the Media Industry Can Achieve Security Success

Not only is the media and entertainment industry at the forefront of our culture, but it constitutes a considerable portion of our global economy. It’s how we still receive most of our information on a day-to-day basis. But thanks to its ubiquity, the media and entertainment industry is an especially appealing target for hackers around the world.

1 2 3 4 5
... 25 >