Security leaks for sale

There is new gold to be found on the internet, and possibly in your own computer. Secret backdoors, that do not have a digital lock yet, are being traded at astronomical amounts. In the cyber world trade, where there are no rules, you are in luck with “white-hat” hackers, who guard your online security. But Read More …

Conference Video – Fundamentals – Distressingly Overlooked – David Elfering

In an era increasingly dominated by artificial intelligence (AI), the fundamentals of cybersecurity remain critically important for IT professionals. As organizations integrate AI technologies into their operations, the attack surface expands, creating new vulnerabilities that can be exploited by cyber criminals. Understanding core cybersecurity principles—such as risk management, threat detection, and incident response—enables IT teams Read More …

Conference Video – Observability in the Age of LLMs – Christine Yen

In a keynote, Christine Yen, co-founder and CEO of Honeycomb, discusses the challenges that large language models (LLMs) present to traditional software development practices like testing and debugging. She argues that the inherent unpredictability and non-deterministic nature of LLMs necessitate a shift towards observability, which focuses on understanding software behavior in production by observing what Read More …

Conference Video – A Needle in a Haystack

A Needle in a Haystack: How to Find a Threat Hidden in Over 6 Billion Logs Per Day – Brian Davis This video features Brian Davis from Red Canary discussing their approach to detecting security threats within the massive volume of cloud environment logs. He explains their six-stage pipeline: Ingest, Standardize, Combine, Detect, Suppress, and Read More …

Hacker TV – GoFetch

This video demonstrates how GoFetch utilizes Bloodhound attack graph data to automatically pivot from an exploited host to the domain controller.  The demonstration begins in Bloodhound, where the presenter identifies the attack path to the domain controller. After finding a path, the graph is exported for use by the attack script. The presenter then launches GoFetch Read More …

Hacker TV – All Your Devices Can Be Hacked

Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a Read More …