Presentaciones B-Sides Orlando 2015

Para los interesados en las charlas de B-Sides Orlando 2015, ya están disponibles en youtube. Aquí os dejo la lista: Closing Keynote - Day 1 - Dr Johannes Ullrich Judgement Day 2015-04-12 Tim Krabek-Getting Involved to Better the Future Michael Brown - The NIST Cybersecurity Framework is coming! Are you ready? Jonathan Echavarria-Hiding your attacks with misdirection like REDACTED Danny Chrastil - What I know about your Company Hacking LinkedIn Vikram Dhillon -Blockchain-as-a-service -BsidesOrlando 2015 Scott Arciszewski - Application Security Beyond Compliance Opening Keynote -Moses Hernandez Yo Dog!
Leer más

Material de SecTor 2015

Ya está disponible el material (vídeos y diapositivas) de SecTor 2015. Maturing InfoSec: Lessons from Aviation on Information Sharing - Slides Automation is your Friend: Embracing SkyNet to Scale Cloud Security - Video Breaking Access Controls with BLEKey - Video Breaking and Fixing Python Applications - Video Slides Tools Complete Application Ownage via Multi-POST XSRF - Video Confessions of a Professional Cyber Stalker - Video Cymon - An Open Threat Intelligence System - Video Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing - Slides Hijacking Arbitrary .
Leer más

Material de HITB Singapur 2015

Ha sido publicado el material de la Hack In The Box de Singapur de este año 2015: CLOSING NOTE - Dhillon Kannabhiran.pdf D1 - Alfonso De Gregorio - Extortion and Cooperation in the Zero%c2%ad-Day Market.pdf D1 - Chris Rouland - Understanding the IoT from DC to 10Ghz.pdf D1 - Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.pdf D1 - Julien Lenoir - Implementing Your Own Generic Unpacker.
Leer más

Fotos de la Maker Faire 2015

Este año hemos tenido también la suerte de asistir a la fantástica Maker Faire de Queens en Nueva York. Aquí podéis ver una selección de productos y stands que más nos han llamado la atención. Aún seguimos analizando toda la información que hemos sacado de nuestra visita e intentaremos publicarla también poco a poco en el blog. De Nuevo hay que destacar la gran afluencia de público, sobre todo familias, donde se compartían diferentes actividades creativas como aprender a soldar, programar ladrillos de LEGO, coser o incluso a montar pinballs de cartón.
Leer más

Vídeos de Black Hat USA 2015

Y después del material, ya podemos acceder también a los vídeos de las presentaciones de Black Hat USA 2015: ZigBee Exploited The Good, The Bad, And The Ugly WSUSpect Compromising The Windows Enterprise Via Windows Update Writing Bad @$$ Malware For OS X Winning The Online Banking War Why Security Data Science Matters & How It's Different Pitfalls And Promises Of Why Security Data Science Matters & How It's Different Pitfalls And Promises Of When IoT Attacks Hacking A Linux Powered Rifle Web Timing Attacks Made Practical Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware Unicorn Next Generation CPU Emulator Framework Understanding The Attack Surface & Attack Resilience Of Project Spartan's New E Understanding And Managing Entropy Usage TrustKit Code Injection On IOS 8 For The Greater Good ThunderStrike 2 Sith Strike THIS IS DeepERENT Tracking App Behaviors With Nothing Changed Phone These're Not Your Grand Daddy's CPU Performance Counters CPU Hardware Performa The Tactical Application Security Program Getting Stuff Done The NSA Playset A Year Of Toys And Tools The Node js Highway Attacks Are At Full Throttle The Memory Sinkhole Unleashing An X86 Design Flaw Allowing Universal Privilege The Little Pump Gauge That Could Attacks Against Gas Pump Monitoring Systems The Lifecycle Of A Revolution The Kali Linux Dojo Workshop #2 Kali USB Setups With Persistent Stores & LUKS N The Kali Linux Dojo Workshop #1 Rolling Your Own Generating Custom Kali Linux 2 The Battle For Free Speech On The Internet The Applications Of Deep Learning On Traffic Identification Taxonomic Modeling Of Security Threats In Software Defined Networking Targeted Takedowns Minimizing Collateral Damage Using Passive DNS Taking Event Correlation With You Take A Hacker To Work Day How Federal Prosecutors Use The CFAA Switches Get Stitches Subverting Satellite Receivers For Botnet And Profit Stranger Danger!
Leer más

Los mayores robos de datos de 2015, hasta el momento

Image: Caroline Wurtzel/Bustle
Leer más

Vídeos del Chaos Communication Camp 2015

Para cualquier profesional en el campo de la seguridad informática, el verano no es precisamente la temporada para desconectar, si no todo lo contrario, es la época del año en la que te tienes que poner las botas y absorber toda la información que puedas, sobre todo de las grandes conferencias sobre seguridad que acontecen alrededor del mundo. En este caso hablamos de Chaos Communication Camp, una conferencia veraniega organizada por miembros del CCC (Chaos Communication Club), que cómo sabemos, éste se celebra una de las mejores conferencias del mundo a finales de diciembre.
Leer más

Material de Black Hat USA 2015

Ya tenemos disponible la mayoría de las presentaciones de la Black Hat USA 2015. La lista es la siguiente: The Lifecycle of a Revolution us-15-Granick-The-Lifecycle-Of-A-Revolution.pdf Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection us-15-Gorenc-Abusing-Silent-Mitigations-Understanding-Weaknesses-Within-Internet-Explorers-Isolated-Heap-And-MemoryProtection.pdf us-15-Gorenc-Abusing-Silent-Mitigations-Understanding-Weaknesses-Within-Internet-Explorers-Isolated-Heap-And-MemoryProtection-wp.pdf Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent Asynchronous-And-Fileless-Backdoor.pdf us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent Asynchronous-And-Fileless-Backdoor-wp.pdf us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent Asynchronous-And-Fileless-Backdoor-WMIBackdoor.ps1 Abusing XSLT for Practical Attacks us-15-Arnaboldi-Abusing-XSLT-For-Practical-Attacks.pdf us-15-Arnaboldi-Abusing-XSLT-For-Practical-Attacks-wp.pdf Advanced IC Reverse Engineering Techniques: In Depth Analysis of a Modern Smart Card us-15-Thomas-Advanced-IC-Reverse-Engineering-Techniques-In-Depth-Analysis-Of-A-Modern-Smart-Card.
Leer más

Vídeos de la OWASP AppSec Europa 2015

Ya están disponibles los vídeos de la OWASP AppSec Europa 2015 celebrada en Amsterdam del 19 al 22 de mayo. Martin Knobloch - Opening ceremony Joshua Corman - Continuous Acceleration: Why Continuous Everything Requires A Suppl... Nicolas Gregoire - Server-Side Browsing Considered Harmful Yossi Daya - Rise Of The Machines - How Automated Processes Overtook the Web Aaron Weaver - Building An AppSec Pipeline: Keeping Your Program, And Your Life, Sane Andrew Lee-Thorp - So, You Want To Use A WebView?
Leer más

Vídeos de la BSides Boston 2015

Desde la web de irongeek podemos acceder a los vídeos de la BSides Boston 2015. The Securitized State: Where it came from, where it's going, what can be done about it Molly Sauter Is Threat Modeling for Me? Robert Hurlbut Hacker or criminal? Repairing the reputation of the infosec community. Melanie Ensign Running Away from Security: Web App Vulnerabilities and OSINT Collide Micah Hoffman Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Program Paul Asadoorian Protect Your "
Leer más