URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Tag: conference

  • DEF CON 32 Master Splinter’s Initial Physical Access Dojo

    Authors/Presenters: Daniel Isler Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-master-splinters-initial-physical-access-dojo/

  • Hacker attackieren Bundeswehr-Universität

    Die Studierenden an der Universität der Bundeswehr dürften wenig begeistert darüber sein, dass Hacker ihre Daten abgegriffen haben.Universität der BundeswehrHacker haben die Universität der Bundeswehr in Neubiberg bei München angegriffen. Laut einem Bericht des Handelsblatts seien dabei auch sensible Daten abgeflossen. Die Attacke sei von verschiedenen Quellen aus Universitätskreisen bestätigt worden, hieß es. Demzufolge habe…

  • Police risk losing society’s trust in fight against cybercrime, warns Europol chief

    Catherine De Bolle, the chief of Europol, said at the Munich Cyber Security Conference that societies must understand why law enforcement agencies need new powers to fight increasingly sophisticated cybercrime operations. First seen on therecord.media Jump to article: therecord.media/eurpol-chief-cybercrime-law-enforcement-powers-society-trust

  • Failed Ukraine would weaken both US and Europe, says EU chief von der Leyen

    European Commission President Ursula von der Leyen made clear at the Munich Security Conference on Friday that a lasting peace in Ukraine is not just in the European Union’s interest, but in the interest of the U.S. as well. First seen on therecord.media Jump to article: therecord.media/failed-ukraine-would-weaken-us-and-europe-von-der-leyen

  • India could play a key role in AI development, Infosys co-founder says

    “There are obvious use [AI use] cases for us because we have developed technologies at scale,” said Infosys co-founder Nandan Nilekani at the Munich Cyber Security Conference on Friday. First seen on therecord.media Jump to article: therecord.media/india-could-play-key-role-in-ai-development

  • DEF CON 32 MFT Malicious Fungible Tokens

    Authors/Presenters: Mauro Eldritch, Cybelle Oliveira Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-mft-malicious-fungible-tokens/

  • DEF CON 32 GPS Spoofing It’s About Time, Not Just Position

    Authors/Presenters: Ken Munro Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-gps-spoofing-its-about-time-not-just-position/

  • Intelligence agencies must explain what they do, says UK’s former cyber spy chief

    Speaking at the Munich Cyber Security Conference on Thursday, Sir Jeremy Fleming, who headed the cyber and signals intelligence agency GCHQ from 2017 to 2023, said he felt “really strongly” the agency’s “license to operate” had to be based on public understanding and trust. First seen on therecord.media Jump to article: therecord.media/intel-agencies-must-explain-what-they-do-fleming-gchq

  • Munich Cyber Security and Security Conferences 2025 [Live Updates]

    Live updates from the Munich Security and Cyber Security Conference from reporters Alexander Martin, Daryna Antoniuk and Dina Temple-Raston. First seen on therecord.media Jump to article: therecord.media/munich-cyber-security-and-security-conference-2025

  • Hunderte Videotechnologie-Experten zu Gast auf der Mobotix-Partner-Conference 2025

    Unter dem Motto ‘Navigating Tomorrow” nahmen mehr als hundert Mobotix-Partner, Videotechnologie-Expertinnen und -Experten sowie Interessierte an der diesjährigen Mobotix-Partnerkonferenz im rheinland-pfälzischen Langmeil teil. Ein beeindruckendes Branchentreffen, bei dem sich die Mobotix Partner über Trends und Entwicklungen in der Videotechnologie austauschen und die neusten Mobotix-Lösungen zum Teil noch vor Markteinführung kennenlernen konnten. Schon zuvor fand im…

  • DEF CON 32 ICS 101

    Authors/Presenters: Bryson Bort, Tom VanNorman – Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-ics-101/

  • DEF CON 32 Leveraging AI For Smarter Bug Bounties

    Authors/Presenters: Diego Jurado & Joel Niemand Sec Noguera Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-leveraging-ai-for-smarter-bug-bounties/

  • Cybercrime Threatens National Security, Google Threat Intel Team Says

    On the eve of the Munich Security Conference, Google argues that the cybercriminal threat should be treated as a national security threat like state-backed hacking groups. The post Cybercrime Threatens National Security, Google Threat Intel Team Says appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/cybercrime-threatens-national-security-google-threat-intel-team-says/

  • CSO Award and Hall of Fame Nominations Open Now

    Industry-Wide Recognition Winning a CSO Award affirms your organization’s commitment to excellence in cybersecurity and highlights your team’s success in tackling today’s biggest security challenges.Elite Networking The CSO Conference brings together top security leaders, industry experts, and academics worldwide. By attending, you’ll engage with peers, exchange ideas, and gain firsthand knowledge of emerging trends and…

  • DEF CON 32 Eradicating Hepatitis C with BioTerrorism

    Authors/Presenters: Mixæl Swan Laufer Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-eradicating-hepatitis-c-with-bioterrorism/

  • DEF CON 32 Hunters And Gatherers A Deep Dive Into The World Of Bug Bounties

    Authors/Presenters: Panel Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-hunters-and-gatherers-a-deep-dive-into-the-world-of-bug-bounties/

  • DEF CON 32 Exploiting Bluetooth From Your Car To The Bank Account

    Authors/Presenters: Vladyslav Zubkov, Martin Str Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-exploiting-bluetooth-from-your-car-to-the-bank-account/

  • DEF CON 32 From Easy Wins To Epic Challenges: Bounty Hunter Edition

    Author/Presenter: Daniel Blaklis Le Gall Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-from-easy-wins-to-epic-challenges-bounty-hunter-edition/

  • DEF CON 32 Bypass 102

    Author/Presenter: Terry Luan & Karen Ng Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-bypass-102/

  • DEF CON 32 Custom, Cheap, Easy, And Safe Badges Without Starting From Scratch

    Author/Presenter: securelyfitz Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-custom-cheap-easy-and-safe-badges-without-starting-from-scratch/

  • DEF CON 32 Got 99 Problems But Prompt Injection Ain’t Pineapple

    Authors/Presenters: Chloé Messdaghi, Kasimir Schulz Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-got-99-problems-but-prompt-injection-aint-pineapple/

  • DEF CON 32 How We Built Our REDACTED THING This Year

    Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-how-we-built-our-redacted-thing-this-year/

  • DEF CON 32 Responding To Breaches, Ransomware And State Sponsored Threat Actors

    Authors/Presenters: Panel Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-responding-to-breaches-ransomware-and-state-sponsored-threat-actors/

  • DEF CON 32 DIY Pharmaceuticals

    Authors/Presenters: Michael Laufer Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-diy-pharmaceuticals/

  • DEF CON 32 Hacker Vs. AI Perspectives From An Ex-Spy

    Author/Presenter: Harriet Farlow Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-hacker-vs-ai-perspectives-from-an-ex-spy/

  • DEF CON 32 D0N0H4RM Cyber STEM Storytime

    Authors/Presenters: Panel Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-d0n0h4rm-cyber-stem-storytime/

  • DEF CON 32 Data On Demand: The Challenges Of Building A Privacy Focused AI Device

    Author/Presenter: Matt Domko Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-data-on-demand-the-challenges-of-building-a-privacy-focused-ai-device/

  • DEF CON 32 Exposing Attacks Hiding In The Sheer Noise Of False Positives

    Authors/Presenters: E Tahoun, L Hamida Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-exposing-attacks-hiding-in-the-sheer-noise-of-false-positives/

  • The CISO’s role in advancing innovation in cybersecurity

    Cybersecurity leaders have an advantage when it comes to innovation given their front seat facing new and old threats. That is why many CISOs are playing an active role in shaping emerging solutions, which also gives them a clear understanding of where current solutions fall short.”CISOs can play a part in supporting innovation by shaping…

  • DEF CON 32 Navigating the Turbulent Skies of Aviation Cyber Regulation

    Authors/Presenters: M. Weigand, S. Wagner Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/def-con-32-navigating-the-turbulent-skies-of-aviation-cyber-regulation/