Tag: conference
-
DEF CON 32 Top War Stories From A TryHard Bug Bounty Hunter
Author/Presenter: Justin Rhynorater Gardner Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-top-war-stories-from-a-tryhard-bug-bounty-hunter/
-
DEF CON 32 Travel Better Expedient Digital Defense
Authors/Presenters: Grey Fox Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-travel-better-expedient-digital-defense/
-
DEF CON 32 Simulating Attacks Against Hydroelectric Power Plants
Author/Presenter: Julia Dewitz-Würzelberger Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-simulating-attacks-against-hydroelectric-power-plants/
-
DEF CON 32 3DU Homo ex Machina
Tags: conferenceAuthor/Presenter: Lacey Harbour Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-3du-homo-ex-machina/
-
DEF CON 32 Attacks On GenAI Data Using Vector Encryption To Stop Them
Authors/Presenters: Patrick Walsh, Bob Wall Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-attacks-on-genai-data-using-vector-encryption-to-stop-them/
-
DEF CON 32 Bluetooth Blues: Unmasking CVE 2023-52709 The TI BLE5-Stack Attack
Author/Presenter: Kevin Mitchell Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-bluetooth-blues-unmasking-cve-2023-52709-the-ti-ble5-stack-attack/
-
Everything is connected to security
Joe shares his recent experience presenting at the 32nd Crop Insurance Conference and how it’s important to stay curious, be a forever student, and keep learning. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/everything-is-connected-to-security/
-
Moss on AI Disruption: ‘Everything, Everywhere, All at Once’
The pace of change including the rise of artificial intelligence and a sense of accelerating chaos can make cybersecurity professionals feel like things are kind of everything, everywhere, all at once, said Black Hat conference founder Jeff Moss. How should they respond? First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/moss-on-ai-disruption-everything-everywhere-all-at-once-i-5443
-
DEF CON 32 The Village Peoples’ Panel What Really Goes On In A Village
Tags: conferenceAuthors/Presenters: Panel Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-the-village-peoples-panel-what-really-goes-on-in-a-village/
-
DEF CON 32 UDSonCAN Attacks Discovering Safety Critical Risks By Fuzzing
Author/Presenter: Seunghee Han Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-udsoncan-attacks-discovering-safety-critical-risks-by-fuzzing/
-
Security chiefs whose companies operate in the EU should be exploring DORA now
Tags: attack, business, ciso, compliance, conference, corporate, cyber, cybersecurity, data, detection, dora, finance, framework, GDPR, incident, network, regulation, resilience, risk, service, technology, threat, vulnerabilityIf your enterprise operates in Europe, you should care about the Digital Operational Resilience Act (DORA), which took effect on January 17. DORA, also known as Directive (EU) 2022/2555 of the European Parliament, aims to enhance and build the EU’s cybersecurity capabilities and it has been hanging like the Sword of Damocles over the heads…
-
DEF CON 32 A (Shallow) Dive Into World Of Aircraft PKI
Tags: conferenceAuthor/Presenter: Matt Gaffney Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-a-shallow-dive-into-world-of-aircraft-pki/
-
DEF CON 32 Analyzing the Security of Satellite Based Air Traffic Control
Author/Presenter: Martin Strohmeier Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-analyzing-the-security-of-satellite-based-air-traffic-control/
-
DEF CON 32 Exposing The Occultations In Large Off-Grid Solar Systems
Tags: conferenceAuthors/Presenters: Dan Berte & Alexandru Lazar Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-exposing-the-occultations-in-large-off-grid-solar-systems/
-
DEF CON 32 Breaking Boundaries: Popping Shells In The Airgap With $10 Arduino Magic
Tags: conferenceAuthor/Presenter: Daniel Beard Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-breaking-boundaries-popping-shells-in-the-airgap-with-10-arduino-magic/
-
DEF CON 32 Bypass 101
Tags: conferenceAuthor/Presenter: Bill Graydon Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-bypass-101/
-
DEF CON 32 RFID 101
Tags: conferenceAuthors/Presenters: Ege Feyzioglu & Andrew M Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-rfid-101/
-
DEF CON 32 Pick Your Poison: Navigating A Secure Clean Energy Transition
Tags: conferenceAuthors/Presenters: Emma Stewart Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-pick-your-poison-navigating-a-secure-clean-energy-transition/
-
DEF CON 32 SBOMs the Hard Way: Hacking Bob the Minion
Authors/Presenters: Larry Pesce Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-sboms-the-hard-way-hacking-bob-the-minion/
-
DEF CON 32 Sneaky Extensions The MV3 Escape Artists
Tags: conferenceAuthors/Presenters: Vivek Ramachandran, Shourya Pratap Singh Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-sneaky-extensions-the-mv3-escape-artists/
-
DEF CON 32 Open Source Hacker V. Government Lawyer
Authors/Presenters: Rebecca Lively, Eddie Zaneski Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-open-source-hacker-v-government-lawyer/
-
DEF CON 32 Porn Privacy ET
Author/Presenter: ET Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-porn-privacy-et/
-
DEF CON 32 Practical Exploitation of DoS in Bug Bounty
Author/Presenter: Roni Lupin Carta Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-practical-exploitation-of-dos-in-bug-bounty/
-
DEF CON 32 Programming A CTS-V Gauge Cluster Into An ATS-V: Out Of Pure Spite
Author/Presenter: Varjitt Jeeva Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-programming-a-cts-v-gauge-cluster-into-an-ats-v-out-of-pure-spite/
-
DEF CON 32 Reflections on a Decade in Bug Bounties
Tags: conferenceAuthors/Presenters: Nikhil Shrivastava & Charlie Waterhouse Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-reflections-on-a-decade-in-bug-bounties/
-
DEF CON 32 Reverse Engineering And Hacking Ecovacs Robots
Authors/Presenters: Dennis Giese, Braelynn Hacker Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/def-con-32-reverse-engineering-and-hacking-ecovacs-robots/

