defcon
Join Rezilion in Las Vegas for Black Hat, BSides and DEFCON, 2023
This time every year, Las Vegas transforms into the epicenter of the security world with a lineup of major industry events – Black Hat, BSides and DEFCON. Rezilion is excited to be ...
Why is ‘Juice Jacking’ Suddenly Back in the News?
KrebsOnSecurity received a nice bump in traffic this week thanks to tweets from the Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) about "juice jacking," a term first coined ...
Sounding the Alarm on Emergency Alert System Flaws
The Department of Homeland Security (DHS) is urging states and localities to beef up security around proprietary devices that connect to the Emergency Alert System -- a national public warning system used ...
CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community
All organizations must have security awareness training programs to teach basics to end users. Similarly, the technical teams need to be exposed to flexible training that is interesting to them ...
Best of Episode: Interview with Jayson E. Street
This week is another best of episode with the man, the myth, the legend, Jayson E. Street! In this episode Jayson shares with us several of his greatest hacking and social engineering ...
Best of Episode: Interview with Rachel Tobac
This week is a best of episode with special guest Rachel Tobac, CEO of Social Proof Security. In this episode we discuss social engineering, how to get more women in cybersecurity, and ...
DEF CON 28 Safe Mode – Dylan Ayrey’s And Allison Donovan’s ‘Lateral Movement and Privilege Escalation In GCP: Compromise Any Organization Without Dropping an Implant’
Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...
DEF CON 28 Safe Mode – Ismail Melih’s Tas And Kubilay Ahmet Kucuk’s ‘Practical VoIP/UC Hacking Using Mr.SIP’
Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...
DEF CON 28 Safe Mode – Christopher Wade’s ‘Beyond Root: Custom Firmware For Embedded Mobile Chipsets’
Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...