ashar

joined 2 years ago
MODERATOR OF
 

Darknet Diaries EP 144: RACHEL

Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm.

Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/

Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/.

 

The Cybersecurity Vault - episode #30, with guest Lisa Forte. Effectively responding to cybersecurity crisis events is crucial, yet many organizations lack a mature capability.

I speak with Lisa Forte, a legend when it comes to helping organizations prepare for handling cybersecurity crisis events, who shares her rich insights and recommendations.

Visit Cybersecurity Insights at https://www.cybersecurityinsights.us

 

How to Read Leaked Datasets Like a Journalist

'Hacks, Leaks, and Revelations' is a how-to guide for everyone who's curious about secrets. We live in a golden age of data. Every day, hacktivists release terabytes of data on sites like DDoSecrets, but sorting through it all requires some technical knowledge. What if you don’t know XML from SQL let alone how to write a simple Python script?

Micah Lee is the director of information security for The Intercept and he’s on Cyber today to talk about his new book: Hacks, Leaks, and Revelations. The book is a manual for people who want to learn how to parse and organize hacked datasets. It also contains stories of how Lee and others handled famous cases such as Blueleaks, neo-Nazi Discord chat rooms, and the Parler leak. If you’re not interested in diving into corporate or government secrets, you might learn something about how to protect your own data.

2
submitted 2 years ago by ashar to c/security_cpe
 

Network and Distributed System Security (NDSS) Symposium The NDSS Symposium is a leading security forum that fosters information exchange among researchers and practitioners of network and distributed system security.

NDSS 2024 Program

NDSS 2024 Video list

 

How real is the existential threat from AI? Terminator-style threats from AI do not currently exist, so why is money and political heft being thrown at a problem that isn't real?

The existential threat caused by Artificial Intelligence is a popular theme in science fiction. But more recently it’s started to be taken seriously by governments around the world and the companies developing the technology. Where did this idea come from, and why is so much money being spent on it, rather than on the regulation of AI and the real threat it poses to jobs and to copyright?

Presenter: Jack Stilgoe Producer: Philip Reevell Editor: Clare Fordham

 

Open guest lecture on Product Security in Operation Technology with Abdul-Basit Syed, Konecranes

An open guest lecture on "Product security for Operation Technology (OT) and industrial equipment" with Abdul-Basit Syed, Head of Product and Application Security at Konecranes.

In today's interconnected world, the convergence of Operational Technology (OT) and industrial equipment development with digital systems has fundamentally changed product development processes. Along with improvements in efficiency, quality and pace of development, it has also introduced unprecedented cybersecurity risks. This talk will delve into the critical importance of product security in OT and industrial product lifecycle.

Key topics to be covered include the product security domain, unique challenges of securing OT systems, strategies for mitigating risks, regulatory compliance requirements, emerging technologies for enhancing product security, and best practices for improving resilience.

Title: Product security for operation technology (OT) and industrial equipment Speaker: Abdul-Basit Syed, Head of Product and Application Security at Konecranes Date: Tuesday, March 26, 2024

4
submitted 2 years ago* (last edited 2 years ago) by ashar to c/security_cpe
 

Basingstoke’s premier (only) cyber security/hacker conference!

BSides Basingstoke 2023 playlist

BSides Basingstoke 2023 schedule

 

My AI Odyssey in Cybersecurity | Kashif Iqbal | TEDx

How easy is it for AI models to create phishing emails that people actually fall for? What impact and challenges does this cause for cybersecurity professionals?

In this talk, Kashif Iqbal from SEGA speaks about these challenges, and how we can ensure users can recognise when AI is being used. Kashif is a seasoned leader in the field of Technology and cybersecurity, boasting over two decades of experience across different sectors, including Gaming, Finance, Government and Healthcare. As the Director of Cyber Security and Technology for SEGA Europe, he has significantly contributed to developing comprehensive security programs, and different technology initiatives. His career highlights include leading cybersecurity efforts at public/ private sector, where he implemented robust security measures across various platforms. Kashif's commitment to knowledge sharing is evident through his founding of www.urduitacademy.com. His commitment to the tech community extends to serving on the University of West London's Industry Advisory Board and the HackerOne Technical advisory board. A recipient of multiple professional certifications ranging from CISSP/CRISC/ ISO27001/ CEH, Kashif is also a recognized speaker, having shared his insights at various prestigious institutions. This talk was given at a TEDx event using the TED conference format but independently organized by a local community.

 

PancakesCon is a one day community hacking / cybersecurity conference which occurs around the Spring Equinox every year. This conference is 100% virtual, not-for-profit and free to stream.

PancakesCon has a unique format. All PancakesCon talks must be 40-45 minutes long. They MUST consist of two parts: A brief talk about any cybersecurity topic targeted at junior professionals / students, and a brief talk about something which is not IT-related.

PancakesCon 4 Playlist

PancakesCon 4 Schedule from the website

5
submitted 2 years ago* (last edited 2 years ago) by ashar to c/security_cpe
3
NDSS Symposium 2023 (infosec.pub)
submitted 2 years ago by ashar to c/security_cpe
[–] ashar 6 points 2 years ago

‘apparent’. What they need confirmation from the IDF that it was an Israeli airstike? Is the IDF still admitting to war crimes now that there are going to be ICJ hearings on Monday?

[–] ashar 1 points 2 years ago

He yelled: “A war is about to break out!”

Given dystopian surveillance of a captive population, control of the population register, drones and internet surveillance they still missed the planning and timing of the attack by Hamas.

Unit 8200 is now generating the plans for the carpet bombing of Gaza and is guilty of warcrimes.

[–] ashar 4 points 2 years ago

A bit late Bernie. 9000 kids dead and 70% of housing destroyed, most of the hospitals bombed.

[–] ashar 2 points 2 years ago

Never heard of an ISP doing this. Crazy

[–] ashar 1 points 2 years ago

Even Tony Blair disassociated himself from this particular ethnic cleansing program. Any country that does sign up would become party to the Genocide case in the ICJ.

[–] ashar 2 points 2 years ago

Well the stories did read like really bad fan-fic.

[–] ashar 5 points 2 years ago (1 children)

Users passwords were leaked in other breaches. 23andme could have forced everyone to setup new passwords but that is not usual practice, is it?

[–] ashar 6 points 2 years ago

The evidence was a chair and a rope on the floor in a bombed portion of the hospital.

[–] ashar 13 points 2 years ago

Sanctions for speaking up against apartheid

[–] ashar 2 points 2 years ago (2 children)

No it was not a small attack. It was light infantry against a full miltary but not small. It was planned and they stockpiled weapons and material to last months. What they were not expecting was to walk over the IDF military on the border (none of the videos released by the IDF show Hamas doing this). They were not expecting to get throught the defences so easily to get to the settlements. Remember most of the population of Gaza was ethnically cleansed from the land that these settlements are built on.

They are still fighting. The IDF is using tanks in urban warfare (this is a big tactical no no), so Hamas have the IDF where they want them. Even 2 months into the fighting we still see daily videos of IDF tanks (USD 3 million) being destroyed by rocket launchers (USD 200).

Strategically the Palestinians were being thrown under a bus by the rest of the Arabs so this attack put Hamas in control. It also destroyed the image of Israeli comptence which is a huge propaganda win.

If you look at the prisoner exchanges and the interviews afterwards you see the Israeli prisoners were treated well in captivity and the release was well managed and competent. This especially does not align with the story in the NY Times here. The release of the Palestinian prisoners was chaotic (tear gas was used in some places) and the prsioners were tortured and released with broken bones in some cases.

[–] ashar 18 points 2 years ago

ongoing ethnic cleansing, possible genocide

view more: ‹ prev next ›