ashar

joined 2 years ago
MODERATOR OF
[–] ashar 3 points 11 months ago

Are you actually saying that Sinwar's strategy paid off?

[–] ashar 1 points 11 months ago

No, it would be war squared.

Or maybe war(war());

[–] ashar 8 points 1 year ago

This is sort of report you get from a reporter under military censorship.

[–] ashar 3 points 1 year ago

What sort of army does not fight against an invading force? Is this why Hezbollah exists?

[–] ashar 51 points 1 year ago (1 children)

Sending out IEDs that will probably explode in a supermarket and kill civilians is generally considered a war crime. So far 2 kids killed in Beirut by the Israeli bombs in devices.

[–] ashar 1 points 1 year ago

No, that is what the Americans want you to think. It is actually just simple recursion.

[–] ashar 6 points 1 year ago (2 children)

If this really was that useful, they wouldn't be telling us

That is what they want you to think

[–] ashar 1 points 1 year ago

Tell us about the reporting restrictions placed on this story

[–] ashar 2 points 1 year ago (2 children)

Reminder that the main Houthi demand is for an end to the genocide in Palestine

[–] ashar 10 points 1 year ago

Apartheid country going to apartheid

[–] ashar 16 points 1 year ago (1 children)

Well the BBC headlines are getting better. Previously it would have been ‘IDF says suspected terrorists dead’.

[–] ashar 4 points 1 year ago

My first computer was the zx spectrum with 256k RAM

2
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
0
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
 

Hacking a Satellite for Fun and Profit

Mario Polino @ mhackeroni

A light-hearted and entertaining dive into our victorious adventure at Hack-A-Sat! Our presentation takes you on a ride through the challenges and triumphs of hacking into an orbiting satellite, the Moonlighter. What is a Capture The Flag What is Hack-A-Sat How Qualification works How to Organize a CTF Team The competition The preparation of the team for the competition Same challenge example and solution.

Mario Polino has been a hacker and CTF player since 2008. He has a PhD in Computer Security from Politecnico di Milano. Mario worked as a researcher at Politecnico, publishing scientific papers on binary and malware analysis and ML for cybersecurity.

Mario has been the captain of Politecnico's team, Tower of Hanoi (https://toh.necst.it/about/, winner of ruCTF 2019), and is the captain of the Italian team mhackeroni (https://mhackeroni.it/ 5 times DEF CON CTF Finalist). Mario coaches Team Italy (https://teamitaly.eu/), the national Italian hacking team, and Team Europe (https://teameurope.site/), the hacking team selected among all European nations.

0
BSides Joburg 2024 (bsidesjoburg.co.za)
submitted 1 year ago by ashar to c/security_cpe
 

Born in 2009, BSides Security Conferences are community-driven events for cybersecurity professionals. They offer a welcoming space for individuals to present research, ideas, and experiences, fostering dialogue and collaboration beyond the limitations of larger conferences.

Schedule

Videos on YouTube

 

The Fault in Our Metrics: Rethinking How We Measure Detection & Response | A Conversation with Allyn Stott

Podcast Redefining CyberSecurity with Sean Martin

In this episode of The Redefining CyberSecurity Podcast, host Sean Martin converses with Allyn Stott, who shares his insights on rethinking how we measure detection and response in cybersecurity. The episode explores the nuances of cybersecurity metrics, emphasizing that it's not just about having metrics, but having the right metrics that truly reflect the effectiveness and efficiency of a security program.

Stott discusses his journey from red team operations to blue team roles, where he has focused on detection and response. His dual perspective provides a nuanced understanding of both offensive and defensive security strategies. Stott highlights a common issue in cybersecurity: the misalignment of metrics with organizational goals. He points out that many teams inherit metrics that may not accurately reflect their current state or objectives. Instead, metrics should be strategically chosen to guide decision-making and improve security posture. One of his key messages is the importance of understanding what specific metrics are meant to convey and ensuring they are directly actionable.

In his framework, aptly named SAVER (Streamlined, Awareness, Vigilance, Exploration, Readiness), Stott outlines a holistic approach to security metrics. Streamlined focuses on operational efficiencies achieved through better tools and processes. Awareness pertains to the dissemination of threat intelligence and ensuring that the most critical information is shared across the organization. Vigilance involves preparing for and understanding top threats through informed threat hunting. Exploration encourages the proactive discovery of vulnerabilities and security gaps through threat hunts and incident analysis. Finally, Readiness measures the preparedness and efficacy of incident response plans, emphasizing the coverage and completeness of playbooks over mere response times.

Martin and Stott also discuss the challenge of metrics in smaller organizations, where resources may be limited. Stott suggests that simplicity can be powerful, advocating for a focus on key risks and leveraging publicly available threat intelligence. His advice to smaller teams is to prioritize understanding the most significant threats and tailoring responses accordingly.

The conversation underscores a critical point: metrics should not just quantify performance but also drive strategic improvements. By asking the right questions and focusing on actionable insights, cybersecurity teams can better align their efforts with their organization's broader goals.

For those interested in further insights, Stott mentions his upcoming talks at B-Sides Las Vegas and Blue Team Con in Chicago, where he will expand on these concepts and share more about his Threat Detection and Response Maturity Model.

In conclusion, this episode serves as a valuable guide for cybersecurity professionals looking to refine their approach to metrics, making them more meaningful and aligned with their organization's strategic objectives.

3
submitted 1 year ago by ashar to c/security_cpe
 

Learn from leading hardware security researchers & professionals and discuss the latest & most innovative research on attacking and defending hardware. Connect with industry peers. Join us for a bigger, bolder, and better hardwear.io

Schedule with video and presentation links

Playlist

 

A totally free, english spoken conference dedicated to free software & security. Talks & workshops delivered by experts. High quality talks

2024 edition hosts 21 talks covering 10 Security topics (WebPKI, DFIR & TI, Reverse, Network Detectection etc). Talks are all delivered by experts.

Schedule

Talks with slides

 

16 videos

3
SO-Con Spectre Ops 2024 (self.security_cpe)
submitted 1 year ago by ashar to c/security_cpe
 

Explore new approaches, tools, and techniques to combat identity-based attack paths. Discover the latest trends, research from frontline practitioners, case studies and firsthand experiences

Schedule

Playlist

9
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
 

In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changed everything.

Sources

https://www.rechtspraak.nl/Organisatie-en-contact/Organisatie/Rechtbanken/Rechtbank-Oost-Brabant/Nieuws/Paginas/Developer-of-Tornado-Cash-gets-jail-sentence-for-laundering-billions-of-dollars-in-cryptocurrency.aspx

https://www.ic3.gov/Media/Y2024/PSA240425

https://www.tabnak.ir/fa/news/1225983/کسر-۳-میلیون-تومان-از-حساب-افراد-بابت-بی-حجابی

https://www.independentpersian.com/node/348011/سیاسی-و-اجتماعی/قرار-است-بخشی-از-کسر-بودجه-از-جزای-نقدی-قانون-حجاب-اجباری-تامین-شود#:~:text=قرار%20است%20بخشی%20از%20کسر%20بودجه%20از%20جزای,۱۸%20تا%20۳۶%20میلیون%20تومان»%20تعیین%20شده%20است

https://www.coinspeaker.com/arrest-bitcoin-advocate-ziya-sadr/

https://www.eff.org/deeplinks/2023/08/tornado-cash-civil-decision-limits-reach-treasury-departments-actions-while

Attribution

Darknet Diaries is created by Jack Rhysider.

This episode was researched and written by Fiona Guy.

Assembled by Tristan Ledger.

Episode artwork by odibagas.

Mixing by Proximity Sound.

Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.

view more: ‹ prev next ›