ashar

joined 2 years ago
MODERATOR OF
[–] ashar 2 points 1 year ago (4 children)

A trail does review evidence whereas here we just had a summary execution.

Your link to them UN press release says this:

"OIOS was not able to independently authenticate information used by Israel to support the allegations."

[–] ashar 2 points 1 year ago (6 children)

Ah yes, beleive a state that is on trial in both the courts in The Hague (war crimes, crimes against humanity and genocide).

[–] ashar 2 points 1 year ago

We sent aid and bombs. The bombs got through but not the aid. We are working on it.

/s

[–] ashar 7 points 1 year ago (8 children)

The guy was delivering food to a starving population. The occupation could have captured him since they have a military presence and control in the area.

[–] ashar 3 points 1 year ago

and the MFA we all have

[–] ashar 3 points 1 year ago (1 children)

It's the government's pet religious authority. They will produce any opinion that the government wants. Is there a name for these kind of scholars in Islamic history?

[–] ashar 9 points 1 year ago

Your field of study is not directly relevant here (unless you work to figure out the death toll, maybe). However scholars that do study genocide do now seem to agree that the killing of Palestinians by Israel is a genocide.

[–] ashar 2 points 1 year ago

The last civil war didn't quite totally destroy the country. Let us try again.

[–] ashar 35 points 1 year ago (1 children)

The 40,000 killed statistic is reliable in that the killed persons name, identity number etc are reported to MoH officials and recorded by them, and the dead are seen by the officials. However the figure is a small subset of the actual number dead. 200,000 to 300,000 dead in Gaza in the past year is a conservative estimate.

[–] ashar 2 points 1 year ago

The Economist had a good (probably unintentional) illustration of this.

[–] ashar 1 points 1 year ago (1 children)

The killing according to the Gaza Ministry of Health statistics seems to be slowing down, but this is because the MoH is maintaining a very high bar for recording the deaths. The attacks on the population is continuing at what seems to be the same rate.

from: https://www.dropsitenews.com/p/how-gaza-health-ministry-counts-dead "The Ministry of Health is committed to registering only those who reach its hospitals or other emergency medical care facilities in the Gaza Strip. Consequently, the number of martyrs announced by the ministry does not necessarily represent the total number of casualties but only those that have been officially documented."

Given that state of the hospitals is dire (they have all been bombed and attacked), the slow down in recording of deaths correlates with and is due to the destruction of the MoH and general civilian infrastructure. The reduction in rate of killing recorded does not align with the rate of actual killing.

[–] ashar 1 points 1 year ago (1 children)

Also, have you ever wondered why South Africa of all countries brought the case to the ICJ? Probably because they are deeply offended by the Israeli apartheid and they are even more against genocide?

Do you think it has anything to do with the fact that they entertained Hamas leaders as visiting dignitaries a month before they submitted the case? Um, yes. Why would they not do this?

Ah, you classify Hamas as a terrorist organisation.... Since South Africa regards Hamas to be a resistance movement (and this is the position of most of the world), coordinating with them would be sensible.

2
submitted 1 year ago by ashar to c/security_cpe
 

Will Machine Learning Replace The WAF? - John Graham-Cumming

Based on 20 years of experience using machine learning and keyword/pattern based systems this talk will look at the impact of machine learning on WAFs and how it can be used to effectively block malicious HTTP traffic.

John Graham-Cumming is CTO of Cloudflare and is a computer programmer and author. He studied mathematics and computation at Oxford and stayed for a doctorate in computer security. As a programmer, he has worked in Silicon Valley and New York, the UK, Germany, and France. His open source POPFile program won a Jolt Productivity Award in 2004

1
Global AppSec 2024 Lisbon (lisbon.globalappsec.org)
submitted 1 year ago by ashar to c/security_cpe
 

SLEUTHCON is a forum for identifying and exploring cybercrime and financially-motivated threats. This conference will highlight the work done by cybersecurity researchers, defenders, academics, law enforcement, and others.

Speakers on the website

Sleuthcon 2023 videos

2
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
0
submitted 2 years ago* (last edited 2 years ago) by ashar to c/security_cpe
 

Hacking a Satellite for Fun and Profit

Mario Polino @ mhackeroni

A light-hearted and entertaining dive into our victorious adventure at Hack-A-Sat! Our presentation takes you on a ride through the challenges and triumphs of hacking into an orbiting satellite, the Moonlighter. What is a Capture The Flag What is Hack-A-Sat How Qualification works How to Organize a CTF Team The competition The preparation of the team for the competition Same challenge example and solution.

Mario Polino has been a hacker and CTF player since 2008. He has a PhD in Computer Security from Politecnico di Milano. Mario worked as a researcher at Politecnico, publishing scientific papers on binary and malware analysis and ML for cybersecurity.

Mario has been the captain of Politecnico's team, Tower of Hanoi (https://toh.necst.it/about/, winner of ruCTF 2019), and is the captain of the Italian team mhackeroni (https://mhackeroni.it/ 5 times DEF CON CTF Finalist). Mario coaches Team Italy (https://teamitaly.eu/), the national Italian hacking team, and Team Europe (https://teameurope.site/), the hacking team selected among all European nations.

0
BSides Joburg 2024 (bsidesjoburg.co.za)
submitted 2 years ago by ashar to c/security_cpe
 

Born in 2009, BSides Security Conferences are community-driven events for cybersecurity professionals. They offer a welcoming space for individuals to present research, ideas, and experiences, fostering dialogue and collaboration beyond the limitations of larger conferences.

Schedule

Videos on YouTube

 

The Fault in Our Metrics: Rethinking How We Measure Detection & Response | A Conversation with Allyn Stott

Podcast Redefining CyberSecurity with Sean Martin

In this episode of The Redefining CyberSecurity Podcast, host Sean Martin converses with Allyn Stott, who shares his insights on rethinking how we measure detection and response in cybersecurity. The episode explores the nuances of cybersecurity metrics, emphasizing that it's not just about having metrics, but having the right metrics that truly reflect the effectiveness and efficiency of a security program.

Stott discusses his journey from red team operations to blue team roles, where he has focused on detection and response. His dual perspective provides a nuanced understanding of both offensive and defensive security strategies. Stott highlights a common issue in cybersecurity: the misalignment of metrics with organizational goals. He points out that many teams inherit metrics that may not accurately reflect their current state or objectives. Instead, metrics should be strategically chosen to guide decision-making and improve security posture. One of his key messages is the importance of understanding what specific metrics are meant to convey and ensuring they are directly actionable.

In his framework, aptly named SAVER (Streamlined, Awareness, Vigilance, Exploration, Readiness), Stott outlines a holistic approach to security metrics. Streamlined focuses on operational efficiencies achieved through better tools and processes. Awareness pertains to the dissemination of threat intelligence and ensuring that the most critical information is shared across the organization. Vigilance involves preparing for and understanding top threats through informed threat hunting. Exploration encourages the proactive discovery of vulnerabilities and security gaps through threat hunts and incident analysis. Finally, Readiness measures the preparedness and efficacy of incident response plans, emphasizing the coverage and completeness of playbooks over mere response times.

Martin and Stott also discuss the challenge of metrics in smaller organizations, where resources may be limited. Stott suggests that simplicity can be powerful, advocating for a focus on key risks and leveraging publicly available threat intelligence. His advice to smaller teams is to prioritize understanding the most significant threats and tailoring responses accordingly.

The conversation underscores a critical point: metrics should not just quantify performance but also drive strategic improvements. By asking the right questions and focusing on actionable insights, cybersecurity teams can better align their efforts with their organization's broader goals.

For those interested in further insights, Stott mentions his upcoming talks at B-Sides Las Vegas and Blue Team Con in Chicago, where he will expand on these concepts and share more about his Threat Detection and Response Maturity Model.

In conclusion, this episode serves as a valuable guide for cybersecurity professionals looking to refine their approach to metrics, making them more meaningful and aligned with their organization's strategic objectives.

3
submitted 2 years ago by ashar to c/security_cpe
 

Learn from leading hardware security researchers & professionals and discuss the latest & most innovative research on attacking and defending hardware. Connect with industry peers. Join us for a bigger, bolder, and better hardwear.io

Schedule with video and presentation links

Playlist

5
submitted 2 years ago by ashar to c/security_cpe
 

A totally free, english spoken conference dedicated to free software & security. Talks & workshops delivered by experts. High quality talks

2024 edition hosts 21 talks covering 10 Security topics (WebPKI, DFIR & TI, Reverse, Network Detectection etc). Talks are all delivered by experts.

Schedule

Talks with slides

 

16 videos

view more: ‹ prev next ›