OSINT
Telegram is NOT an Encrypted Messaging App, Must-See Documentaries
Tom Eston | | arrest, Class Action Park, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Documentary, E2E, EFF, encryption, end-to-end encryption, Episodes, france, Information Security, Infosec, LuLaRich, LuLaRoe, messaging, OSINT, Pavlov Durov, Podcast, Podcasts, Privacy, security, social media, technology, Telegram
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is ...
USENIX Security ’23 – Towards Targeted Obfuscation of Adversarial Unsafe Images Using Reconstruction and Counterfactual Super Region Attribution Explainability
Marc Handelman | | Information Security, Infosecurity Education, Network Security, Open Access Research, OSINT, Security Architecture, Security Conferences, Security Research, USENIX, USENIX Security ’23
Authors/Presenters: Mazal Bethany, Andrew Seong, Samuel Henrique Silva, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment ...
DEF CON 31 War Stories – Paz Hameiri’s ‘CON Trolling The Weather’
Marc Handelman | | Cybersecurity, cybersecurity education, DEF Con 31, DEFCONConference, Information Security, Infosecurity Education, OSINT, Security Architecture, Security Conferences, Threat Hunting
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
DEF CON 31 – Daniel Avinoam’s ‘Staying Undetected Using The Windows Container Isolation Framework’
Marc Handelman | | Cybersecurity, cybersecurity education, DEF Con 31, DEFCONConference, Information Security, Infosecurity Education, OSINT, Remaining Undetected, Security Architecture, Security Conferences, Threat Hunting
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
How to Build a Phishing Playbook Part 1: Preparation
Kartik Subramanian, Engineering | | Active Directory, Checkpoint Firewall, CrowdStrike, Cybersecurity, Incident Response, Office 365 Integration, OSINT, Phishing Attacks, Recorded Future, SOAR, SOAR platform
Automating response to phishing attacks remains one of the core use-cases of SOAR platforms. In 2022, the Anti-Phishing Working Group (APWG) logged ~4.7 million phishing attacks. Since 2019, the number of phishing ...
DEF CON 31 – Tracy Mosley’s ‘War Stories – Nuthin’ But A G Thang Evolution of Cellular Networks’
Marc Handelman | | Cybersecurity, cybersecurity education, DEF Con 31, DEFCONConference, Information Security, Infosecurity Education, OSINT, Security Architecture, Security Conferences
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
DEF CON 31 – Farzan Karimi’s, Xuan Xing’s, Eugene Rodionov’s, Xiling Gong’s – ‘Attacking And Securing the Pixel Modem’
Marc Handelman | | Cybersecurity, cybersecurity education, DEF Con 31, DEFCONConference, Information Security, Infosecurity Education, OSINT, Security Architecture, Security Conferences
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
DEF CON 31 – Christopher Wade’s ‘Physical Attacks Against Smartphones’
Marc Handelman | | Cybersecurity, cybersecurity education, DEF Con 31, DEFCONConference, Information Security, Infosecurity Education, OSINT, Security Architecture, Security Conferences, Threat Hunting
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
DEF CON 31 Policy – Panel : A Global Approach to Tackling Software Resilience
Marc Handelman | | Cybersecurity, cybersecurity education, DEF Con 31, DEFCONConference, Information Security, Infosecurity Education, OSINT, Security Architecture, Security Conferences, Software Resilience, Threat Hunting
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
DEF CON 31 Policy – Panel: All Your Vulns Are Belong To Terms And Conditions
Marc Handelman | | Cybersecurity, cybersecurity education, DEF Con 31, DEFCONConference, Information Security, Infosecurity Education, OSINT, Security Architecture, Security Conferences, Threat Hunting, Vulnerabilities
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...