- Видео 230
- Просмотров 294 314
Security BSides London
Великобритания
Добавлен 30 дек 2013
The Official Security B-Sides London RUclips Channel
This is where you will find official videos from the events hosted in London.
About Security B-Sides London
Launched in mid-2009, Security B-Sides is a community-driven event built for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is where conversations for the next-big-thing are happening and the Security B-Sides London team is bringing this back to London.
This is where you will find official videos from the events hosted in London.
About Security B-Sides London
Launched in mid-2009, Security B-Sides is a community-driven event built for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration. It is where conversations for the next-big-thing are happening and the Security B-Sides London team is bringing this back to London.
Exploring Retail’s Cyber Threat Landscape - Alexandra Forsyth
Exploring Retail’s Cyber Threat Landscape - Alexandra Forsyth
Просмотров: 105
Видео
An Abridged History Of Malware Olivia Betts
Просмотров 576 месяцев назад
An Abridged History Of Malware Olivia Betts
Scaling Detection And Response Teams: Enabling Efficient Investigations - James Dorgan
Просмотров 3396 месяцев назад
Scaling Detection And Response Teams: Enabling Efficient Investigations - James Dorgan
Breaking Bad Multifactor: MFA Bypasses And How To Assess The Risks - Chester Wisniewski
Просмотров 2246 месяцев назад
Breaking Bad Multifactor: MFA Bypasses And How To Assess The Risks - Chester Wisniewski
A Talk About Cross Site Scripting XSS In 2023 The Mitigated Unmitigated Vulnerability Val Resh
Просмотров 1336 месяцев назад
A Talk About Cross Site Scripting XSS In 2023 The Mitigated Unmitigated Vulnerability Val Resh
Elevate & Conquer: A Journey Into Kernel Exploitation - Tijme Gommers
Просмотров 5016 месяцев назад
Elevate & Conquer: A Journey Into Kernel Exploitation - Tijme Gommers
Cloudy With A Chance Of Security Sascha Bharath
Просмотров 1136 месяцев назад
Cloudy With A Chance Of Security Sascha Bharath
Ethical Hacking: Navigating The Modern Ethical And Moral Landscape - Muhammed Aanish Butt
Просмотров 666 месяцев назад
Ethical Hacking: Navigating The Modern Ethical And Moral Landscape - Muhammed Aanish Butt
Oh My Phish! - Theram and Dhruv Bisani
Просмотров 5886 месяцев назад
Oh My Phish! - Theram and Dhruv Bisani
DevSecOps On A Budget: Building A Secure Dev Pipeline Without Breaking The Bank - Robbie Thandi
Просмотров 666 месяцев назад
DevSecOps On A Budget: Building A Secure Dev Pipeline Without Breaking The Bank - Robbie Thandi
Security Is Key: The Vulnerabilities Of API Security - Joe Wrieden
Просмотров 936 месяцев назад
Security Is Key: The Vulnerabilities Of API Security - Joe Wrieden
Breaking The Cloud: A Tale Of 3 Breaches! - Ashish Rajan
Просмотров 616 месяцев назад
Breaking The Cloud: A Tale Of 3 Breaches! - Ashish Rajan
Slightly SOSL'ed: Locating And Testing SOSL Injection - Nick Dunn
Просмотров 476 месяцев назад
Slightly SOSL'ed: Locating And Testing SOSL Injection - Nick Dunn
Bugs Are Shallow: Finding Vulnerabilities In Top GitHub Projects - Laurence Tennant
Просмотров 1226 месяцев назад
Bugs Are Shallow: Finding Vulnerabilities In Top GitHub Projects - Laurence Tennant
Physical Intrusion - Access Un-Controlled - Iain Parkes
Просмотров 1996 месяцев назад
Physical Intrusion - Access Un-Controlled - Iain Parkes
In Space; Everyone Can Hear Your Downlink Minus
Просмотров 456 месяцев назад
In Space; Everyone Can Hear Your Downlink Minus
Red Teaming On Critical Infrastructure Granit Beka
Просмотров 1576 месяцев назад
Red Teaming On Critical Infrastructure Granit Beka
XS Leaks Client Side Attacks In A Post XSS World Zeyu Zayne Zhang
Просмотров 5356 месяцев назад
XS Leaks Client Side Attacks In A Post XSS World Zeyu Zayne Zhang
Your Friendly Penguin: Using Linux And WSL To Stay Under The Radar - Idan Ron and Max De Lacey
Просмотров 866 месяцев назад
Your Friendly Penguin: Using Linux And WSL To Stay Under The Radar - Idan Ron and Max De Lacey
The Internet Never Forgets: OSINT'ing Myself To Uncover 30 Years Of Data Leakage - Thomas Preece
Просмотров 1446 месяцев назад
The Internet Never Forgets: OSINT'ing Myself To Uncover 30 Years Of Data Leakage - Thomas Preece
Wires Gone Rogue IoT Security At The Cable Level Aunart Grajqevci
Просмотров 446 месяцев назад
Wires Gone Rogue IoT Security At The Cable Level Aunart Grajqevci
Exploring The Dark Web Forums, Markets, And Scam Insights Stefan Bargan
Просмотров 1636 месяцев назад
Exploring The Dark Web Forums, Markets, And Scam Insights Stefan Bargan
Anti-forensics Techniques Used By Threat Actors In The Wild - Hela Lucas
Просмотров 1,8 тыс.6 месяцев назад
Anti-forensics Techniques Used By Threat Actors In The Wild - Hela Lucas
The Art Of Cyber Deception - Joshua Wardle
Просмотров 3766 месяцев назад
The Art Of Cyber Deception - Joshua Wardle
Decentralization: Mo' Systems, Mo' Bridges, Mo' Comms, ... Mo' Problems? - Maya Boeckh
Просмотров 636 месяцев назад
Decentralization: Mo' Systems, Mo' Bridges, Mo' Comms, ... Mo' Problems? - Maya Boeckh
Cyber Resilience @ Industry 4.0: Strengthening Standards & Embracing Emerging Tech - Shaza Al-Haddad
Просмотров 326 месяцев назад
Cyber Resilience @ Industry 4.0: Strengthening Standards & Embracing Emerging Tech - Shaza Al-Haddad
The Simple Approach To Security Risk Management Asher Selman
Просмотров 686 месяцев назад
The Simple Approach To Security Risk Management Asher Selman
The NonInclusivity Of InfoSec My Experience Dan Ogleby
Просмотров 1476 месяцев назад
The NonInclusivity Of InfoSec My Experience Dan Ogleby
Of Microchips And Mammals - Elliott Nash
Просмотров 476 месяцев назад
Of Microchips And Mammals - Elliott Nash
Great video!
Oh blessed cybersecurity professionals, Thank you for the knowledge I sought to write my paper. May you logs stay untampered and your files left intact.
Cool
Does he still write for BDSM websites?
Hi Hela. Thoroughly enjoyed your talk. I am studying cybersecurity and took some notes that have helped me with my assignments. The forensics side of things have sparked an interest in me. Any advice on where to start will be appreciated. Look forward to more presentations.
✋ 'PromoSM'
I remember my older brother editing the stats of the soldiers in X-com enemy unknown. We set the firing accuracy to the highest value, I think it was FFFFFF, at it make the ingame statbars to actually go past its max point, and start overlapping the rightside of the screen. But hey, They were accurate as hell
The current system..... Meritocracy - a society governed by people selected according to merit. What you are trying to achieve Racism - the belief that different races possess distinct characteristics, abilities, or qualities Sexism - the discrimination of a person based on their sex. Just to point out, I have about 20 years in the industry, nobody is going to hire you after a year of just fucking about pretending you are a hacker. Get some skills and stop crying that it's you need more diversity.
Just to highlight this, about 14 minutes in a listener is agreeing that we need less people with experience and more diverse people because they bring different ideas. See what I wrote about racism above, that's the definition, saying that we need diversity because it's not your experience that makes you a better employee it's the fact you are a different skin colour, religion or gender that makes you the best candidate. We fought world war 2 end this shit and you are bringing it all back.
Nice talk!
Great talk, clearly explained - thanks
Excellent talk
Thank you CyberCelt. appreciate the kind words!
@@dhruvbisani4467 Hi dhruv i attended your talk and didn’t have time to ask you some questions related to Red teaming. How can I contact you?
The "BYOVD-like attack theorised by members of UC" was not a theory. It was active years prior to 2015, there was a leak of information to abuse CPU-Z on UC around end of 2014 and then it spread like wildfire on the site. It was the go to method at the time (and other overclocking tools that let you arbitrarily rd/wr MSRs or physical memory) and still is used as mentioned. Infosec just didn't pick up on it much until 2017-2018ish because it was so dead simple that any pea brain could look at DriverObject->MajorFunction[14] and see ZwMapViewOfSection(\Device\PhysicalMemory) and go to town.
Plz unpack VMP I pay you!
All of the smartest hackers I got to work with in the industry over the years started in game hacking.
spicy
Fantastic talk, really interesting topic about exploring the dark web, a lot of really good stats about the insights around Tor (and the dark web). As Mentioned with it being Stefan's first talk, he dealt with the questions fantastically. Good job 👍👍
Fantastic talk for a recent grad and aspiring CTI analyst such as myself, well done! I hope your career has taken you far!
You're pretty flippant for a keynote speaker. When have you actually seen guns sold and shipped? Bitcoin is fake money huh? Worth more than gold. I think you mixed up some Alphabay and Empire facts. Hansa did go down for a bit under Dutch control when they were apply some of their spy tools. Cazas phone was locked. They tricked him with a story to unlock it. I think you over shot alphabays listings and users Did you call Dread Dreaditt?
Great presentation! Very professional well done!
Great!!!🇦🇿🇬🇧
Are you still doing the BDSM stories?
so clearly
So proud
Fantasztikus informatív egyben motiváló!
FYI: JWTs have been designed to offer a standardized mechanism for encoding OAuth access tokens. If you look at from this perspective then you will suddenly see a very different story.
If Eric Zimmerman gave up tomorrow what tool would you use lmao? What a great ending question 😂😂😂😂
Good information, although my only suggestion is for the speaker to get some "media training". It almost feels like rambling with the "um" and pacing around.
He's speaking just fine as he should be, I'd suggest you learn the accent instead.
@@MsShailp Learn the accent? Are you dim? Constantly saying "um" isn't a good way to present.
In my community in Winchester VA stalker ware used by the hospital homeless police
Thank you for the simple explanation! Helped me a lot than reading few research papers :D
Nice one Rory 👍
Amazing and very informative talk! I'm eager to put some of Foo's advices in practice :D
Why would you do that? You must be one of those tattle tell kids no one liked. Pussy
Thank you, awesome video
one guy's name was literally Marcos Paulo?
We need jamming ones...for sound weapons
Audio gets better after 1:27.
Great talk
First
lmao @ the botnet spam in chat
Agreed that fixing the basics gets overlooked as its not as exciting and headline grabbing as Zero days.
WTG - missed your talk on the day ... was probably drinking Guinness :P
Audio seems to kick in properly at 1:27.
The Best explanation! Thanks.
Nice. Thx
As of today 11/3 is this still running? I have not been able to get the shared AMIs
Büszkék vagyunk rád LUCA!!!
I miss the alpha bay days. Rip Alex 😢😢
they are back
Thank you 🙏 so so much RXsquad for your trustworthiness
Just legalise it ffs
They should leave the markets alone and go after c.p. credit card and hit man