Security BSides London
Security BSides London
  • Видео 280
  • Просмотров 302 942
Malware Campaign Tracking Using Big Data Analytics And Machine Learning Clustering - Daniel Johnston
Our talk introduces an innovative framework for automating the identification and handling of malware samples targeting web servers, leveraging big data analytics and machine learning to cluster and track active malware campaigns. We will demonstrate an innovative and unique framework that employs heuristic analysis to autonomously identify and process web-delivered malware samples. This framework enhances the efficiency and accuracy of malware detection in large data sets, reducing the reliance on manual intervention, and enabling near real-time threat hunting, and campaign tracking.
Building upon the collected malware data, we utilize big data analytics techniques to track and monitor m...
Просмотров: 9

Видео

How To Attack A SIEM - Daniel Crossley
Просмотров 406 часов назад
SOC teams commonly rely on Security Information and Event Management (SIEM) tools to detect, analyse, and respond to security threats. In this presentation, we will introduce key SIEM concepts and the role of the SIEM in the SOC, as well as discuss shortfalls of SIEM tools. Then we shall explore the possibility of attacks and evasion techniques in SIEMs. We will also discuss the general challen...
Let’s Phish: How To Scam Everyone, Everywhere, All At Once - Dita Pesek
Просмотров 46 часов назад
You will hear two stories of crime: the story of a kidnapped daughter and the story of a fake DJ. In these stories, we will explore key techniques that, when implemented correctly, can provide a blueprint for hacking anyone. Preparation of a Hack: Identifying the right victim and their weaknesses. This section of the talk outlines simple steps for uncovering a target's vulnerabilities that can ...
When The Hunter Becomes The Hunted: Using Minifilters To Disable EDRs - Tom Philippe
Просмотров 36 часов назад
1. Introduction This presentation will explore the use of minifilters, an essential components of EDRs, in offensive security operations, with a focus on their application in bypassing and disabling EDR systems. 2. EDR Architecture Overview We will first provide a high level description of EDR systems, their components and architecture. This is essential to understand how minifilters contribute...
Post-Quantum Cryptography For 2025 - Andy Smith
Просмотров 86 часов назад
With the first three quantum-resistant cryptographic algorithms standardised by NIST in August 2024, the starting gun has been fired on the Y2K-style problem of upgrading the crypto used in almost all of our modern electronic devices. In this session you'll learn: * What's the real threat that quantum computers pose * An overview of the options to safeguard against that threat * How techniques ...
CV Workshop - Samira Ali
Просмотров 86 часов назад
I would like to offer an engaging fun session for 45 minute about how to make your CV an A* CV in order to get job interview. I have over 14 years experience in HR & Training so I would like to share tips on how to get your foot in the door with a great CV.
Explaining ICS To A Fool Of A Took - halfling
Просмотров 76 часов назад
There are thirteen pillars upholding the critical national infrastructure (CNI) that allows for the every day running of our society. These pillars are sectors that rely on four generations of operational technology (OT) systems with the oldest generation being pre-Internet. What are these industrial control systems (ICS) that we rely on, and how are they vulnerable? This talk will outline a ge...
Using The OWASP Top 10 To Save The Astronauts From HAL - Nick Dunn
Просмотров 206 часов назад
The talk will use the OWASP Top 10 for ML and OWASP Top 10 for LLMs to anyalze the nature of the flaws in HAL 9000, the AI in 2001: A Space Odyssey, and how this led to disastrous results for the mission. There will be a discussion of failures to consider different aspects of both the LLM and ML top 10 during HAL's design and training phases, and the subsequent attempts to implement fixes durin...
Software Security Issues For Small IoT SoCs - Stephen Cravey
Просмотров 46 часов назад
Ever wondered how your smart toothbrush or connected garden rock stays secure in our digital world? As the Internet of Things (IoT) brings connectivity to everyday objects-from cars to clothing-it's more important than ever to keep these devices safe from cyber threats. But here's the challenge: many IoT gadgets run on tiny chips called Systems on Chip (SoCs) that don't have the power of full-s...
What’s Inside The Open Directory From 96 Different Threat Actors? - Alana Witten
Просмотров 126 часов назад
Understanding the TTPs used by threat actors is often only done after an incident when the damage is done, made from inferences of what they allow us to see. What if analysts had full access to exactly how these actors operate: the commands they ran, their targets, accurate geolocations, tools, and more. Luckily, over the last few years, 96 brazen threat actors, ranging from script kids to alle...
Is Your Approach To Pipeline Security Flawed? Rethinking CI/CD Security - Patricia R
Просмотров 506 часов назад
With DevSecOps becoming the standard, CI/CD pipelines have become the backbone of software development and deployment, running thousands of times a day. Each pipeline executes critical tasks such as building, testing, and deploying code - often leveraging automation and guardrails to ensure quality and security. Tools that integrate in pipelines promise to help. But what exactly is a pipeline? ...
An Introduction To Fault- Injection For Exploiting Bug-Free Code In Embedded Systems - @barsteward
Просмотров 756 часов назад
This talk will introduce attendees to fault-injection, a local attack category which is often used as the first step in the attack chain for embedded systems, and in some cases can also lead to remote attacks. It will cover the techniques which attackers use to generate security violations such as bypassing read protection, secure boot, or debug protection in embedded systems, even when the cod...
Cybersecurity’s New Imperative: Strengthening The Mental Immune System - Winn Schwartau
Просмотров 96 часов назад
This Talk is Important-very important-for the cybersecurity industry, hackers, and policymakers from the Boardroom to the Halls of Government. A long time ago, on June 27, 1991, Winn testified before the US Congress and was asked, “Mr. Schwartau: Why would the bad guys ever want to use the internet?” Today, our cognitive infrastructure is under attack, and humanity needs cybersecurity professio...
The Past, Present And Future Of Cloud-Native Security - Emma Yuan Fang
Просмотров 96 часов назад
Cloud-native has revolutionised how we build and deploy applications, but let's face it - we've made our share of mistakes along the way. From the early days of on-prem to today's massive cloud-native deployments, this has not only transformed application development but also dramatically reshaped the infrastructure, DevOps practices, and the overall security landscape. This talk takes a look a...
Welcome - BSides London
Просмотров 246 часов назад
Welcome - BSides London
BYOTB: Bring Your Own Trusted Binary - David Kennedy
Просмотров 136 часов назад
BYOTB: Bring Your Own Trusted Binary - David Kennedy
The Practical Application Of Indirect Prompt Injection Attacks - David Willis-Owen
Просмотров 186 часов назад
The Practical Application Of Indirect Prompt Injection Attacks - David Willis-Owen
Elevate Your SSRF Game: Weaponize Internal DNS Records To Expose Hidden Endpoints - Guy Arazi
Просмотров 86 часов назад
Elevate Your SSRF Game: Weaponize Internal DNS Records To Expose Hidden Endpoints - Guy Arazi
Inside The Ransomware Toolbox: How To Beat Cybercriminals At Their Own Game - Will Thomas
Просмотров 2276 часов назад
Inside The Ransomware Toolbox: How To Beat Cybercriminals At Their Own Game - Will Thomas
From Garden To Grid: Lessons From Gardening For A Resilient Cybersecurity Strategy - Becky Hall
Просмотров 66 часов назад
From Garden To Grid: Lessons From Gardening For A Resilient Cybersecurity Strategy - Becky Hall
A Guide To Compromising Phishing Infrastructure - Vangelis Stykas & Felipe Solferini
Просмотров 156 часов назад
A Guide To Compromising Phishing Infrastructure - Vangelis Stykas & Felipe Solferini
Building The ATT&CK Pipeline For Linux - Tim Wadhwa-Brown
Просмотров 26 часов назад
Building The ATT&CK Pipeline For Linux - Tim Wadhwa-Brown
Closing Bits, Raffle And Prize Awards - BSides London
Просмотров 16 часов назад
Closing Bits, Raffle And Prize Awards - BSides London
MSSP, MDR, MFA - So Why Isn't Incident Response Solved? - Tim Haynes
Просмотров 356 часов назад
MSSP, MDR, MFA - So Why Isn't Incident Response Solved? - Tim Haynes
Turning To The Dark Side: Utilizing Offensive Techniques In Incident Response - Archie Essien
Просмотров 206 часов назад
Turning To The Dark Side: Utilizing Offensive Techniques In Incident Response - Archie Essien
Memoryless Peripherals And Secure Notebooks - Kai Harris
Просмотров 176 часов назад
Memoryless Peripherals And Secure Notebooks - Kai Harris
The Trustworthiness Of Generative AI In Real-Time Decision-Making - Meet Bhorania and Yash Akbari
Просмотров 626 часов назад
The Trustworthiness Of Generative AI In Real-Time Decision-Making - Meet Bhorania and Yash Akbari
Do Loop Back In Anger - Shane Bourne
Просмотров 106 часов назад
Do Loop Back In Anger - Shane Bourne
Disabling Drones: Disruption And Forensic Data Analysis - Paavai Aram
Просмотров 306 часов назад
Disabling Drones: Disruption And Forensic Data Analysis - Paavai Aram
Quantum Safe Cryptography: A Buzzword Or Something More Serious? - Suketu
Просмотров 156 часов назад
Quantum Safe Cryptography: A Buzzword Or Something More Serious? - Suketu

Комментарии

  • @riocandida
    @riocandida 17 минут назад

    Great work Kartik!

  • @MrJibble
    @MrJibble 9 часов назад

    Smashing that like button

  • @MrJibble
    @MrJibble 9 часов назад

    Smashing that like button

  • @cirriustech
    @cirriustech 21 час назад

    Brilliant talk! Some hard questions there too!

  • @PavanKanwar-u7o
    @PavanKanwar-u7o 28 дней назад

    Love these guys.

  • @nayanviroja4393
    @nayanviroja4393 29 дней назад

    so much useful to a big mass

  • @VijayKumar-jg5dg
    @VijayKumar-jg5dg Месяц назад

    Extra ordinary. & Commendable

  • @oriakhiosato8929
    @oriakhiosato8929 Месяц назад

    Nice, how amazing robotics engineering has upgraded and also improved our lives 😊😊😊

  • @ManishaBhorania
    @ManishaBhorania Месяц назад

    Amazing 👏

  • @akhil999in
    @akhil999in Месяц назад

    (( aa )) is there any cryptographic process that keeps the secret even if the trusted friend is really an enemy ? that after all is often the suspicion in society. (( bb )) can scientific discovery be seen as a process of partially decrypting the universe, and the universe as an encrypted form of its underlying code ?

  • @robertvangeel3599
    @robertvangeel3599 Месяц назад

    The key is at 6:46 because it's totally not obvious why that is. Why is doing "two times a complex operation on point A (so doubling A), followed once by the same operation on the resulting point B (so doubling B, which is 4 times A)" the same as doing "four times the initial complex operation on point A". Doubling A, and then doubling the result B again are 2 calculations. But four times an addition of A is four operations. That's like a rubiks cube: the order of twists is very relevant to where you end up. I mean, I have to assume these statements are correct but it is not obvious why. In fact, I think that the amount of math behind that is enormous. But exactly that is the bread&butter of this algorithm.

  • @TheJackTheLion
    @TheJackTheLion 2 месяца назад

    Who is here because of Task 3?

  • @termuxBugHunter
    @termuxBugHunter 2 месяца назад

    2024 watch this video🎉

  • @uug4na
    @uug4na 2 месяца назад

    great

  • @zombieboyxx
    @zombieboyxx 5 месяцев назад

    I have been watching countless videos on how to get started in cyber sec and this video was hilariously to the point!! thanks for everything

  • @polar_MZ
    @polar_MZ 5 месяцев назад

    We ran the exploit 16 times 😂😂

  • @AdamLarge-f7h
    @AdamLarge-f7h 7 месяцев назад

    Great video!

  • @tryhardname
    @tryhardname 7 месяцев назад

    Oh blessed cybersecurity professionals, Thank you for the knowledge I sought to write my paper. May you logs stay untampered and your files left intact.

  • @Noctuu
    @Noctuu 8 месяцев назад

    Cool

  • @inurspace
    @inurspace 11 месяцев назад

    Hi Hela. Thoroughly enjoyed your talk. I am studying cybersecurity and took some notes that have helped me with my assignments. The forensics side of things have sparked an interest in me. Any advice on where to start will be appreciated. Look forward to more presentations.

  • @roselynrobin4525
    @roselynrobin4525 11 месяцев назад

    ✋ 'PromoSM'

  • @ErikKarlsson-m6i
    @ErikKarlsson-m6i 11 месяцев назад

    I remember my older brother editing the stats of the soldiers in X-com enemy unknown. We set the firing accuracy to the highest value, I think it was FFFFFF, at it make the ingame statbars to actually go past its max point, and start overlapping the rightside of the screen. But hey, They were accurate as hell

  • @golangismyjam
    @golangismyjam Год назад

    The current system..... Meritocracy - a society governed by people selected according to merit. What you are trying to achieve Racism - the belief that different races possess distinct characteristics, abilities, or qualities Sexism - the discrimination of a person based on their sex. Just to point out, I have about 20 years in the industry, nobody is going to hire you after a year of just fucking about pretending you are a hacker. Get some skills and stop crying that it's you need more diversity.

    • @golangismyjam
      @golangismyjam Год назад

      Just to highlight this, about 14 minutes in a listener is agreeing that we need less people with experience and more diverse people because they bring different ideas. See what I wrote about racism above, that's the definition, saying that we need diversity because it's not your experience that makes you a better employee it's the fact you are a different skin colour, religion or gender that makes you the best candidate. We fought world war 2 end this shit and you are bringing it all back.

  • @_CryptoCat
    @_CryptoCat Год назад

    Nice talk!

  • @tonybutt3543
    @tonybutt3543 Год назад

    Great talk, clearly explained - thanks

  • @CyberCelt.
    @CyberCelt. Год назад

    Excellent talk

    • @dhruvbisani4467
      @dhruvbisani4467 Год назад

      Thank you CyberCelt. appreciate the kind words!

    • @streamkeeper4462
      @streamkeeper4462 10 месяцев назад

      ⁠​⁠​⁠@@dhruvbisani4467 Hi dhruv i attended your talk and didn’t have time to ask you some questions related to Red teaming. How can I contact you?

  • @debug0sec
    @debug0sec Год назад

    The "BYOVD-like attack theorised by members of UC" was not a theory. It was active years prior to 2015, there was a leak of information to abuse CPU-Z on UC around end of 2014 and then it spread like wildfire on the site. It was the go to method at the time (and other overclocking tools that let you arbitrarily rd/wr MSRs or physical memory) and still is used as mentioned. Infosec just didn't pick up on it much until 2017-2018ish because it was so dead simple that any pea brain could look at DriverObject->MajorFunction[14] and see ZwMapViewOfSection(\Device\PhysicalMemory) and go to town.

  • @OALABS
    @OALABS Год назад

    Plz unpack VMP I pay you!

  • @asphyxxiant
    @asphyxxiant Год назад

    All of the smartest hackers I got to work with in the industry over the years started in game hacking.

  • @pandisee
    @pandisee Год назад

    spicy

  • @sonofdom9828
    @sonofdom9828 Год назад

    Fantastic talk, really interesting topic about exploring the dark web, a lot of really good stats about the insights around Tor (and the dark web). As Mentioned with it being Stefan's first talk, he dealt with the questions fantastically. Good job 👍👍

  • @dolboebkorova3516
    @dolboebkorova3516 Год назад

    Fantastic talk for a recent grad and aspiring CTI analyst such as myself, well done! I hope your career has taken you far!

  • @ChrisHaefner
    @ChrisHaefner Год назад

    You're pretty flippant for a keynote speaker. When have you actually seen guns sold and shipped? Bitcoin is fake money huh? Worth more than gold. I think you mixed up some Alphabay and Empire facts. Hansa did go down for a bit under Dutch control when they were apply some of their spy tools. Cazas phone was locked. They tricked him with a story to unlock it. I think you over shot alphabays listings and users Did you call Dread Dreaditt?

  • @RaanaButt-hb1iw
    @RaanaButt-hb1iw Год назад

    Great presentation! Very professional well done!

  • @ФрэнкКастл-з2з
    @ФрэнкКастл-з2з Год назад

    Great!!!🇦🇿🇬🇧

  • @lapetiteanessesoap7559
    @lapetiteanessesoap7559 Год назад

    so clearly

  • @dawncasey7124
    @dawncasey7124 Год назад

    So proud

  • @miklosdallos
    @miklosdallos Год назад

    Fantasztikus informatív egyben motiváló!

  • @HannesTschofenig
    @HannesTschofenig 2 года назад

    FYI: JWTs have been designed to offer a standardized mechanism for encoding OAuth access tokens. If you look at from this perspective then you will suddenly see a very different story.

  • @GearHeads09
    @GearHeads09 2 года назад

    If Eric Zimmerman gave up tomorrow what tool would you use lmao? What a great ending question 😂😂😂😂

  • @awdwadawda352
    @awdwadawda352 2 года назад

    Good information, although my only suggestion is for the speaker to get some "media training". It almost feels like rambling with the "um" and pacing around.

    • @MsShailp
      @MsShailp Год назад

      He's speaking just fine as he should be, I'd suggest you learn the accent instead.

    • @awdwadawda352
      @awdwadawda352 Год назад

      @@MsShailp Learn the accent? Are you dim? Constantly saying "um" isn't a good way to present.

  • @dextrexing5218
    @dextrexing5218 2 года назад

    In my community in Winchester VA stalker ware used by the hospital homeless police

  • @harziraaa
    @harziraaa 2 года назад

    Thank you for the simple explanation! Helped me a lot than reading few research papers :D

  • @TheRen0gade
    @TheRen0gade 2 года назад

    Nice one Rory 👍

  • @FrancescoMarino89
    @FrancescoMarino89 2 года назад

    Amazing and very informative talk! I'm eager to put some of Foo's advices in practice :D

  • @jm1503
    @jm1503 2 года назад

    Why would you do that? You must be one of those tattle tell kids no one liked. Pussy

  • @pauraspatil9314
    @pauraspatil9314 2 года назад

    Thank you, awesome video

  • @thewhitefalcon8539
    @thewhitefalcon8539 2 года назад

    one guy's name was literally Marcos Paulo?

  • @device.eula.IMEI.manifest
    @device.eula.IMEI.manifest 2 года назад

    We need jamming ones...for sound weapons

  • @Ichinin
    @Ichinin 3 года назад

    Audio gets better after 1:27.