CyberThreat 2018 Feb. 27, 2018 to Feb. 28, 2018, na,na

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome Address & Opening Remarks James Lyne , Paul Chichester N/A
Keynote: Adventures in Bug-hunting David Litchfield David talks about some of the more interesting bugs he has found over the years ...
Hunting Memory Anomalies Alex davies The use of memory injection techniques for nefarious purposes has now become common place in ...
Hacking Civil Drones Aatif Khan This talk will cover: Security issues of Civil Drones; Laws in UK for using private ...
Secure Code: Not Actually That Easy Smarty Pants Rachelle Saunders Security often blames development. Development often blames security. Rachelle takes a look at some of ...
Attribution 2.0 Costin Raiu Attribution has always been hard. Leveraging machine learning and big data, several new technologies have ...
Hunting for Lateral Movement: Foundation, Attacker Actions, and Repeatable Methodology to Detect Ryan Nolette After a compromise, most attackers go sideways. Progressively moving deeper in the network, compromising sy`ms ...
Day 2 Opening Remarks James Lyne , Paul Chichester N/A
A Look at Memory Disclosure Bugs Steve Sims Most security professionals are familiar with an effective exploit mitigation known as address space layout ...
Hunting Pastebin for Fun and for Profit Kevin Breen From a security analytics and Threat Intelligence perspective Pastebin is a treasure trove of information. ...
Analysing the Bad for a Greater Good Bogdan Necula A case study on turning inside out a leaked booter database from a threat intel ...
Think Your VPN is Secure? Think Again... Graham Bartlett In this session the speaker will describe how common VPN architectures have evolved over the ...
Threat Intelligence in Practice: Operation Cloud Hopper and the After Effects Jason Smart , Rachel Mullan An account of our investigation into one of the largest sustained espionage campaigns focused on ...
Proactive Hunting for Active Subdomain Takeovers Patrik Hudak , Stijn Vande Casteele The talk will explain the technical details of subdomain takeover, which is an emerging threat ...
Smashing CTF Challenges – Live Demos of Reversing, Code Breaking and Problem Solving Conor Kelly , Owen Hayman , Simon Mcnamee Wondering how that CTF challenge worked? Why couldn't you quite get it to spit out ...
Closing Remarks James Lyne , Paul Chichester N/A