BSidesVienna 2019 Nov. 30, 2019 to Nov. 30, 2019, Vienna, Austria
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
The rise and fall of Baldr: Frankeinstein's malware enjoys a wild ride | Albert Zsigovits | In January, 2019, SophosLabs discovered a new family of credential stealing malware that called itself ... | |
A handshake for vulnerabilities - A short dive into Krack and Dragonblood | Christoph Madelmayer | We all know and love it and would like to have it available all over ... | |
Code diving for pop chains | Wolfgang Hotwagner | PHP Object Injection is a well known web vulnerability that could allow an attacker to ... | |
AI Application for Detection of Android Malware APKs and Fake e-Commerce Websites | Roman Graf , Olivia Aaron | MAL2 project employs AI for malware and fake websites detection and comprises two parts:1. Neural ... | |
seccomp — Your Next Layer of Defense | Philipp Krenn | Why should you allow all possible system calls from your application when you know that ... | |
ÆCID: A self-learning Anomaly Detection Approach Based on Light-weight Log Analytics | Max Wurzenberger | Existing signature-based intrusion detection systems are based on manually-defined patterns that are known to correspond ... | |
When Your Biggest Threat is on Your Payroll: Drivers & Enablers of Insider Threat Activity | Christina Lekati | It is an irony in organizational security: Although so much capital is invested in the ... | |
Building a Red Team in a complex environment | Ahmed Sherif | The question which have been always asked, do we really need an offensive security team ... | |
Network Attacks for Red Teams and Blue Teams | Michael Kafka | Security features for network functions are not commonly deployed ontypical installations. This allows attackers to ... |