Hacktivity2020 2020 Oct. 8, 2020 to Oct. 10, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
History of Computer Viruses Tobias Schrödel N/A
Bring Your Own Demise - The Corporate Threat of Mobile Endpoints János Pallagi Mobile devices are part of every enterprise threat model – they are desirable targets, unmanaged ...
Piotr Poberezny None
Anto Joseph None
My Wife is Watching Me: The Spy Inside All of Us. Eddy Willems During this lecture Eddy Willems will take you inside the dark world of some specific ...
Reversing Golang Binaries with Ghidra Albert Zsigovits , Dorka Palotay Golang is Google’s open source programming language which in the recent years gained popularity among ...
Machine Learning Evasion Competition Zoltan Balazs Research attacking ML-based image classifiers is common, but it is less frequent to see a ...
Blue Team over the Air : What's Going on in the Air? Besim Altinok I call wireless networking technologies invisible threats. They can be carried out easily and their ...
XPC Exploitation on macOS Csaba Fitzl While doing security research on macOS PrivilegedHelper tools I found that most of them are ...
Infra Security Automation in CI/CD: Impossible is Nothing Spyros Manglis , Davide Cioccia Agile enterprises are constantly facing new challenges when it comes to embedding security in the ...
How Soft Skills Get Hard Results Scott Asai -Why soft skills are essential for business-The connection between leadership + emotional intelligence (EQ)-3 soft ...
Penetration Testing Communication Systems Nowadays Moritz Abrell Today’s communication is no longer limited to simple IP telephony using deskphones on an office ...
Making Developers Security Aware. Lessons Learnt. Mateusz Olejarka I’ve done more than 50 security awareness workshops for software developers, for several different organizations, ...
ATTPwn: Adversary Emulation. ATT&CK Automation Tool & Collaborative Project Pablo González , Francisco Ramirez ATTPwn is a computer security tool designed to emulate adversaries. The tool is focused to ...
Unveiling Some Untold Facts Regarding Stuxnet a Decade After the Attack Dr. Mohammadreza Ashouri Stuxnet is a computer worm, which emerged during the summer of 2010 to infiltrate numerous ...
Hacking the Hacktivity 2019 Badge: How to Brick the Device and Resurrect it with Another Soul Valerio Di Giampietro The talk describes an adventure in hacking the Hacktivity 2019 badge, trying to replace the ...
Anatomy of Automated Account Takeovers Tal Eliyahu , Begum Calguner This white paper outlines the plenary mechanism of automated account takeovers (ATOs), while treating cybercrime ...
Broken IoT Supply Chain Martin Hron With the explosion of IoT, there goes hand in hand also an explosion of threats ...
The Great Hotel Hack: Adventures in Attacking Hospitality Industry Etizaz Mohsin Ever wondered your presence exposed to an unknown entity even when you are promised for ...
Service Mess to Service Mesh Rob Richardson In our quest to secure all the things, do we jump in too quickly? We’ll ...
State of the Art Phishing Sıx Phishing techniques from the latest ones to the oldest tricks in the book that still ...
Hacking Facial Recognition Systems Alex Polyakov Do you know that it is possible to create glasses to bypass facial recognition system? ...
DevSecOps in the Financial Services Industry: a Technological Approach Stéphane Chmielewski As cyber threats become more intense and taken seriously, companies in the financial services industry ...
The 5G Battle Robert d. Moody , Bence Horvath The presentation is an analysis of the threat landscape posed by the emergence of 5G ...
Paste Wars: Fighting for Copypaste Freedom Ignat Korchagin No one knows where it came from, but it is spreading like a disease: blocking ...
China's Cheap Xiaomis are Low on Privacy Gabriel Cirlig Chinese phones are cheap only if your privacy is worthless. With the advent of low ...
Working with Proof Key for Code Exchange To Communicate With The Cloud Milecia Mcgregor We all know how important web security is because it protects our personal information across ...
There is Always One More Bug - or More: Revisiting a Wireless Alarm System Matthias Deeg Developers of IT systems have known for a long time that there is still one ...
Dissecting and Comparing Different Binaries to Malware Analysis Filipi Pires Demonstrate differents kind of structures in the binaries as a PE (header and your sessions) ...
Speeding Up Linux Disk Encryption Ignat Korchagin Today all vehicles are connected through V2X technologies. All manufacturers are coming with new technologies ...