DeepSec ConferenceDeepSec2020 Press Release: Industrial control systems put to the test.When one talks about digitization, one usually means networked control and measurement systems. The associated technical term Industrial…Sep 17, 2020
DeepSec ConferenceDeepSec2020 Talk: The Art Of The Breach — Robert SellThe Art of the Breach is designed to be a journey for anyone interested in physical security. Robert takes the audience on a trip from the…Sep 16, 2020Sep 16, 2020
DeepSec ConferenceDeepSec 2020 Talk: Abusing Azure Active Directory: Who Would You Like To Be Today?This will be one of the few online talks held at DeepSec. Dr. Nestori Syynimaa covers the wonderful world of Azure AD and third-party code.Sep 14, 2020Sep 14, 2020
DeepSec ConferenceReminder for your Training @ DeepSec 2020: Bypassing CSP via ajax.googleapis.com — Dawid CzaganContent Security Policy (CSP) is the number one defensive technology in modern web applications. A good CSP offers a lot of possibilities…Sep 11, 2020Sep 11, 2020
DeepSec ConferenceDeepSec2020 Press Release: Industrial control systems put to the test.When one talks about digitization, one usually means networked control and measurement systems. The associated technical term Industrial…Sep 17, 2020
DeepSec ConferenceDeepSec2020 Talk: The Art Of The Breach — Robert SellThe Art of the Breach is designed to be a journey for anyone interested in physical security. Robert takes the audience on a trip from the…Sep 16, 2020
DeepSec ConferenceDeepSec 2020 Talk: Abusing Azure Active Directory: Who Would You Like To Be Today?This will be one of the few online talks held at DeepSec. Dr. Nestori Syynimaa covers the wonderful world of Azure AD and third-party code.Sep 14, 2020
DeepSec ConferenceReminder for your Training @ DeepSec 2020: Bypassing CSP via ajax.googleapis.com — Dawid CzaganContent Security Policy (CSP) is the number one defensive technology in modern web applications. A good CSP offers a lot of possibilities…Sep 11, 2020
DeepSec ConferenceDeepSec 2020 Training: Open Source Intelligence Gathering on Human Targets — Robert SellRobert Sell conducts a two-day training at DeepSec. In his own words: „In this workshop I provide the class with real humans (missing…Sep 10, 2020
DeepSec ConferenceDeepSec 2020 Talk: Caught in the Middle with You: Examining the Implications of Adversary Midpoint…Information security typically focuses on endpoint exploitation and manipulation. Endpoints are where our tools reside ( EDR, log sources…Sep 9, 2020
DeepSec ConferenceDeepSec 2020 Online Training: Mobile Security Testing Guide Hands-On — Sven Schleier & Ryan TeohThis online course teaches you how to analyse Android and iOS apps for security vulnerabilities, by going through the different phases of…Sep 3, 2020