1
8
submitted 1 year ago* (last edited 1 week ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
2
3

Explore new approaches, tools, and techniques to combat identity-based attack paths. Discover the latest trends, research from frontline practitioners, case studies and firsthand experiences

Schedule

Playlist

3
1
4
4
5
9
submitted 1 week ago* (last edited 1 week ago) by ashar@infosec.pub to c/security_cpe@infosec.pub

In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changed everything.

Sources

https://www.rechtspraak.nl/Organisatie-en-contact/Organisatie/Rechtbanken/Rechtbank-Oost-Brabant/Nieuws/Paginas/Developer-of-Tornado-Cash-gets-jail-sentence-for-laundering-billions-of-dollars-in-cryptocurrency.aspx

https://www.ic3.gov/Media/Y2024/PSA240425

https://www.tabnak.ir/fa/news/1225983/کسر-۳-میلیون-تومان-از-حساب-افراد-بابت-بی-حجابی

https://www.independentpersian.com/node/348011/سیاسی-و-اجتماعی/قرار-است-بخشی-از-کسر-بودجه-از-جزای-نقدی-قانون-حجاب-اجباری-تامین-شود#:~:text=قرار%20است%20بخشی%20از%20کسر%20بودجه%20از%20جزای,۱۸%20تا%20۳۶%20میلیون%20تومان»%20تعیین%20شده%20است

https://www.coinspeaker.com/arrest-bitcoin-advocate-ziya-sadr/

https://www.eff.org/deeplinks/2023/08/tornado-cash-civil-decision-limits-reach-treasury-departments-actions-while

Attribution

Darknet Diaries is created by Jack Rhysider.

This episode was researched and written by Fiona Guy.

Assembled by Tristan Ledger.

Episode artwork by odibagas.

Mixing by Proximity Sound.

Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.

6
14

Error Code podcast. EP 40: Hacking IoT Surveillance Cameras For Espionage Operations

That camera above your head might not seem like a good foreign target, yet in the Ukraine there’s evidence of Russian-backed hackers passively counting the number of foreign aid workers at the local train stations. Andrew Hural of UnderDefense talks about the need to secure everything around a person, everything around an organization, and everything around a nation because every one can be a target.

7
3
8
4
9
2

Defense in Depth podcast - Securing Identities in the Cloud

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is our sponsored guest, Adam Bateman, CEO, Push Security.

The SaaS attacks matrix community resource mentioned by Adam in the episode can be found here.

Editorial note: Geoff Belknap is an advisor to Push Security.

In this episode:

  • Where are we going wrong

  • Finding the missing pieces

  • Protecting an expanding border

  • It starts with understanding risk

10
3

fwd:cloudsec is a non-profit conference on cloud security. At this conference you can expect discussions about all the major cloud platforms, both attack and defense research, limitations of security features, the pros and cons of different security strategies, and generally the types of things cloud practitioners want to know, but that don't fit neatly into a vendor conference schedule.

fwd:cloudsec North America 2024 playlist

fwd:cloudsec North America 2024 Schedule

11
4
12
2
13
3
14
5
15
2
BSides Buffalo 2024 - 12 talks (www.bsidesbuffalo.org)
16
1

Was ist eigentlich das IGERla? Das IGERla ist eine verkleinerte Variante der Intergalaktischen Erfahrungsreise (IGER, siehe nächster Abschnitt). Sie findet 2024 anstatt einer “großen” IGER statt, um das Orga-Team zu schonen. Die Location und das Grundkonzept bleiben gleich; ein paar der in der folgenden Sektion genannten “Standards” werden wir in diesem Jahr möglicherweise nicht erfüllen können.

IGER Programm

IGER 2024 Playlist

17
7
Darknet Diaries EP 146: ANOM (darknetdiaries.com)

In this episode, Joseph Cox ( https://infosec.exchange/deck/@josephcox)) tells us the story of ANOM. A secure phone made by criminals, for criminals.

This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

18
2

BSidesCharm is a regional Security BSides held in the Baltimore region of Maryland. It operates under the umbrella principles of Security BSides as a larger community project within information security. BSides aims to offer small, intimate events where all participants can engage each other to help develop connections, friendships, and network with different industry professionals.

BSidesCharm Playlist

BSidesCharm Schedule

19
2

Symposium sur la sécurité des technologies de l'information et des communications

Programme du SSTIC 2024 : Agenda du 5 au 7 juin 2024

Streaming

20
8
Botconf 2024 (external-content.duckduckgo.com)

Botconf typically gathers 400 people from all around the world and various backgrounds. They all share the same goal of fighting malware, but with complimentary approaches: law enforcement, academia, CSIRT, threat analysis teams, antivirus developers, etc.

Botconf 2024 Playlist

Botconf 2024 Schedule

21
3
Bsides Seattle 2024 (infosec.pub)

BSides Seattle is a community based conference for individuals in or interested in Information Security. Founded in 2012, BSides Seattle continues to provide space for the open sharing of ideas, concepts and debates. A place where security geeks of all ages, all levels of learning, all walks of life can bring their true selves and learn amazing things

Bsides Seattle 2024 schedule

Bsides Seattle 2024 Playlist

22
1

Insomni'hack is a Swiss security conference and hacking contest founded and organized by SCRT S.A.

Insomni'hack 2024 Schedule from the website

Insomni'hack Playlist

23
2

Welcome to SCYTHE's fifth annual UniCon, a free virtual all-day purple teaming conference held on April 9, National Unicorn Day!

#UniCon24 Theme: Strengthening Cyber Resilience

UniCon 2024 Schedule

UniCon 2024 Playlist

Opening Keynote: -Dave Kennedy - Co-Founder & Chief Hacking Officer, TrustedSec

Keynote: -Jake Williams - Enterprise Risk Management Expert

Closing Keynote: -Bryson Bort - CEO & Founder, SCYTHE

Acclaimed speakers (alphabetical order) include: -Zack Allen, Director, Datadog -Lesley Carhart, Technical Director, Dragos, Inc. -Nicholas Carroll, Cyber Incident Response Manager, Raytheon -Jeremiah Dewey, SVP, Rapid7 -Thomas VanNorman, CISSP, GICSP, SVP, GRIMM Cyber -Tarah M. Wheeler, CEO, Red Queen Dynamics

24
5
25
5
view more: next ›

Security CPE

284 readers
5 users here now

Video and audio media that count towards your CPE (Continuing Professional Education) requirements for GIAC, CISSP, CISM, CRISC, CCSP, CompTIA certs.

Mostly conference talks and podcasts.

FAQ

founded 1 year ago
MODERATORS