DEF CON 31

DEF CON 31 – Wesley McGrew’s ‘Retro Exploitation – Vintage Computing As A Vuln Research Playground’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 9: Perception vs. ConceptionThe concepts discussed in this post are related to those discussed in the 9th session of the DCP Live podcast. If you find this information interesting, I highly ...

Let’s Embrace Death in the Software Development Lifecycle

|
At some point we must say goodbye to our beloved products. Mend.io VP of Product Jeff Martin explains why letting go keeps companies alive. The post Let’s Embrace Death in the Software ...
Daniel Stori's ‘Cloud Autoscaling Revealed

Daniel Stori’s ‘Cloud Autoscaling Revealed

via the webcomic talent of the inimitable Daniel Stori at Turnoff.US. Permalink ...
Bloodhound Enterprise: securing Active Directory using graph theory

Bloodhound Enterprise: securing Active Directory using graph theory

BloodHound Enterprise: securing Active Directory using graphsPrior to my employment at SpecterOps, I hadn’t worked in the information security industry- as a result, many security related terms and concepts that were tossed around ...

Beyond Cybersecurity: How BlackCloak is Shaping the Digital Future

Innovation goes beyond being the first, and as the Pioneers of Personal Cybersecurity™, BlackCloak continually pushes the boundaries of what’s possible. We never waver in our commitment to protecting the digital lives ...
Cybersecurity Insights with Contrast CISO David Lindner | 10/20

Cybersecurity Insights with Contrast CISO David Lindner | 10/20

Insight #1 It’s time to stop measuring your security organization success by the number of vulnerabilities you find. Security is a journey not a destination. Measure how quickly you are mitigating the ...
VMware Aria Operations for Logs CVE-2023-34051 Technical Deep Dive and IOCs

VMware Aria Operations for Logs CVE-2023-34051 Technical Deep Dive and IOCs

| | Blog, Red Team
Introduction This report is a follow up to https://www.horizon3.ai/vmware-vrealize-log-insight-vmsa-2023-0001-technical-deep-dive/. Earlier this year we reported the technical details for VMSA-2023-0001 affecting VMware Aria Operations for Logs (formerly VMware vRealize Log Insight). […] The ...
DEF CON 31

DEF CON 31 – ElfMaster’s ‘Revolutionizing ELF Binary Patching With Shiva A JIT Binary Patching System For Linux’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...

Navigating the New CFPB Rule on Open Banking: The Details

Our sources in Washington were right. The Consumer Financial Protection Bureau (CFPB) announced with the rule and set forth an ambitious goal that’s bound to redefine the contours of the financial world ...