Penetration testing is one of the most prevalent security practices of the industry. It is required by a lot of regulation entities and done by most large and mid-sized organizations. However, not ...
LLVM is a set of powerful compiler and toolchain technologies, due to its modularity and the ability to add functionality using passes, it attracted many developers and hackers, LLVM can be used fo...
In this session, we will discuss number of Cyber law clauses that should be considered in developing software applications, we will go through the final draft of the executive regulation to highlig...
This session will provide Members with an insight into the world of critical vulnerabilities in modern processors. While most computer programs can only access their own data, a malicious program t...
Cyber-attacks happen every day. Cyber threats are constantly growing in frequency, complexity and obfuscation, as they try to compromise defenses. Adversaries currently use complicated intrusion ki...
Cybercriminal activity in underground markets constantly fluctuates in response to different factors, such as real-world market movements or the availability of new tools or technology. Studying th...
In January 2009 we witnessed the birth of the first viable digital currency, called bitcoin this new form of money was born on the internet. What incredible and provocative idea. A currency without...
Key Risk Indicators (KRIs) can help you to translate your organization cyber security postures into numbers, The session will cover how to create your organization cyber security Key Risk Indicator...
In this session, we will cover the following points: Defining OT and IT Difference between IT and OT IT/OT Convergence ICS Types Of ICS Best Practices to Secure ICS Threat Hunting OT Secur...
I have been performing security code review professionally since 2009, approximately 100M LoC later, things started to clear up (no kidding) and some patterns started to emerge. Code is more than j...
In this session will discuss how to get into hardware hacking.The presentation will cover: * What is hardware hacking? * What protocols and interfaces exist that enable you to communicate ...
Security landscape never stands still. We see new kinds of threats from new kinds of attackers all the time. As the enemy changes, we security people need to change as well. Our job is to protect t...
Memory-safety related implementation errors are the most common vulnerabilities used by attackers to gain control over the execution-flow of an application. By exploiting these vulnerabilities, an ...
In this talk, we will discuss some of the regional APT attacks that despite its importance, it didn’t gain the deserved research and community attention and went unnoticed. While in the same time, ...
Over the last several years, the industry has experienced a spike in research focused on finding a wide variety of vulnerabilities in PDF rendering applications. Just take a look at the security ad...
The talk will discuss the different implementation scenarios of various open source security tools to cover endpoint protection, Security Information Management, automated code security checks, net...
The Windows PC continues to be the primary productivity device in enterprises small and large alike. Due to its ubiquity, the Windows desktop remains the preferred platform for attackers to gain an...
This talk will cover the DNS protocol since its inception in 1986 and taking a deep-dive into the inherit lack of security at its core design and how all modern operating systems using insecure sta...
Organized and structure processes in the SDLC are essential to a successful security assurance program. In this session we will discuss how individual practices like threat modelling, SAST and DAST...
Zero to Hundred in 1 ½ years of building the infosec program @ Careem. In this talk we will discuss the Careem Security teams’ journey towards implementing a zero trust network in a both a cloud n...
Abdul-Aziz Hariri is a security researcher with the Zero Day Initiative program. In this role, Hariri analyzes and performs root-cause analysis on hundreds of vulnerabilities submitted to the Zero ...