article thumbnail

Targeted Malware Reverse Engineering Workshop follow-up. Part 1

SecureList

On April 8, 2021, we conducted a webinar with Ivan Kwiatkowski and Denis Legezo , Senior Security Researchers from our Global Research & Analysis Team (GReAT), who gave live workshops on practical disassembling, decrypting and deobfuscating authentic malware cases, moderated by GReAT’s own Dan Demeter.

article thumbnail

WiCyS Launches Workforce Inclusion Workshops

SecureWorld News

Measuring Inclusion Workshops, conducted in collaboration with DEI Firm Aleria, are designed to pinpoint and remove the barriers in the cybersecurity industry that keep women from being recruited, hired, retained, and promoted at the same rate as men, according to a press release issued yesterday.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BSidesAugusta 2021 – Chris Truncer’s ‘Offensive WMI Workshop’

Security Boulevard

The post BSidesAugusta 2021 – Chris Truncer’s ‘Offensive WMI Workshop’ appeared first on Security Boulevard. Many thanks to BSidesAugusta for publishing their outstanding videos from the BSidesAugusta 2021 Conference on the organization’s YouTube channel.

article thumbnail

DEF CON 29 Cloud Village – Magno Logan’s ‘Workshop Kubernetes Security 101 Best Practices’

Security Boulevard

The post DEF CON 29 Cloud Village – Magno Logan’s ‘Workshop Kubernetes Security 101 Best Practices’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their tremendous DEFCON Conference Cloud Village videos on the groups' YouTube channel.

article thumbnail

Weekly Update 71 (Denmark Edition)

Troy Hunt

I talk about that below including the preceding days involving some pretty full on sledding in Norway, workshops, talks, ice, slush and snow. Plus, of course, the actual infosec stuff from the week namely my new Pluralsight course on creating a security-centric culture. iTunes podcast | Google Play Music podcast | RSS podcast.

InfoSec 123
article thumbnail

CISO workshop slides

Notice Bored

A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

Beg Bounties

Troy Hunt

A quick nod also to Michael Argast and Chester Wisniewski (who, incidentally, wrote the earlier mentioned Sophos article) for their role in coining the phrase: I love the fact a term I coined with @chetwisniewski after running into a bunch of these a couple of years ago is getting tweeted by @troyhunt , one of my infosec heros.

Scams 70