Plato Data Intelligence.
Vertical Search & Ai.

Tag: Def Con

Hacker Space Rogue to Release Book on Hacking Group L0pht Heavy Industries in February

PHILADELPHIA, PA, January 11, 2023 — The memoir of world-renowned hacker Cris Thomas “Space Rogue: How the Hackers Known as L0pht Changed the World”...

Beyond the Obvious: The Boldest Cybersecurity Predictions for 2023

The end of the year is upon us, and that means predictions — lots and lots of predictions. And no wonder: With 2022 in...

The ‘DEF CON Scenario’: Investors Eye Digital Currency Group After FTX’s Implosion

As FTX collapsed — and the tide came in — builders, investors, aficionados and just about anyone with a passing interest in cryptocurrencies wondered:...

AnChain.AI partners with OmyuTech to launch Japan’s first baseball…

SAN FRANCISCO (PRWEB) June 21, 2021 Silicon Valley-based digital asset platform company AnChain.AI today announced its partnership with OmyuTech, the...

Adversarial attacks in machine learning: What they are and how to stop them

Transform 2021 Elevate your enterprise data technology and strategy. July 12-16 Register Today Elevate your enterprise data...

The Race to Hack a Satellite at DEF CON

Eight teams competed to win cash, bragging rights, and the chance to control a satellite in space.At DEF CON 27 there was a...

Boeing’s DEF CON Debut a Sign of the Times

In the wake of a stalemate between the airplane manufacturer and a security researcher over vulns found in its 787 aircraft's network, Boeing...

Zoom Vulnerabilities Demonstrated in DEF CON Talk

A security researcher demonstrated multiple vulnerabilities, two of which could let an attacker read and steal user data.Zoom has patched multiple vulnerabilities discovered...

Hacking It as a CISO: Advice for Security Leadership

A security leader shares tips for adopting a CISO mindset, creating risk management strategies, and "selling infosec" to IT and executives.Modern security leaders...

Expert Comments On Nine Out Of Ten ‘Ethical’ Hackers Abuse Cloud Service Providers

Infosec pros and hackers regularly abuse cloud service providers to conduct reconnaissance and attacks, despite efforts by cloud providers to limit such activity. In...

ULTIMATE privát kulcs kezelési útmutató: hogyan VÉDD a Bitcoinjaid

A Bitcoin hihetetlen magas szintű szuverenitást biztosít a pénzük felett a felhasználóknak. Mindenki hallotta már azt a kifejezést, hogy “legyél  a saját bankod...

Black Hat and DEF CON security conferences to take place in a virtual format

Black Hat and DEF CON, the two biggest cyber-security conferences of the year, have canceled their in-person events today and announced plans...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?