It was great to help organize R00tz (Def Con Kids Village) again this year, and to have a chance to give ITSP Magazine an inside look at our program and kid hackers!
The US Army put on a bug bounty program, highlighting pen testing techniques at Black Hat and R00tz Asylum in Las Vegas this past week at the Defcon hacking conference. They will bring this same program for both kids and adults to CornCon in Davenport, Iowa on September 8, 2018. Join us there!
Black Hat Review Board Members give their picks for must see presentations this week at Black Hat USA 2018. They have broken down the 2018 cybersecurity exploit trends into 6 categories:
Software Development
Breaking Parser Logic, Lagoon JKL, WED 4PM
AI & ML in Cybersecurity: Why Algorithms Are Dangerous, South Seas ABE, THU 11AM
Policy
Legal Liability for IoT Hacking, Lagoon JKL, THU 2:30PM
Network Defenses
ZEROing Trust: Do Zero Trust Models Provide Real Security, South Seas CDF, WED 4PM
Hardware Platform Security
Meltdown: Basics, Details, Consequences, South Pacific F, WED 2:40PM
GOD Mode Unlocked: Hardware Backdoors in x86 CPUs, South Pacific F, THU 11AM
Web Application Security
Practical Web Cache Poisoning: Redefining ‘Unexploitable’, South Seas CDF, THU 3PM
Human Factor
Infosec Philosophies for a Corrupt Economy, Islander EI, WED 5:05PM
Demystifying PTSD in the Cybersecurity Environment, South Seas ABE, THU 9AM
For more details, visit the Black Hat Briefings 2018 agenda here: https://www.blackhat.com/us-18/briefings.html
Understand real threats. Why you should only take a burner laptop to high risk countries. You can’t trust the firmware and chipsets, let alone the OS. Wiping and rebuilding is sometimes not enough.
AI tutoring shows stunning results - A new study in Nigeria just revealed that students using AI as an after-school tutor made learning gains equivalent to two years of traditional education in just six weeks — showcasing the power of AI-driven learning in developing regions.…
New Hacking Group Leaks Configuration of 15,000 Fortinet Firewalls
The firm said the data dump included FortiGate usernames, passwords (some in plain text), device management digital certificates and firewall rules. Beaumont and CloudSEK researcher, Koushik Pal, said most…