Social Network For Security Executives: Network, Learn & Collaborate
Building an Android Scale Incident Response Process
The Android ecosystem has over one billion active devices from hundreds of OEMs and carrier networks. The Android Security Team will explain how the ecosystem is able to respond quickly and effectively to security incidents. This will be part historical analysis of actual incidents, such as the Stagefright vulnerabilities, and part data-focused analysis of technology and processes…
ContinueAdded by pritha on March 23, 2016 at 12:56pm — No Comments
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware
This session will cover two key trends in mobile malware observed over the past 12 months and explore the evolution in fraud-linked mobile malware where criminals are developing credential theft tools that attempt to duplicate the successes of Windows malware in modifying victim interactions with targeted services. Also a look at mobile ransomware variants…
ContinueAdded by pritha on March 23, 2016 at 12:56pm — No Comments
Finding Triggered Malice in Android Apps
Traditional techniques to detect malice in Android apps struggle to identify trigger-based changes to application logic. Unfortunately, such triggers are a key component of targeted malware, where the trigger is the mechanism that ensures that the code is only executed at the target. This talk will review how static analysis can be used to detect and leverage triggers for more robust…
ContinueAdded by pritha on March 23, 2016 at 12:56pm — No Comments
How to Analyze an Android Bot
This presentation will demonstrate a complete end-to-end analysis of an Android bot. This will include the decompilation and static analysis of bot code and the dynamic analysis of the bot’s behavior in a controlled sandboxed environment. The session will provide details of the lab environment and tools used for the analysis.…
ContinueAdded by pritha on March 23, 2016 at 12:50pm — No Comments
The State of End-User Security—Global Data from 30,000+ Websites
We live in a rapidly changing environment. Mobile commerce is skyrocketing, browsers/OS are changing, web applications enable increasing functionality—yet the only thing that seems constant is the amount of flaws and vulnerabilities we find in these software components. Using data from more than 30,000 websites, this session will explore the state of security ecosystem…
ContinueAdded by pritha on March 23, 2016 at 12:48pm — No Comments
Android Serialization Vulnerabilities Revisited
This session is about Android Serialization vulnerabilities. We revisit two vulns found in Android (CVE-2014-7911, CVE-2015-3837) which allowed for privilege escalation. We also present vulns found in third-party SDKs (CVE-2015-2000/1/2/3/4/20) which allowed for arbitrary code execution in apps which used them. But what has been done to prevent similar vulns? The session will answer…
ContinueAdded by pritha on March 23, 2016 at 12:48pm — No Comments
Hacking Exposed: The Mac Attack
Windows attacks receive all the attention. However, Mac and Linux have gained in popularity with the adversary. This session will focus on common Mac attack vectors and other cross-platform hacks that are typically seen in enterprise intrusions. We will also cover practical counter measures to make these alternate platforms more resilient.…
ContinueAdded by pritha on March 23, 2016 at 12:48pm — No Comments
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Imagine being dependent on a wireless infusion pump to receive the correct dosage of life-supporting medication. Now imagine the implications, were that pump to be maliciously hacked. In this session learn more about how to successfully secure these medical devices, based on work being conducted at the National Cybersecurity Center of Excellence (NCCoE) with…
ContinueAdded by pritha on March 23, 2016 at 12:30pm — No Comments
Facebook Fixes Major 'Brute Force' Bug - 9th Mar
Bangalore-based Anand Prakash discovered a serious flaw on the developer sites beta.facebook.com and mbasic.beta.facebook.com.…
ContinueAdded by pritha on March 15, 2016 at 7:00pm — No Comments
Your organization is already moving to the cloud; the question is, are you going to blindly follow the movement or will you lead the charge? Your IT security team needs the right tools to gain visibility and understanding into your employees’ use of cloud applications, both sanctioned and “shadow IT.”You can take back control and enable…
ContinueAdded by pritha on March 9, 2016 at 2:30pm — No Comments
Glibc Flaw Affects Thousands Of Linux Apps But How Dangerous Is It? -17 Feb
Researchers at Google and Red Hat disclosed…
ContinueAdded by pritha on March 1, 2016 at 11:00pm — No Comments
2020
2019
2018
2017
2016
2015
2014
2013
2012
1999
Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies 0 Likes
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies 0 Likes
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies 0 Likes
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue
Started by CISO Platform. Last reply by Bhushan Deo Mar 20, 2020. 12 Replies 0 Likes
(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue
Tags: #COVID19
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
Follow us
© 2021 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service