English
With an estimated 80% of today's malicious code employing anti-detection and anti-analysis mechanisms, security teams are in an intractable arms race. Attackers build or buy evasive malware to extend dwell time and accomplish their cyber objectives. In response, security teams roll out next-gen technologies...
English
Virtual machine escape: exploiting vulnerabilities in Qemu to escape from a virtual machine
Row-hammer bug: exploiting a hardware bug to authenticate on a co-hosted VM (demo)
Mitigations
Português
- Escape da máquina virtual: explorando vulnerabilidades no Qemu para escapar de um máquina...
English
In the beginning, the Genesis age of the Internet offered positive opportunities for connectivity, creativity and commercial opportunities, and shrunk the potential of low cost access to communications to all. However, as time has always demonstrated, no matter the landscape, the dark clouds of criminality...
English
Internet is the biggest public avenue of the world with all people, assets and data flowing over its digital roads but no effective police to guard the users from cyber criminals' attacks. What is the reason? There is no jurisdiction defined to their actuation. Actually, the increase of privacy rules can...
The keynote kicks off the summit with a review of the threat landscape, highlighting the state of cybersecurity solutions and services, as well as the contemporary technologies that could impact the industry. The industry is likely to witness new attack trends, including newer forms of mobile attacks, wipers deployed...
Given the increase in sophisticated attacks, CISOs are constantly working toward developing detection, response and recovery capabilities, while prevention tops the wish list.
The Security Operations Center has been the foundation for incident detection and response, but its effectiveness is being...
Resources and security controls deployed for early detection are turning out to be futile when it comes to dealing with today's emerging threats. This session details an effective approach to threat hunting, which includes response to advanced attacks. Threat hunting is emerging as a new line of defense and is the...
How can a cognitive/deep-learning system be designed that constantly teaches itself about evolving trends and anomalies, based on the tremendous amount of data available to enterprises today?
The goal is to use artificial intelligence and machine learning to reduce dependence on human insight and intervention,...
Mobile banking continues to evolve at a staggering rate. However, with mobile operating systems and their varying support of security best practices, multiple new threat vectors are being introduced, and many are already being widely utilized for malicious purposes.
There are now more than 10 million rogue mobile...
As fraudsters continually refine their techniques to steal customers' credentials, organizations have found new ways to fight back with new tools that use behavioral biometrics and cognitive fraud detection.
It is critical to know how cognitive abilities would help in managing risks, compliance and governance as...
Aadhaar - the largest biometric-based unique identification system in the world - holds the sensitive personal data of over 1.2 billion Indian citizens. With repositories of personal data held by both private companies and government, Aadhar has come under the lens for frequent data security lapses, and critics have...
Payments technology changes rapidly, and cybercriminal techniques are having no trouble keeping pace. As the use of stolen data and fraudulent cards become more difficult, criminals are shifting their focus and innovating to access customer payment transaction data. The risk of data theft is very real. To stay ahead,...
According to a recent Gartner report, Blockchain distributed ledger technology has reached the peak of its hype cycle and remains at the peak of inflated expectations. It offers enormous promise, but enterprises are unsure how to extract business value from it. The question all security and fraud practitioners across...
While encryption, data loss prevention and web filtering technologies will continue to be important, Cloud Access Security Brokers will play a critical role in improving cloud security.
CASB, which is a next-generation firewall, helps CISOs gain the necessary visibility, map risks and detect external and internal...
Critical infrastructure - energy, defense and transportation among the components - forms the backbone of a nation's economy, security and health. Hence, it is imperative to secure critical infrastructure elements, such as power grids, communication and finance.
State-sponsored attacks are gaining momentum and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.