Our talk presents attacks on the cryptography used in the cryptocurrency IOTA, which is currently the 10th largest cryptocurrency with a market capitalization of 2.8 billion USD. IOTA is billed as a next generation blockchain for the Internet of Thin
All Posts (2220)
The term"smart city" evokes imagery of flying cars, shop windows that double as informational touchscreens, and other retro-futuristic fantasies of what the future may hold. Stepping away from the smart city fantasy, the reality is actually much more
Complexity is increasing. Trust eroding. In the wake of Spectre and Meltdown, when it seems that things cannot get any darker for processor security, the last light goes out. This talk will demonstrate what everyone has long feared but never proven:
Sniffing and attacking Bluetooth Low Energy devices has always been a real pain. Proprietary tools do the job but cannot be tuned to fit our offensive needs, while opensource tools work sometimes, but are not reliable and efficient. Even the recently
TLS 1.3 is the new secure communication protocol that should be already with us. One of its new features is 0-RTT (Zero Round Trip Time Resumption) that could potentially allow replay attacks. This is a known issue acknowledged by the TLS 1.3 specifi
In this paper, a new replay attack based on Ethereum smart contracts is presented. In the token transfer, the risk of replay attack cannot be completely avoided when the sender's signatures are abused, which can bring the loss to users. And the reaso
Given the high pace at which new malware variants are generated, antivirus programs struggle to keep their signatures up-to-date, and AV scanners suffer from a considerable quantity of false negatives. The generation of effective signatures against n
Windows Defender Antivirus's mpengine.dll implements the core of Defender's functionality in an enormous ~11 MB, 30,000+ function DLL.
In this presentation, we'll look at Defender's emulator for analysis of potentially malicious Windows binaries on
At CISO Platform 100 and Decision Summit 2018 , we had a panel discussion on the topic How to measure your breach response readiness, including industry stalwarts like
- A Shiju Rawther (TransUnion CIBIL Ltd)
- Maya R Nair ( Idea Cellular Limi
In last couple of years, there has been a increasing interest in dark web technologies. According to gathered statistics, Dark Web contains 7500 terabytes of data which is incredibly huge. Though there has been an increase in criminal activities due
Recently, you might have heard in news about COSMOS Bank, a 112-year old cooperative bank in India and the second largest in the country being hacked and crores were siphoned off. The bank lost 940 million (94 Crores) due to this breach on 11th & 13t
CISO Platform members conducted our first pilot training program for kids cyber safety at Army Public School, Mumbai with students between 8th to 11th standard actively participating in the session. Special thanks to our community members Vijay, Anup
The cyber incident of the Coop Bank heist of over Rs. 94 Cr compromised to cyber-criminals is a “wake-up” call not only for the entire Banking Sector but every technology services company and OEMs, resulting organizations are taking necessary action
Every one of us is so dependent on technology, which helps us to keep in touch with people and share information who are away from us. We use the email, social media, chat services using smartphones and computers to talk to them and even see them. As
There is a steep rise in interest from the Board & CEO of an organization to understand the security posture of their company. Partly because of the increasing pressure from the government regulators, stakeholders & discussions on the potential risk
CISO Platform conducted an online training on "Cyber Safety Training For Young Students" with 80+ students and their parents attending the webinar. We aim to provide cyber safety awareness to young students and their parents with the help of such onl
Not having real time view of your dynamic digital footprint and the risks it is introducing, leaves an organization in the dark and serves as a low hanging fruit for attackers to use this exposed information to fuel their malicious attacks. Understa
The Forrester Wave™ Guide on Web Application Firewall, Q2 2018, is a detailed guide that helps you understand the 33 criteria & How To Use To Effectively WAF, Forrester Wave, helps in Measure Up WAF Vendors which is developed by Forrester for evalua
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)