Author Archive

DeepSec 2019 – Call for Papers – Security Research Results wanted!

February 18, 2019

The DeepSec 2019 In-Depth Security Conference is calling for presentations and trainings. We are interested in your information security research. Since 2007 DeepSec has aimed to provide in-depth analysis of design flaws, vulnerabilities, bugs, failures, and ways to improve our existing IT ecosystem. We need more high quality reviews of code and concepts we rely […]

Tags: ,
Posted in Call for Papers, Conference No Comments »

Supporting BSidesLondon “My Machine is not Learning” 2019

February 14, 2019

This year’s BSidesLondon is pondering the most important question of machine learning. What is my machine doing and learning? Well, it might be that “My Machine is not Learning” at all. Sounds a lot like the intelligence we all know from living beings. So, armed with this new motto, BSidesLondon is turning 9, and we […]

Tags: ,
Posted in Conference No Comments »

Save the Date for DeepINTEL and DeepSec 2019

February 8, 2019

We did some clean-up and dealt with the administrative issues of past and future events. Finally we can announce the dates for DeepINTEL 2019 and DeepSec 2019. Grab or calendars or log into them: DeepSec 2019 Trainings – 26/27 November 2019 DeepSec 2019 Conference – 28/29 November 2019 DeepINTEL 2019 – 27 November 2019 The […]

Tags: , , , ,
Posted in Administrivia, Conference, DeepIntel No Comments »

Analysing Data Leaks and avoiding early Attribution

January 4, 2019

The new year starts with the same old issues we are dealing with for years. German politicians, journalists, and other prominent figures were (are) affected by a data leak. A Twitter account started tweeting bits from the leaked data on 1 December 2018 in the fashion of an Advent calendar. The account was closed today. […]

Tags: ,
Posted in High Entropy No Comments »

Merry XSSmas and a successful new mktime() Syscall

December 21, 2018

The holidays are coming, next to Winter (hopefully). Thank you all for attending and contributing to DeepSec and DeepINTEL 2018! All slides we got are online. The videos have almost left post-production (except one recording which is being fixed audio-wise) and are on the way to the content distribution network. The ROOTS videos will be […]

Tags:
Posted in Administrivia, High Entropy No Comments »

Encryption, Ghosts, Backdoors, Interception, and Information Security

December 20, 2018

While talking about mobile network security we had a little chat about the things to come and to think about. Compromise of communication is a long time favourite. Hats of all colours need to examine metadata and data of messages. Communication is still king when it comes to threat analysis and intrusion detection. That’s nothing […]

Tags: , ,
Posted in Discussion, High Entropy No Comments »

Need something to read? – First Batch of DeepSec 2018 Presentation Slides online

December 11, 2018

Do you fear reading the news? Fancy some facts? Well, we have something different for you to read. We have collected presentation slides from DeepSec 2018 and put the first batch online. You can find them in this rather nostalgic directory listing. We have renamed the files with their title and the name of the […]

Tags: ,
Posted in Administrivia, Conference No Comments »

Thank you all for attending and speaking at DeepSec 2018!

December 3, 2018

DeepSec 2018 is over. Thank you for attending and presenting at our conference! Without your interest and your configuration there would be no talks, no workshops, and no one else present.We had a great time, and we hope you enjoyed everything. We are now dealing with the administrative backlog, the metric ton of receipts, the […]

Tags: ,
Posted in Conference, Security No Comments »

Opening & Keynote – DeepSec 2018 has started

November 29, 2018

So, now is the opening and the keynote presentation by the magnificent Peter Zinn. This means that DeepSec 2018 has officially started. Since we do not live stream the talks, we will be away from the blog and mostly from Twitter until the end of the conference. Communication in meatspace has full priority. In case […]

Tags: ,
Posted in Administrivia, Conference No Comments »

Discussing Threat Intelligence in the City of Spies – DeepINTEL 2018 has started

November 28, 2018

What’s the best place to discuss security and threat intelligence? Well, according to Austrian investigative journalist Emil Bobi there are over 7,000 spies living and working in Vienna. To quote the article: „Austria has been an international spy hub since the late 19th Century, when people from all parts of the Austro-Hungarian empire flocked to […]

Tags: , , ,
Posted in Conference, DeepIntel No Comments »

(Almost) (Pretty) Final ROOTS 2018 Schedule (last beta version) published!

November 21, 2018

We have rearranged the ROOTS 2018 schedule to its final form. You may have noticed that it is more condensed. We thought it would be easier to connect, to discuss, and to exchange ideas without the stretch over two days. Furthermore it is easier to have sessions with a specific focus when there is more […]

Tags: , ,
Posted in Administrivia, ROOTS No Comments »

Special Offer for “Mastering Web Attacks with Full-Stack Exploitation” Training – get 3 for the Price of 1

November 19, 2018

The DeepSec training Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation by Dawid Czagan has some seats left. Dawid has agreed to give away free access to two of his online courses for everyone booking tickets until Wednesday, 21 November 2018 (2359 CET). This gives you a perfect preparation for penetration testing, software development, […]

Tags: , , , ,
Posted in Conference No Comments »

Last Call for your Web Application Security Training – Break all teh Web and enjoy it!

November 9, 2018

The Internet is full of web applications. Sysadmins used to joke that HTTP is short for Hypertext Tunnelling Protocol, because anything but web content is transported via HTTP these days. It’s the best way to break out of restricted environment, too. So the chances are good that you will need the skills for dealing with […]

Tags: , , , , , ,
Posted in Conference, Security No Comments »

Binary Blob Apocalypse – Firmware + Cryptography = less Security

November 6, 2018

A couple of years ago we had a chat with one of our sponsors, Attingo. They are specialised in data recovery from all kinds of media and in all kinds of conditions. Since vendors keep secrets from the rest of the world, the data rescuers do a lot of reverse engineering in order to decode […]

Tags: , ,
Posted in High Entropy, Security No Comments »

DeepINTEL 2018 Security Intelligence Event – Preliminary Schedule is available

November 3, 2018

It took us longer than anticipated, but the schedule for DeepINTEL 2018 is final and available. The topics covered are ICT risk assessment in interconnected and complex environments, drone threats (to critical infrastructure), drone countermeasures, assessment of digital black markets (you can call them darkweb/crypto markets if you must), live threats to the information industry […]

Tags: , ,
Posted in Conference, DeepIntel No Comments »