conferences
Hackers the movie: A retrospective
In this lecture, Don A. Bailey will take a look back at another great milestone in information security: the movie Hackers. In this retrospective from Hack in The Box 2012, …
Video: Practical exploitation of embedded systems
This video from Hack in The Box conference is an in-depth exploration of the reverse engineering and exploitation of embedded systems. It covers hardware by showing how to …
Video: History of the JavaScript security arsenal
In 2006 we had the first JavaScript port scanner. The same year we saw the incarnation of more advanced tools such as AttackAPI, Carnaval and Backframe. A year later we saw …
Video: Data mining a mountain of vulnerabilities
Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. Veracode used static binary analysis on …
What makes a good information security professional?
Information security is a very competitive industry, and one of the very few that kept doing fine even during the recession. It’s also a dynamic field that promises a …
Video: Hacking Huawei VRP
Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make …
Huge GPU cluster makes password hacking a breeze
Cracking encrypted passwords is getting increasingly easier as researchers come up with new ways of harnessing CPU, GPU and cloud power to perform the task. The latest of the …
(IN)SECURE Magazine issue 36 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 36 has been released today. Table of contents: …
Video: Incident response and cloud computing
Moving into a cloud environment can bring many advantages to organizations in terms of flexibility, scalability and other benefits. However, it also brings a number of …
IRISSCERT warns Irish businesses on key cybercrime threats
IRISSCERT is to hold its fourth annual cybercrime conference this coming Thursday the 22nd of November where they will highlight key trends and issues that businesses in …
Life cycle and detection of an exploit kit
As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own …
Hack In The Box celebrates a decade of security conferences
Last week’s Hack In The Box Security Conference saw the return of over 40 of the most popular speakers from the last decade presenting in a triple track format over 2 …
Featured news
Resources
Don't miss
- Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844)
- Leaked Oracle EBS exploit scripts expected to drive new wave of attacks (CVE-2025-61882)
- How to get better results from bug bounty programs without wasting money
- Hackers launch data leak site to extort 39 victims, or Salesforce
- Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)