I’ve enjoyed a fascinating and deeply fulfilling career in cybersecurity that has taken me all over the world, and now I want to share my experience of working in what I consider to be the most fun and exciting industry out there. That’s why I held a live event to answer questions on what it’s really like to work on digital defense’s frontline. If you’re curious about how to advance in the industry or have a friend or relative who wants to work in cybersecurity, these insights from me and from the CQURE team are for you.
Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we're able to overwrite it, and what kind of threat it exposes.
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee's profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system).
Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.
This time we would like to invite you to the 57th Hacks Weekly episode. In this episode of Hacks Weekly re-experience with us our exclusive “all-stars” webinar: Top 6 Things on Defending Active Directory - Hidden Gems & Application Whitelisting Tips.Get ready to learn with Paula Januszkiewicz, Sami Laiho, Michael Grafnetter, Peter Pawlik & Mike Jankowski-Lorek, PhD.
This time we would like to invite you to the 56th Hacks Weekly episode. We will focus on a live memory dump and RAM Capturer software.Join us to learn how to perform live memory dumps that can be used in various forensic activities.
Welcome to another episode of the CQURE Hacks Weekly series. This time we will focus on insecure data storage. We're going to learn what insecure data storage is, how it can be exploited and what are the risks and consequences of insecure data storage.