I’ve enjoyed a fascinating and deeply fulfilling career in cybersecurity that has taken me all over the world, and now I want to share my experience of working in what I consider to be the most fun and exciting industry out there. That’s why I held a live event to answer questions on what it’s really like to work on digital defense’s frontline. If you’re curious about how to advance in the industry or have a friend or relative who wants to work in cybersecurity, these insights from me and from the CQURE team are for you.
Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we're able to overwrite it, and what kind of threat it exposes.
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee's profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system).
Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.
Have you ever wondered what a possible future in the cybersecurity world would be like? When you think about what has happened recently, certain common conclusions can be reached.
We are in an age where technology is becoming more and more advanced each day. Yet, in parallel, hackers and the cyber threats they launch have also become more sophisticated. It is now easier than ever to fall victim to cyberattacks.
Since the onset of computers and the internet evolved our lifestyle into a digital realm, so too has crime. Today, we don’t just face the threat of a pickpocket running away with our wallets. Our wallets, or more specifically our bank accounts, could be hacked even when we’re tucked in our beds at home, safe and sound.