I’ve enjoyed a fascinating and deeply fulfilling career in cybersecurity that has taken me all over the world, and now I want to share my experience of working in what I consider to be the most fun and exciting industry out there. That’s why I held a live event to answer questions on what it’s really like to work on digital defense’s frontline. If you’re curious about how to advance in the industry or have a friend or relative who wants to work in cybersecurity, these insights from me and from the CQURE team are for you.
Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we're able to overwrite it, and what kind of threat it exposes.
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee's profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system).
Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.
Man-in-the-middle attack (MITM) is in fact eavesdropping - a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other – either to eavesdrop or to impersonate one or both of the parties, making it appear as if a normal exchange of information is underway.
Find out answers for the most interesting questions from our last webinar “Forensics & Prevention in the New Reality”The advantage of great forensics investigators is a deep understanding of how technology really works. This helps to be always up-to-date with the fast-paced cybersecurity world. There are things you can discover on your own, and there are things you can ask us and we are happy to answer them.