Don’t _miss

Wire Festival

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam blandit hendrerit faucibus turpis dui.

Useful links

Call For Papers

Tickets & Merch

Sponsorship

Presentations

Workshop sessions

Speakers

Venue info

 

<We_can_help/>

What are you looking for?

<Good_things_happen/> Welcome to Conference

d

Copyright @ Select-themes

Follow us

Some new and old tools are getting more and more together. Scapy is a Python Library to create packets, Python is the defacto standard for a lot of use cases in IT and Cars are becoming more and more software centric. The transformation from CAN-Bus to Ethernet-Network in the industry is in full swing and the light is on the horizont of the cars as well. Scapy is an incredible library to craft packets. You can define a packet and

"Everyone loves to play a good First Person Shooter, but not everyone opens up a Ghidra session to analyze its code, understand its behavior, and find mistakes in the code.The goal of the project was to understand the internals of CS:GO enough to exploit the client's runtime. With the triage process finally at an end, it is possible now to disclose details of the total of five vulnerabilities, leading to two different complete exploit chains that both enable a malicious community

In 2023, cybersecurity research sheds light on the increasing targeting of Linux systems. The AppleJeus campaign by the Lazarus Group, highlighted by Volexity and Microsoft, marks a tactical evolution with new malware impacting Linux and macOS, focusing on cryptocurrency theft. The DTrack campaign, a branch of Lazarus, represents a significant development in diverse attacks including ransomware and espionage malware. This campaign has evolved over nearly a decade, expanding knowledge about attacker commands and associated post-exploitation tools. Further, the MATA cluster malware,

Ever wondered what APTs do when high-value targets actually implement strong information security practices, making the company appear impregnable? In this talk, we’ll explore the critical role that physical security plays in Red Team engagements and reveal ten methods attackers can use to infiltrate your company’s premises to steal data, access computers, deploy "dropboxes" on networks, or leave behind hidden cameras or listening devices.

Navigating the Impacts on Cybersecurity and Mental Healt The rapid advancement of generative AI models, such as ChatGPT, has sparked a wave of both excitement and concern within the IT and cybersecurity landscape. While these AI-powered tools have the potential to revolutionize various industries, they have also become a valuable asset for cybercriminals, who are leveraging them to their advantage.This presentation will explore the multifaceted impact of AI on cybersecurity and mental health, providing a comprehensive and experience-based perspective. An IT

Everything from Two-Factor stealing to conflicts between operators, Telegram has been used for all.Telegram as infrastructure isn't new in the world of malware, but do you know what is ACTUALLY happening there? In this talk, we will talk about the results of collecting over 1.5 thousand communication channels used by real threat actors.We will discuss how it's done, the different types of malware, and their targets, and share the technical analysis of the samples we have found.

In this talk, we delve into the world of Digital Forensics and Incident Response (DFIR). We will cover the basics, such as the process and terminology, and examine four distinct incidents. For each incident, I will explain the ‘what’ and ‘how’ of the attack, the lessons learned, and the often-overlooked human aspect of incident response.Business Email Compromise (BEC) Incident: We will explore a case where an adversary exploited a user and maintained persistence for a month to extract money.Ransomware Incident: