All posts by Charlie

Hacking Public Opinion

This talk offers an overview of the mechanics of modern-day information operations. Using a deep dive into the tactics behind some of the most impactful recent operations, the speaker will demonstrate the ways in which hacking the information environment is...

/ November 13, 2020

Mind Games: Using Data to Solve for the Human Element

This briefing will share key insights from nearly a dozen security training research studies and analysis of several dozen security behavioral change campaigns to more than 65,000 employees across industries. We will show why traditional training approaches are ineffective in...

/ November 13, 2020

Stress Testing Democracy Election Integrity During A Global Pandemic

Technologists have long warned that much of the technology and infrastructure we depend on for voting suffers from exploitable vulnerabilities that could be used to cast doubt on the integrity of elections. Those problems are extremely challenging under normal circumstances,...

/ November 13, 2020

The Devils in the Dependency Data Driven Software Composition Analysis

In this analysis, we examine over 85,000 applications and their use of more than 500k open source libraries. We provide an overview of open source usage showing that typical applications have hundreds or thousands of libraries, with most coming from...

/ November 13, 2020

We Went to Iowa and All We Got were These Felony Arrest Records

In-depth discussion and review of the red team engagement of Iowa courthouses which resulted in an unprecedented outcome. Gary and Justin will take you through the engagement, arrest, and ensuing legal battle, and wrap up with lessons learned and how...

/ November 13, 2020

The Excellent Adventure of XDR – Where is it Going?

Following Black Hat Webcast “Heroku AbuseOps: Low Value Indicators for High Value Decisions,” Lori Smith, Product Marketing Manager at Trend Micro discusses the new and evolving space of extended detection and response.

/ November 13, 2020

WordPress Free SSL – How To Add HTTPS SSL Certificate To WordPress Website

See part 1 of this series: See the next video of this series: The process for getting a WordPress Free SSL is pretty straight forward as long as you’re using the right host for your site. In this...

/ November 12, 2020

Synack & Blacks in Cybersecurity Launch The Synack Academy

Authors: Bella DeShantz-Cook, Security Operations Engineer  Jennifer Bennett, Communications Manager The dramatic skills gap in the cybersecurity industry is well documented, with one report predicting 3.5 million unfilled positions by next year. That’s a huge problem considering the rise in...

/ November 11, 2020

SANS and Synack Partner to Educate Future Defenders

With remote work now a staple for small businesses and large enterprises alike, time spent online has exploded. For most, this has translated to increased output among workers. From a Flexjobs report, among performance-based remote work statistics, 85 percent of...

/ November 11, 2020

Common Nginx misconfigurations that leave your web server open to attack

Nginx is the web server powering one-third of all websites in the world. Detectify Crowdsource has detected some common Nginx misconfigurations that, if left unchecked, leave your web site vulnerable to attack. Here’s how to find some of the most...

/ November 10, 2020

i hacked my grandma (social engineering and pretexting) // FREE Security+ // EP 3

Ready to start your Cybersecurity career? Start learning and get certified here: (10% OFF at the CompTIA Store) (Affiliate link) **Sponsored by CompTIA Learn more about the CompTIA Security+ Certification: 5 Cybersecurity Jobs you can get with the...

/ November 10, 2020

Vulnerability Management: Your Questions, Answered

Over the past few years, we’ve had news of massive data breaches within the most respected companies. In 2020, Twitter reported a breach of its platform, with captured Twitter handles being ransomed for $1000 to $2000 apiece. Fake tweets were...

/ November 9, 2020