Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Keynote: CYBER! Please Check All Boxes Before You Get Pwned

Автор: Black Hat

Загружено: 2025-12-22

Просмотров: 421

Описание:

Corporate security teams worldwide are drowning in cover-your-ass checklists, keeping them from building real defenses against real threats.

Attackers thrive in exactly these gaps — that's why the same attack trends remain successful for years and even decades. Ransomware is just the most visible symptom of a severely misguided security paradigm.

But don't despair — salvation is at hand!

The CRA and DORA are the regulations that will finally fix all other regulations — by mandating a holistic understanding of your risks and ensuring that everyone can now officially cover their bases the proper way.

Meanwhile, under the banners of fighting terrorism or child abuse, the security of the public's communication infrastructure is under constant political attack.

Proposals such as AI "snitches" built into phones keep haunting the EU legislative process — despite years of clear opposition from every credible expert out there.

There are so many self-proclaimed "solutions" that we've long lost sight of the actual problems.

Do we even want to address them?

If so, then let's re-focus — and get things done.

By: Linus Neumann | Head of Security Strategy, Chaos Computer Club

Full Session Details Available at:
https://blackhat.com/eu-25/briefings/...

Keynote: CYBER! Please Check All Boxes Before You Get Pwned

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

AppleStorm - Unmasking the Privacy Risks of Apple Intelligence

AppleStorm - Unmasking the Privacy Risks of Apple Intelligence

Sean Duffy as Secretary of Transportation | LNG Ports | Infrastructure | US Merchant Marine Academy

Sean Duffy as Secretary of Transportation | LNG Ports | Infrastructure | US Merchant Marine Academy

Keynote: Inside the Ransomware Machine

Keynote: Inside the Ransomware Machine

Keynote: The Once and Future Rules of Cybersecurity

Keynote: The Once and Future Rules of Cybersecurity

The Evolution of Malware: Past, Present, and the AI-Driven Future

The Evolution of Malware: Past, Present, and the AI-Driven Future

Breaking LLM Applications – Advances in Prompt Injection Exploitation

Breaking LLM Applications – Advances in Prompt Injection Exploitation

Хакер демонстрирует самые безумные гаджеты в своем EDC

Хакер демонстрирует самые безумные гаджеты в своем EDC

Keynote: Perspectives on Trust in Hardware Supply Chains

Keynote: Perspectives on Trust in Hardware Supply Chains

Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments

Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments

The 11th Annual Black Hat USA Network Operations Center (NOC) Report

The 11th Annual Black Hat USA Network Operations Center (NOC) Report

Building the PERFECT Linux PC with Linus Torvalds

Building the PERFECT Linux PC with Linus Torvalds

Скрытый шпион вашего компьютера с Windows 11: тёмная правда о чипах TPM

Скрытый шпион вашего компьютера с Windows 11: тёмная правда о чипах TPM

Azure's Weakest Link? How API Connections Spill Secrets

Azure's Weakest Link? How API Connections Spill Secrets

Decrypting SSL Traffic from a Chinese Security Camera - Hacking the Anran IP Camera

Decrypting SSL Traffic from a Chinese Security Camera - Hacking the Anran IP Camera

Zero-Click Attacks: AI Agents and the Next Cybersecurity Challenge

Zero-Click Attacks: AI Agents and the Next Cybersecurity Challenge

Keynote: From Script Kiddie to Cyber Kingpin: Preventing the Predictable Progression

Keynote: From Script Kiddie to Cyber Kingpin: Preventing the Predictable Progression

Keynote: Who Gets to Point Fingers? Technical Capacity and International Accountability

Keynote: Who Gets to Point Fingers? Technical Capacity and International Accountability

Отзыв Microsoft: абсолютный КОШМАР конфиденциальности 2025 года

Отзыв Microsoft: абсолютный КОШМАР конфиденциальности 2025 года

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

2025 Threat Intelligence Index: Dark Web, AI, & Ransomware Trends

2025 Threat Intelligence Index: Dark Web, AI, & Ransomware Trends

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]