11th IEEE Swiss Conference on Data Science (SDS)

"The conference addresses all aspects of the data science pipeline, including data storage, data processing, modeling and knowledge attraction, but also the usage of data for innovative products and services, data-based value creation and the ethical challenges around data acquisition, storage and analytics. It is a platform for researchers as well as developers, business strategists and implementation practitioners from companies and other organizations."

Topics of interest include, but are not limited to cybersecurity in relation to data science.

San Diego Cyber Security Summit

"The Fourth Annual San Diego Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception."

"Ivanti Warns Critical EPM Bug Lets Hackers Hijack Enrolled Devices"

"Ivanti Warns Critical EPM Bug Lets Hackers Hijack Enrolled Devices"

A critical Remote Code Execution (RCE) vulnerability in Ivanti's Endpoint Management (EPM) software could have enabled unauthenticated attackers to take control of enrolled devices or the core server. Ivanti EPM helps manage client devices running various platforms. The now-fixed security vulnerability, tracked as CVE-2023-39336, could have allowed an attacker with access to a target's internal network to launch low-complexity attacks that do not require privileges or user interaction. This article continues to discuss the potential exploitation and impact of the critical EPM flaw.

Submitted by grigby1 CPVI on

Seattle/Bellevue Cyber Security Summit

"The Eighth Annual Seattle/Bellevue Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception."

Detroit Cybersecurity Conference

"FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.  Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.  Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.

Silicon Valley Cyber Security Summit

"The Seventh Annual Silicon Valley Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception."

"Machine Learning Helps Fuzzing Find Hardware Bugs"

"Machine Learning Helps Fuzzing Find Hardware Bugs"

A new study titled "MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors" delves into the fuzzing technique that introduces commands and prompts to a chip in order to cause the system to behave erratically and unpredictably. The irregular responses to "fuzzed" commands can then point researchers to potential vulnerabilities in the system. If the system does something unusual, researchers examine it to see if there is a security flaw that hackers could exploit. Researchers used reinforcement learning to select inputs for fuzz testing in this study.

Submitted by grigby1 CPVI on

TEEX Cyber Readiness Summit

"Cyber attacks on businesses, manufacturers, cities, school districts, emergency services and infrastructure are on the rise. Prepare your organization by attending the first annual TEEX Cyber Readiness Summit. The event’s theme will be driving a healthy, prosperous, resilient community, and keynote and session topics will cover all components of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond and Recover."

Tampa Cybersecurity Summit

"The Fifth Annual Tampa Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception."

"SpectralBlur: New macOS Backdoor Threat from North Korean Hackers"

"SpectralBlur: New macOS Backdoor Threat from North Korean Hackers"

Researchers have discovered a new Apple macOS backdoor called SpectralBlur, which overlaps with KANDYKORN, a known malware family linked to North Korean threat actors. According to security researcher Greg Lesnewich, SpectralBlur can upload files, run a shell, update its configuration, delete files, and more. The malware is similar to KANDYKORN, a sophisticated implant that serves as a Remote Access Trojan (RAT).

Submitted by grigby1 CPVI on
Subscribe to