#bsidesnyc0x04

VIDEO: BSidesNYC 2024 Protecting Snowflake and Critical Data Systems from Unauthorized Access - Shelley Wu & Stephen Spano - Opal Security
youtube.com/watch?v=gzXMwnCc0S #BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #Snowflake #DataSecurity

VIDEO: BSidesNYC 2024 Panel - Ctrl-Alt-Detected: Unraveling Threats with Detection Practitioners - Julie Agnes Sparks, Datadog
- Tammy Truong, Snowflake Shannon McCormick, Salesforce - Christina Devlin
youtube.com/watch?v=fz9zbiPEwu
#BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #threatdetection

VIDEO: BSidesNYC 2024 - Open & Secure: Novel Sandboxing Technique for Any Open Source Library - Gal Elbaz - Oligo youtube.com/watch?v=U0j6V1CDLV @BSidesNYC #BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #sandboxing

VIDEO: BSidesNYC 2024 - CloudTail: Making Heads or Tails of Selectively Retaining Multi-Cloud Logs - Ela Dogjani - Permiso
youtube.com/watch?v=zbm20JDznK #BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #CloudTail #Cloud

VIDEO: BSidesNYC 2024 - Bridging the Gap: Developing Accessible Anti-Phishing Solutions - Lydia Stepanek - Pen Loop Consulting youtube.com/watch?v=XlzOYh5HPO #BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #TooPhishy

VIDEO: BSidesNYC 2024 - 10 Things to Know Before You Work on Your Next M365 BEC - Ida Musheyev-Polishchuk & Natasha Vij - Stroz Freiberg youtube.com/watch?v=lo-QSTgOcz #BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #M365 #BEC

VIDEO: BSidesNYC 2024 - XZ Backdoor: Navigating the Complexities of Supply Chain Attacks Detected by Accident
Yoad Fekete - Myrror Security youtube.com/watch?v=N4Mxu2hJcw #BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #supplychain #XZbackdoor

VIDEO: BSidesNYC 2024 - RE-Thinking: Modernizing the Malware Analyst - Joseph Edwards - SentinelOne youtube.com/watch?v=YkU9m2aYKJ
#BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #Malware

VIDEO: BSidesNYC 2024 - How We Impersonated Cloud Code by Google Cloud and Took Over GCP Accounts - Moshiko Hassan - Upwind Security youtube.com/watch?v=ITtSFxy9RK
#BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #cloud #GCP

VIDEO: BSidesNYC 2024 - From HiatusRAT to Cuttlefish advances in credential theft through the router - Danny Adamitis & Ryan English - Black Lotus Labs

youtube.com/watch?v=Oi-x_YPtHZ

#BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #HiatusRAT #Cuttlefish #APTs

VIDEO: BSidesNYC 2024 - Discover the Unseen Azure Vulnerability Exploitation - Scott Miller - Accenture
youtu.be/58D3o9yx14o?list=PLlg
@BSidesNYC #BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #Azure

VIDEO: BSidesNYC 2024 - How I hacked a cloud production environment with external Terraform manipulation - Uri Aronovici
youtu.be/SAz9lFA3--g?list=PLlg
#BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #Terraform #cloud

VIDEO: BSidesNYC 2024 - Breaking free from the chains of fate – Bypassing AWSCompromisedKeyQuarantineV2 Policy - Bleon Proko + Opie @akraut Permiso security
youtu.be/fYwG0s9uY0w?list=PLlg
@BSidesNYC #BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #AWS

VIDEO: BSidesNYC 2024 - Building Burp Extensions with Kotlin - Nick Coblentz - Virtue Security

youtu.be/F5h9oIkrPyk?list=PLlg

#BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #kotlin

Breanne Bolandtoxoplasmosis
2024-10-19

I love that any talk, no matter how exotic or new the proposed exploit, always gets around to the “yeaaaah don’t let employees work on personal devices, put additional restrictions on where creds can be used (like geography), rotate secrets” part by the end. Swiss cheese is not a cheese I like much, but I always like it as an approach to security 💖🌲

2024-10-19

Gal Elbaz Co-founder & CTO at Oligo Security presents “Open & Secure: Novel Sandboxing Technique for Any Open Source Library” at #bsidesnyc0x04.

Gal showcases a new approach built on eBPF and KRSI technologies, bringing the security benefits of sandboxing to any open-source library. Learn how this technique can help block exploits in your stack.

2024-10-19

Bleon, Security Engineer, and Opie, Senior Researcher at Permiso Security, present “Breaking Free from the Chains of Fate - Bypassing AWSCompromisedKeyQuarantineV2 Policy” at #bsidesnyc0x04.

Explore the weaknesses of Amazon’s AWSCompromisedKeyQuarantineV2 policy and discover multiple ways to bypass it when leaked keys are found in the wild, along with insights on improving defender strategies.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst