#cybermonth

2025-10-29

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Exploring Azure Logic Apps and Turning Misconfigurations into Attack Opportunities" đ—œđ—źđ—ż/𝗯𝘆 Chirag Savla & Runak Parmar (White Knight Labs)

Description: "đ˜ˆđ˜»đ˜¶đ˜łđ˜Š 𝘓𝘰𝘹đ˜Șđ˜€ đ˜ˆđ˜±đ˜±đ˜Ž, 𝘱 đ˜±đ˜°đ˜žđ˜Šđ˜łđ˜§đ˜¶đ˜­ đ˜”đ˜°đ˜°đ˜­ 𝘧𝘰𝘳 đ˜ąđ˜¶đ˜”đ˜°đ˜źđ˜ąđ˜”đ˜Ș𝘯𝘹 𝘾𝘰𝘳𝘬𝘧𝘭𝘰𝘾𝘮 đ˜ąđ˜Żđ˜„ 𝘮đ˜șđ˜Žđ˜”đ˜Šđ˜ź đ˜Șđ˜Żđ˜”đ˜Šđ˜šđ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯, đ˜±đ˜­đ˜ąđ˜ș𝘮 𝘱 đ˜±đ˜Șđ˜·đ˜°đ˜”đ˜ąđ˜­ 𝘳𝘰𝘭𝘩 đ˜Ș𝘯 đ˜źđ˜°đ˜„đ˜Šđ˜łđ˜Ż đ˜€đ˜­đ˜°đ˜¶đ˜„ đ˜°đ˜±đ˜Šđ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯𝘮. đ˜đ˜°đ˜žđ˜Šđ˜·đ˜Šđ˜ł, đ˜”đ˜©đ˜Šđ˜Žđ˜Š đ˜€đ˜ąđ˜±đ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 đ˜€đ˜°đ˜źđ˜Š 𝘾đ˜Șđ˜”đ˜© đ˜©đ˜Șđ˜„đ˜„đ˜Šđ˜Ż 𝘳đ˜Ș𝘮𝘬𝘮 đ˜Żđ˜¶đ˜źđ˜Šđ˜łđ˜°đ˜¶đ˜Ž đ˜±đ˜°đ˜”đ˜Šđ˜Żđ˜”đ˜Ș𝘱𝘭 đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 đ˜ąđ˜Żđ˜„ đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Ź đ˜·đ˜Šđ˜€đ˜”đ˜°đ˜łđ˜Ž đ˜”đ˜©đ˜ąđ˜” đ˜€đ˜ąđ˜Ż 𝘣𝘩 𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜”đ˜Šđ˜„ đ˜„đ˜¶đ˜Š đ˜”đ˜° đ˜¶đ˜Żđ˜Żđ˜°đ˜”đ˜Șđ˜€đ˜Šđ˜„ 𝘼đ˜Șđ˜Žđ˜€đ˜°đ˜Żđ˜§đ˜Șđ˜šđ˜¶đ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯𝘮. đ˜›đ˜©đ˜Ș𝘮 𝘮𝘩𝘮𝘮đ˜Ș𝘰𝘯 𝘾đ˜Ș𝘭𝘭 𝘩đ˜č𝘱𝘼đ˜Ș𝘯𝘩 đ˜”đ˜©đ˜Š đ˜€đ˜°đ˜źđ˜±đ˜­đ˜Šđ˜č đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Ź đ˜Žđ˜¶đ˜łđ˜§đ˜ąđ˜€đ˜Š 𝘰𝘧 đ˜ˆđ˜»đ˜¶đ˜łđ˜Š 𝘓𝘰𝘹đ˜Șđ˜€ đ˜ˆđ˜±đ˜±đ˜Ž, đ˜łđ˜Šđ˜·đ˜Šđ˜ąđ˜­đ˜Ș𝘯𝘹 đ˜©đ˜°đ˜ž đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜łđ˜Ž đ˜€đ˜ąđ˜Ż 𝘼𝘱𝘯đ˜Șđ˜±đ˜¶đ˜­đ˜ąđ˜”đ˜Š đ˜Șđ˜”đ˜Ž đ˜§đ˜Šđ˜ąđ˜”đ˜¶đ˜łđ˜Šđ˜Ž đ˜”đ˜° đ˜€đ˜°đ˜źđ˜±đ˜łđ˜°đ˜źđ˜Ș𝘮𝘩 đ˜€đ˜­đ˜°đ˜¶đ˜„ đ˜Šđ˜Żđ˜·đ˜Șđ˜łđ˜°đ˜Żđ˜źđ˜Šđ˜Żđ˜”đ˜Ž. [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/xNAGjMXHx1w
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-28

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Exploiting the not so misuse-resistant AES-GCM API of OpenSSL" đ—œđ—źđ—ż/𝗯𝘆 FĂ©lix Charette (OKTA)

Description: "𝘈𝘌𝘚-𝘎𝘊𝘔 đ˜Ș𝘮 đ˜łđ˜°đ˜Łđ˜¶đ˜Žđ˜” đ˜žđ˜©đ˜Šđ˜Ż đ˜¶đ˜Žđ˜Šđ˜„ đ˜±đ˜łđ˜°đ˜±đ˜Šđ˜łđ˜­đ˜ș, đ˜Łđ˜¶đ˜” đ˜Ș𝘯 đ˜±đ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜€đ˜Š, 𝘮𝘰𝘼𝘩 𝘈𝘗𝘐𝘮 𝘼𝘱𝘬𝘩 đ˜Șđ˜” 𝘩𝘱𝘮đ˜ș đ˜”đ˜° đ˜Șđ˜Żđ˜”đ˜łđ˜°đ˜„đ˜¶đ˜€đ˜Š đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 𝘹đ˜Șđ˜·đ˜Ș𝘯𝘹 đ˜”đ˜©đ˜Š đ˜±đ˜°đ˜Žđ˜Žđ˜Ș𝘣đ˜Ș𝘭đ˜Șđ˜”đ˜ș đ˜”đ˜° đ˜ąđ˜­đ˜”đ˜Šđ˜ł đ˜”đ˜©đ˜Š đ˜€đ˜°đ˜Żđ˜”đ˜Šđ˜Żđ˜” 𝘰𝘧 đ˜Šđ˜Żđ˜€đ˜łđ˜șđ˜±đ˜”đ˜Šđ˜„ đ˜€đ˜Șđ˜±đ˜©đ˜Šđ˜łđ˜”đ˜Šđ˜čđ˜”đ˜Ž. 𝘖𝘯𝘩 𝘰𝘧 đ˜”đ˜©đ˜Šđ˜Žđ˜Š 𝘈𝘗𝘐𝘮 đ˜­đ˜ąđ˜€đ˜Źđ˜Ș𝘯𝘹 𝘼đ˜Șđ˜Žđ˜¶đ˜Žđ˜Š 𝘳𝘩𝘮đ˜Șđ˜Žđ˜”đ˜ąđ˜Żđ˜€đ˜Š đ˜Ș𝘮 đ˜Șđ˜źđ˜±đ˜­đ˜Šđ˜źđ˜Šđ˜Żđ˜”đ˜Šđ˜„ 𝘣đ˜ș đ˜–đ˜±đ˜Šđ˜Żđ˜šđ˜šđ˜“; 𝘱 𝘭đ˜Ș𝘣𝘳𝘱𝘳đ˜ș đ˜±đ˜łđ˜°đ˜·đ˜Șđ˜„đ˜Ș𝘯𝘹 đ˜€đ˜łđ˜șđ˜±đ˜”đ˜°đ˜šđ˜łđ˜ąđ˜±đ˜©đ˜ș đ˜§đ˜¶đ˜Żđ˜€đ˜”đ˜Ș𝘰𝘯𝘮 đ˜”đ˜° đ˜±đ˜łđ˜°đ˜„đ˜¶đ˜€đ˜”đ˜Ž đ˜Žđ˜¶đ˜€đ˜© 𝘱𝘮 𝘣𝘳𝘰𝘾𝘮𝘩𝘳𝘮 đ˜ąđ˜Żđ˜„ đ˜Šđ˜·đ˜Šđ˜Ż đ˜”đ˜° 𝘮𝘰𝘼𝘩 đ˜±đ˜łđ˜°đ˜šđ˜łđ˜ąđ˜źđ˜źđ˜Ș𝘯𝘹 đ˜­đ˜ąđ˜Żđ˜šđ˜¶đ˜ąđ˜šđ˜Šđ˜Ž (𝘩𝘹: đ˜™đ˜¶đ˜Łđ˜ș đ˜ąđ˜Żđ˜„ 𝘗𝘏𝘗). [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/MB4H2r7AebA
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-28

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Oops, I Hacked It Again: Tales and disclosures" đ—œđ—źđ—ż/𝗯𝘆 Ignacio Navarro

Description: "𝘉𝘳𝘩𝘱𝘬đ˜Ș𝘯𝘹 đ˜Șđ˜Żđ˜”đ˜° đ˜Žđ˜¶đ˜±đ˜Šđ˜łđ˜źđ˜ąđ˜łđ˜Źđ˜Šđ˜” 𝘮đ˜șđ˜Žđ˜”đ˜Šđ˜źđ˜Ž, đ˜”đ˜Șđ˜€đ˜Źđ˜Šđ˜”đ˜Ș𝘯𝘹 đ˜±đ˜­đ˜ąđ˜”đ˜§đ˜°đ˜łđ˜źđ˜Ž, đ˜ąđ˜Żđ˜„ 𝘼𝘰𝘳𝘩. 𝘐’𝘭𝘭 đ˜Žđ˜©đ˜ąđ˜łđ˜Š 𝘮𝘰𝘼𝘩 𝘰𝘧 𝘼đ˜ș đ˜­đ˜ąđ˜”đ˜Šđ˜Žđ˜” đ˜©đ˜ąđ˜€đ˜Źđ˜Ș𝘯𝘹 đ˜Žđ˜”đ˜°đ˜łđ˜Ș𝘩𝘮, đ˜Žđ˜©đ˜°đ˜žđ˜Ș𝘯𝘹 đ˜©đ˜°đ˜ž 𝘐 đ˜§đ˜°đ˜¶đ˜Żđ˜„ đ˜”đ˜©đ˜Š đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮, đ˜łđ˜Šđ˜±đ˜°đ˜łđ˜”đ˜Šđ˜„ đ˜”đ˜©đ˜Šđ˜ź, đ˜ąđ˜Żđ˜„ đ˜€đ˜°đ˜­đ˜­đ˜ąđ˜Łđ˜°đ˜łđ˜ąđ˜”đ˜Šđ˜„ 𝘾đ˜Șđ˜”đ˜© đ˜”đ˜©đ˜Š đ˜€đ˜°đ˜źđ˜±đ˜ąđ˜Żđ˜Ș𝘩𝘮. 𝘞𝘩’𝘭𝘭 đ˜„đ˜Șđ˜·đ˜Š đ˜Șđ˜Żđ˜”đ˜° đ˜”đ˜°đ˜°đ˜­đ˜Ž, đ˜”đ˜©đ˜Š đ˜€đ˜©đ˜ąđ˜­đ˜­đ˜Šđ˜Żđ˜šđ˜Šđ˜Ž 𝘰𝘧 đ˜„đ˜Șđ˜Žđ˜€đ˜­đ˜°đ˜Žđ˜¶đ˜łđ˜Š, đ˜”đ˜©đ˜Š đ˜Șđ˜źđ˜±đ˜°đ˜łđ˜”đ˜ąđ˜Żđ˜€đ˜Š 𝘰𝘧 𝘣𝘩đ˜Ș𝘯𝘹 â€œđ˜Šđ˜”đ˜©đ˜Șđ˜€đ˜ąđ˜­â€, 𝘭𝘩𝘮𝘮𝘰𝘯𝘮 đ˜­đ˜Šđ˜ąđ˜łđ˜Żđ˜Šđ˜„ đ˜ąđ˜Żđ˜„ đ˜©đ˜°đ˜ž đ˜”đ˜©đ˜Šđ˜Žđ˜Š 𝘩đ˜čđ˜±đ˜Šđ˜łđ˜Șđ˜Šđ˜Żđ˜€đ˜Šđ˜Ž đ˜©đ˜Šđ˜­đ˜± đ˜Șđ˜źđ˜±đ˜łđ˜°đ˜·đ˜Š đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜ąđ˜Żđ˜„ đ˜Łđ˜¶đ˜Șđ˜­đ˜„ đ˜”đ˜łđ˜¶đ˜Žđ˜” đ˜Łđ˜Šđ˜”đ˜žđ˜Šđ˜Šđ˜Ż đ˜©đ˜ąđ˜€đ˜Źđ˜Šđ˜łđ˜Ž đ˜ąđ˜Żđ˜„ 𝘰𝘳𝘹𝘱𝘯đ˜Șđ˜»đ˜ąđ˜”đ˜Ș𝘰𝘯𝘮. [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/oB4_aK6FeYc
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-27

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Uplevel your security program with AI​" đ—œđ—źđ—ż/𝗯𝘆 Aditi Bhatnagar

Description: "𝘐𝘯 đ˜”đ˜©đ˜Ș𝘮 𝘮𝘩𝘮𝘮đ˜Ș𝘰𝘯, 𝘾𝘩’𝘭𝘭 𝘩đ˜čđ˜±đ˜­đ˜°đ˜łđ˜Š đ˜©đ˜°đ˜ž 𝘓𝘓𝘔𝘮 đ˜€đ˜ąđ˜Ż 𝘣𝘩 đ˜­đ˜Šđ˜·đ˜Šđ˜łđ˜ąđ˜šđ˜Šđ˜„ đ˜”đ˜° đ˜¶đ˜±đ˜­đ˜Šđ˜·đ˜Šđ˜­ đ˜șđ˜°đ˜¶đ˜ł đ˜±đ˜łđ˜°đ˜„đ˜¶đ˜€đ˜” đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜±đ˜łđ˜°đ˜šđ˜łđ˜ąđ˜ź. 𝘋đ˜Șđ˜Žđ˜€đ˜°đ˜·đ˜Šđ˜ł đ˜±đ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜€đ˜ąđ˜­ đ˜Žđ˜”đ˜łđ˜ąđ˜”đ˜Šđ˜šđ˜Ș𝘩𝘮 𝘧𝘰𝘳 đ˜Șđ˜Żđ˜”đ˜Šđ˜šđ˜łđ˜ąđ˜”đ˜Ș𝘯𝘹 𝘓𝘓𝘔𝘮 đ˜Șđ˜Żđ˜”đ˜° đ˜șđ˜°đ˜¶đ˜ł 𝘾𝘰𝘳𝘬𝘧𝘭𝘰𝘾𝘮, đ˜Șđ˜Żđ˜€đ˜­đ˜¶đ˜„đ˜Ș𝘯𝘹 đ˜„đ˜ș𝘯𝘱𝘼đ˜Șđ˜€ 𝘳đ˜Ș𝘮𝘬 đ˜ąđ˜Žđ˜Žđ˜Šđ˜Žđ˜Žđ˜źđ˜Šđ˜Żđ˜”. [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/M2UQkdYoYaU
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-27

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Exploring MSIX Threat Landscape​" đ—œđ—źđ—ż/𝗯𝘆 Teruki Yoshikawa & Syogo Hayashi (NTT Japan)

Description: "đ˜‰đ˜­đ˜¶đ˜Šđ˜›đ˜Šđ˜ąđ˜ź 𝘱𝘯𝘱𝘭đ˜șđ˜»đ˜Šđ˜Ž 𝘯𝘩𝘾 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Ź đ˜źđ˜Šđ˜”đ˜©đ˜°đ˜„đ˜Ž đ˜”đ˜©đ˜ąđ˜” đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜łđ˜Ž đ˜€đ˜°đ˜Żđ˜Žđ˜Șđ˜„đ˜Šđ˜ł đ˜ąđ˜Żđ˜„ đ˜€đ˜°đ˜źđ˜Šđ˜Ž đ˜¶đ˜± 𝘾đ˜Șđ˜”đ˜© đ˜„đ˜Šđ˜”đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 đ˜ąđ˜Żđ˜„ đ˜„đ˜Šđ˜§đ˜Šđ˜Żđ˜Žđ˜Š đ˜źđ˜Šđ˜”đ˜©đ˜°đ˜„đ˜Ž. đ˜›đ˜©đ˜Ș𝘮 đ˜Ș𝘮 𝘱𝘯 đ˜Šđ˜”đ˜Šđ˜łđ˜Żđ˜ąđ˜­ đ˜€đ˜ąđ˜” đ˜ąđ˜Żđ˜„ đ˜źđ˜°đ˜¶đ˜Žđ˜Š 𝘹𝘱𝘼𝘩. đ˜đ˜°đ˜žđ˜Šđ˜·đ˜Šđ˜ł, đ˜”đ˜©đ˜Š đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜łđ˜Ž 𝘱𝘳𝘩 𝘱𝘭𝘾𝘱đ˜ș𝘮 đ˜ąđ˜©đ˜Šđ˜ąđ˜„ 𝘰𝘧 đ˜¶đ˜Ž. đ˜›đ˜©đ˜Š đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Ź đ˜¶đ˜Žđ˜Ș𝘯𝘹 đ˜”đ˜©đ˜Š 𝘔𝘚𝘐𝘟 𝘧đ˜Ș𝘭𝘩 đ˜Ș𝘮 𝘱 đ˜±đ˜łđ˜Ș𝘼𝘩 𝘩đ˜čđ˜ąđ˜źđ˜±đ˜­đ˜Š. 𝘛𝘰 đ˜°đ˜·đ˜Šđ˜łđ˜€đ˜°đ˜źđ˜Š đ˜”đ˜©đ˜Ș𝘮 𝘮đ˜Șđ˜”đ˜¶đ˜ąđ˜”đ˜Ș𝘰𝘯, 𝘾𝘩 đ˜©đ˜ąđ˜·đ˜Š đ˜łđ˜Šđ˜Žđ˜Šđ˜ąđ˜łđ˜€đ˜©đ˜Šđ˜„ 𝘯𝘩𝘾 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Ź đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜Șđ˜Čđ˜¶đ˜Šđ˜Ž đ˜”đ˜©đ˜ąđ˜” đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜łđ˜Ž đ˜žđ˜°đ˜¶đ˜­đ˜„ đ˜¶đ˜Žđ˜Š đ˜Ș𝘯 đ˜”đ˜©đ˜Š đ˜§đ˜¶đ˜”đ˜¶đ˜łđ˜Š. đ˜›đ˜©đ˜Ș𝘮 𝘹đ˜Șđ˜·đ˜Šđ˜Ž đ˜¶đ˜Ž 𝘱𝘯 đ˜ąđ˜„đ˜·đ˜ąđ˜Żđ˜”đ˜ąđ˜šđ˜Š đ˜°đ˜·đ˜Šđ˜ł đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜łđ˜Ž.​ [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/9mWdxsyAm-Q
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-25

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Cyberespionage tactics in webmail exploitation" đ—œđ—źđ—ż/𝗯𝘆 Matthieu Faou (ESET)

Description: "𝘊𝘳𝘰𝘮𝘮-𝘮đ˜Șđ˜”đ˜Š đ˜Žđ˜€đ˜łđ˜Șđ˜±đ˜”đ˜Ș𝘯𝘹 (𝘟𝘚𝘚) đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 𝘱𝘭𝘭𝘰𝘾 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜łđ˜Ž đ˜”đ˜° đ˜Șđ˜Żđ˜«đ˜Šđ˜€đ˜” 𝘼𝘱𝘭đ˜Șđ˜€đ˜Șđ˜°đ˜¶đ˜Ž đ˜Žđ˜€đ˜łđ˜Șđ˜±đ˜” đ˜€đ˜°đ˜„đ˜Š đ˜Șđ˜Żđ˜”đ˜° 𝘭𝘩𝘹đ˜Șđ˜”đ˜Șđ˜źđ˜ąđ˜”đ˜Š 𝘾𝘩𝘣 đ˜±đ˜ąđ˜šđ˜Šđ˜Ž. đ˜đ˜„đ˜Šđ˜Żđ˜”đ˜Ș𝘧đ˜șđ˜Ș𝘯𝘹 𝘟𝘚𝘚 đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 đ˜Ș𝘮 𝘱 đ˜”đ˜șđ˜±đ˜Șđ˜€đ˜ąđ˜­ đ˜±đ˜Šđ˜Żđ˜”đ˜Šđ˜Žđ˜”đ˜Ș𝘯𝘹 𝘩đ˜čđ˜Šđ˜łđ˜€đ˜Ș𝘮𝘩, 𝘱𝘮 đ˜”đ˜©đ˜Šđ˜ș 𝘱𝘳𝘩 đ˜€đ˜°đ˜źđ˜źđ˜°đ˜Żđ˜­đ˜ș đ˜§đ˜°đ˜¶đ˜Żđ˜„ đ˜Ș𝘯 𝘾𝘩𝘣 đ˜ąđ˜±đ˜±đ˜­đ˜Șđ˜€đ˜ąđ˜”đ˜Ș𝘰𝘯𝘮 đ˜”đ˜©đ˜ąđ˜” đ˜¶đ˜Žđ˜Š đ˜¶đ˜Žđ˜Šđ˜ł-đ˜±đ˜łđ˜°đ˜·đ˜Șđ˜„đ˜Šđ˜„, đ˜Șđ˜Żđ˜€đ˜­đ˜¶đ˜„đ˜Ș𝘯𝘹 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜ł-đ˜€đ˜°đ˜Żđ˜”đ˜łđ˜°đ˜­đ˜­đ˜Šđ˜„, đ˜„đ˜ąđ˜”đ˜ą 𝘱𝘮 đ˜°đ˜¶đ˜”đ˜±đ˜¶đ˜”. đ˜›đ˜©đ˜Š đ˜”đ˜©đ˜Šđ˜°đ˜łđ˜ș đ˜Ș𝘮 𝘾𝘩𝘭𝘭 đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜°đ˜°đ˜„, đ˜Łđ˜¶đ˜” đ˜žđ˜©đ˜ąđ˜” đ˜„đ˜° 𝘳𝘩𝘱𝘭-đ˜žđ˜°đ˜łđ˜­đ˜„ đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Ž 𝘭𝘰𝘰𝘬 𝘭đ˜Ș𝘬𝘩?

đ˜–đ˜¶đ˜ł đ˜łđ˜Šđ˜Žđ˜Šđ˜ąđ˜łđ˜€đ˜© đ˜”đ˜Šđ˜ąđ˜ź đ˜ąđ˜” 𝘌𝘚𝘌𝘛 đ˜©đ˜ąđ˜Ž đ˜Žđ˜±đ˜Šđ˜Żđ˜” đ˜”đ˜©đ˜Š đ˜­đ˜ąđ˜Žđ˜” đ˜”đ˜žđ˜° đ˜ș𝘩𝘱𝘳𝘮 đ˜Șđ˜Żđ˜·đ˜Šđ˜Žđ˜”đ˜Șđ˜šđ˜ąđ˜”đ˜Ș𝘯𝘹 đ˜”đ˜©đ˜Š 𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜”đ˜ąđ˜”đ˜Ș𝘰𝘯 𝘰𝘧 𝘟𝘚𝘚 đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 đ˜Ș𝘯 𝘾𝘩𝘣𝘼𝘱đ˜Ș𝘭 đ˜±đ˜°đ˜łđ˜”đ˜ąđ˜­đ˜Ž. đ˜›đ˜©đ˜Šđ˜Žđ˜Š đ˜±đ˜°đ˜łđ˜”đ˜ąđ˜­đ˜Ž 𝘱𝘳𝘩 đ˜±đ˜ąđ˜łđ˜”đ˜Șđ˜€đ˜¶đ˜­đ˜ąđ˜łđ˜­đ˜ș đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜­đ˜Š: đ˜”đ˜©đ˜Šđ˜Ș𝘳 𝘼𝘱đ˜Ș𝘯 đ˜±đ˜¶đ˜łđ˜±đ˜°đ˜Žđ˜Š đ˜Ș𝘮 đ˜”đ˜° đ˜„đ˜Șđ˜Žđ˜±đ˜­đ˜ąđ˜ș đ˜¶đ˜Żđ˜”đ˜łđ˜¶đ˜Žđ˜”đ˜Šđ˜„ 𝘏𝘛𝘔𝘓 đ˜€đ˜°đ˜Żđ˜”đ˜Šđ˜Żđ˜”, đ˜Ș𝘯 đ˜”đ˜©đ˜Š 𝘧𝘰𝘳𝘼 𝘰𝘧 𝘩𝘼𝘱đ˜Ș𝘭 𝘼𝘩𝘮𝘮𝘱𝘹𝘩𝘮, đ˜Ș𝘯 đ˜”đ˜©đ˜Š đ˜€đ˜°đ˜Żđ˜”đ˜Šđ˜čđ˜” 𝘰𝘧 đ˜”đ˜©đ˜Šđ˜Ș𝘳 𝘾𝘩𝘣 đ˜ąđ˜±đ˜±đ˜­đ˜Șđ˜€đ˜ąđ˜”đ˜Ș𝘰𝘯𝘮, đ˜žđ˜©đ˜Șđ˜€đ˜© đ˜łđ˜¶đ˜Ż đ˜Ș𝘯 đ˜”đ˜©đ˜Šđ˜Ș𝘳 đ˜¶đ˜Žđ˜Šđ˜łđ˜Žâ€™ 𝘾𝘩𝘣 𝘣𝘳𝘰𝘾𝘮𝘩𝘳𝘮. đ˜‹đ˜¶đ˜łđ˜Ș𝘯𝘹 đ˜°đ˜¶đ˜ł đ˜łđ˜Šđ˜Žđ˜Šđ˜ąđ˜łđ˜€đ˜©, 𝘾𝘩 đ˜„đ˜Șđ˜Žđ˜€đ˜°đ˜·đ˜Šđ˜łđ˜Šđ˜„ đ˜”đ˜žđ˜° đ˜»đ˜Šđ˜łđ˜°-đ˜„đ˜ąđ˜ș đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮, 𝘰𝘯𝘩 đ˜Šđ˜ąđ˜€đ˜© đ˜Ș𝘯 đ˜™đ˜°đ˜¶đ˜Żđ˜„đ˜€đ˜¶đ˜Łđ˜Š đ˜ąđ˜Żđ˜„ 𝘔𝘋𝘱𝘩𝘼𝘰𝘯, đ˜ąđ˜Żđ˜„ đ˜Șđ˜„đ˜Šđ˜Żđ˜”đ˜Ș𝘧đ˜Șđ˜Šđ˜„ đ˜”đ˜©đ˜Š đ˜¶đ˜Žđ˜Š 𝘰𝘧 đ˜źđ˜¶đ˜­đ˜”đ˜Șđ˜±đ˜­đ˜Š 𝘕-đ˜„đ˜ąđ˜ș đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 đ˜Ș𝘯 đ˜™đ˜°đ˜¶đ˜Żđ˜„đ˜€đ˜¶đ˜Łđ˜Š, 𝘡đ˜Ș𝘼𝘣𝘳𝘱, đ˜ąđ˜Żđ˜„ đ˜đ˜°đ˜łđ˜„đ˜Š.

đ˜–đ˜¶đ˜ł đ˜±đ˜łđ˜Šđ˜Žđ˜Šđ˜Żđ˜”đ˜ąđ˜”đ˜Ș𝘰𝘯 đ˜Žđ˜©đ˜°đ˜žđ˜€đ˜ąđ˜Žđ˜Šđ˜Ž đ˜”đ˜©đ˜Š 𝘾𝘩𝘣𝘼𝘱đ˜Ș𝘭 đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 𝘾𝘩 đ˜¶đ˜Żđ˜€đ˜°đ˜·đ˜Šđ˜łđ˜Šđ˜„, đ˜ąđ˜Żđ˜„ đ˜±đ˜łđ˜°đ˜·đ˜Șđ˜„đ˜Šđ˜Ž 𝘱 đ˜„đ˜Šđ˜”đ˜ąđ˜Șđ˜­đ˜Šđ˜„ 𝘱𝘯𝘱𝘭đ˜ș𝘮đ˜Ș𝘮 𝘰𝘧 đ˜”đ˜©đ˜Š 𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜”đ˜Ž đ˜ąđ˜Żđ˜„ đ˜‘đ˜ąđ˜·đ˜ąđ˜šđ˜€đ˜łđ˜Șđ˜±đ˜” đ˜±đ˜ąđ˜șđ˜­đ˜°đ˜ąđ˜„đ˜Ž đ˜¶đ˜Žđ˜Šđ˜„ 𝘣đ˜ș đ˜”đ˜©đ˜łđ˜Šđ˜Š đ˜€đ˜șđ˜Łđ˜Šđ˜łđ˜Šđ˜Žđ˜±đ˜Ș𝘰𝘯𝘱𝘹𝘩 đ˜šđ˜łđ˜°đ˜¶đ˜±đ˜Ž: đ˜™đ˜¶đ˜Žđ˜Žđ˜Ș𝘱-𝘱𝘭đ˜Șđ˜šđ˜Żđ˜Šđ˜„ đ˜šđ˜Šđ˜„đ˜Żđ˜Șđ˜” đ˜ąđ˜Żđ˜„ đ˜Žđ˜łđ˜Šđ˜Šđ˜Żđ˜Šđ˜¶đ˜Łđ˜Š, đ˜ąđ˜Żđ˜„ đ˜‰đ˜Šđ˜­đ˜ąđ˜łđ˜¶đ˜Ž-𝘱𝘭đ˜Șđ˜šđ˜Żđ˜Šđ˜„ 𝘞đ˜Șđ˜Żđ˜”đ˜Šđ˜ł 𝘝đ˜Șđ˜·đ˜Šđ˜łđ˜Ż. 𝘞𝘩 đ˜„đ˜Šđ˜źđ˜°đ˜Żđ˜Žđ˜”đ˜łđ˜ąđ˜”đ˜Š đ˜©đ˜°đ˜ž đ˜”đ˜©đ˜Šđ˜Žđ˜Š đ˜šđ˜łđ˜°đ˜¶đ˜±đ˜Ž đ˜­đ˜Šđ˜·đ˜Šđ˜łđ˜ąđ˜šđ˜Šđ˜„ 𝘟𝘚𝘚 đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 đ˜”đ˜° đ˜Žđ˜”đ˜Šđ˜ąđ˜­ 𝘩𝘼𝘱đ˜Ș𝘭 𝘼𝘩𝘮𝘮𝘱𝘹𝘩𝘮 𝘧𝘳𝘰𝘼 đ˜šđ˜°đ˜·đ˜Šđ˜łđ˜Żđ˜źđ˜Šđ˜Żđ˜” 𝘰𝘧𝘧đ˜Șđ˜€đ˜Ș𝘱𝘭𝘮 đ˜ąđ˜Żđ˜„ đ˜°đ˜”đ˜©đ˜Šđ˜ł đ˜©đ˜Șđ˜šđ˜©-đ˜·đ˜ąđ˜­đ˜¶đ˜Š đ˜”đ˜ąđ˜łđ˜šđ˜Šđ˜”đ˜Ž."

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/lex_Kxr24uo
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-24

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Nice to meet you! That will be 20 million please" đ—œđ—źđ—ż/𝗯𝘆 David DĂ©cary-HĂ©tu

Description: "A ransomware attack isn’t just a technical compromise of a company; it’s also a game of negotiation and perhaps even chess. In this talk, I plunge into 133 recorded conversations and more than 7,000 messages exchanged between ransomware gangs and their victims, unraveling the narrative of cyber extortion.[...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/l9_m6t7WAOc
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-24

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "One certificate to rule them all: the story of a Chinese-nexus botnet" đ—œđ—źđ—ż/𝗯𝘆 Amaury-Jacques Garçon (Sekoia)

Description: "đ˜“đ˜Šđ˜”'𝘮 đ˜„đ˜Șđ˜·đ˜Š đ˜Șđ˜Żđ˜”đ˜° đ˜”đ˜©đ˜Š đ˜„đ˜°đ˜źđ˜ąđ˜Ș𝘯 𝘰𝘧 đ˜Šđ˜„đ˜šđ˜Š đ˜„đ˜Šđ˜·đ˜Șđ˜€đ˜Šđ˜Ž đ˜ąđ˜Żđ˜„ đ˜Łđ˜°đ˜”đ˜Żđ˜Šđ˜”đ˜Ž đ˜”đ˜©đ˜łđ˜°đ˜¶đ˜šđ˜© đ˜°đ˜¶đ˜ł đ˜„đ˜Șđ˜Žđ˜€đ˜°đ˜·đ˜Šđ˜łđ˜ș 𝘰𝘧 𝘱 đ˜·đ˜ąđ˜Žđ˜” đ˜€đ˜­đ˜¶đ˜Žđ˜”đ˜Šđ˜ł 𝘰𝘧 ~70,000 đ˜€đ˜°đ˜źđ˜±đ˜łđ˜°đ˜źđ˜Șđ˜Žđ˜Šđ˜„ đ˜©đ˜°đ˜Žđ˜”đ˜Ž. đ˜›đ˜©đ˜Ș𝘮 đ˜Žđ˜”đ˜°đ˜łđ˜ș đ˜Žđ˜”đ˜Šđ˜źđ˜źđ˜Šđ˜„ 𝘧𝘳𝘰𝘼 𝘱 𝘮đ˜Șđ˜źđ˜±đ˜­đ˜Š 𝘩𝘳𝘳𝘰𝘳 - đ˜”đ˜©đ˜Š đ˜łđ˜Šđ˜±đ˜Šđ˜ąđ˜”đ˜Šđ˜„ đ˜¶đ˜Žđ˜Š 𝘰𝘧 𝘱 𝘮𝘩𝘭𝘧-𝘮đ˜Șđ˜šđ˜Żđ˜Šđ˜„ đ˜€đ˜Šđ˜łđ˜”đ˜Ș𝘧đ˜Șđ˜€đ˜ąđ˜”đ˜Š đ˜ąđ˜€đ˜łđ˜°đ˜Žđ˜Ž đ˜źđ˜¶đ˜­đ˜”đ˜Șđ˜±đ˜­đ˜Š đ˜©đ˜°đ˜Žđ˜”đ˜Ž. 𝘐𝘯 đ˜”đ˜©đ˜Ș𝘮 đ˜”đ˜ąđ˜­đ˜Ź, 𝘾𝘩 𝘾đ˜Ș𝘭𝘭 đ˜„đ˜Šđ˜źđ˜°đ˜Żđ˜Žđ˜”đ˜łđ˜ąđ˜”đ˜Š đ˜©đ˜°đ˜ž đ˜”đ˜©đ˜Ș𝘮 𝘮𝘼𝘱𝘭𝘭 đ˜šđ˜Šđ˜€đ˜–đ˜±đ˜Ž đ˜°đ˜·đ˜Šđ˜łđ˜Žđ˜Șđ˜šđ˜©đ˜” đ˜ąđ˜­đ˜­đ˜°đ˜žđ˜Šđ˜„ đ˜¶đ˜Ž đ˜”đ˜° đ˜¶đ˜Żđ˜·đ˜Šđ˜Ș𝘭 𝘱 đ˜žđ˜©đ˜°đ˜­đ˜Š đ˜Żđ˜Šđ˜”đ˜žđ˜°đ˜łđ˜Ź 𝘰𝘧 đ˜–đ˜±đ˜Šđ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯𝘱𝘭 𝘙𝘩𝘭𝘱đ˜ș 𝘉𝘰đ˜č𝘩𝘮 đ˜ąđ˜Żđ˜„ 𝘱 đ˜źđ˜¶đ˜­đ˜”đ˜Ș-𝘭𝘱đ˜șđ˜Šđ˜łđ˜Šđ˜„ đ˜€đ˜ș𝘣𝘩𝘳 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Ź đ˜Șđ˜Żđ˜§đ˜łđ˜ąđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜¶đ˜łđ˜Š đ˜Șđ˜Żđ˜·đ˜°đ˜­đ˜·đ˜Ș𝘯𝘹 đ˜”đ˜©đ˜Š 𝘎𝘰𝘣𝘙𝘈𝘛 𝘼𝘱𝘭𝘾𝘱𝘳𝘩 đ˜ąđ˜Żđ˜„ 𝘱 đ˜±đ˜łđ˜Šđ˜·đ˜Șđ˜°đ˜¶đ˜Žđ˜­đ˜ș đ˜¶đ˜Żđ˜„đ˜°đ˜€đ˜¶đ˜źđ˜Šđ˜Żđ˜”đ˜Šđ˜„ đ˜Łđ˜ąđ˜€đ˜Źđ˜„đ˜°đ˜°đ˜ł, đ˜žđ˜©đ˜Șđ˜€đ˜© 𝘾𝘩 đ˜Żđ˜ąđ˜źđ˜Šđ˜„ đ˜‰đ˜¶đ˜­đ˜Łđ˜ąđ˜”đ˜¶đ˜łđ˜Š. 𝘈 đ˜¶đ˜Żđ˜Șđ˜Čđ˜¶đ˜Š đ˜ąđ˜”đ˜”đ˜łđ˜Șđ˜Łđ˜¶đ˜”đ˜Š 𝘰𝘧 đ˜”đ˜©đ˜Ș𝘮 đ˜Șđ˜Żđ˜§đ˜łđ˜ąđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜¶đ˜łđ˜Š đ˜Ș𝘮 đ˜”đ˜©đ˜Š đ˜§đ˜ąđ˜€đ˜” đ˜”đ˜©đ˜ąđ˜” 𝘱 đ˜źđ˜ąđ˜«đ˜°đ˜łđ˜Șđ˜”đ˜ș 𝘰𝘧 đ˜”đ˜©đ˜Š 𝘊2𝘮 đ˜±đ˜°đ˜Žđ˜Žđ˜Šđ˜Žđ˜Ž đ˜°đ˜±đ˜Šđ˜Ż đ˜„đ˜Șđ˜łđ˜Šđ˜€đ˜”đ˜°đ˜łđ˜Ș𝘩𝘮. đ˜ˆđ˜­đ˜”đ˜°đ˜šđ˜Šđ˜”đ˜©đ˜Šđ˜ł, đ˜°đ˜·đ˜Šđ˜ł 5,000 đ˜·đ˜ąđ˜łđ˜Șđ˜Šđ˜„ đ˜”đ˜șđ˜±đ˜Šđ˜Ž 𝘰𝘧 𝘧đ˜Ș𝘭𝘩𝘮 đ˜©đ˜ąđ˜·đ˜Š 𝘣𝘩𝘩𝘯 𝘱𝘯𝘱𝘭đ˜șđ˜Žđ˜Šđ˜„, 𝘩𝘯𝘱𝘣𝘭đ˜Ș𝘯𝘹 đ˜¶đ˜Ž đ˜”đ˜° đ˜Šđ˜§đ˜§đ˜Šđ˜€đ˜”đ˜Șđ˜·đ˜Šđ˜­đ˜ș đ˜±đ˜­đ˜ąđ˜€đ˜Š đ˜°đ˜¶đ˜łđ˜Žđ˜Šđ˜­đ˜·đ˜Šđ˜Ž đ˜Ș𝘯 đ˜”đ˜©đ˜Š đ˜°đ˜±đ˜Šđ˜łđ˜ąđ˜”đ˜°đ˜łđ˜Žâ€™ đ˜Žđ˜©đ˜°đ˜Šđ˜Ž. đ˜›đ˜©đ˜Ș𝘮 đ˜Șđ˜Żđ˜§đ˜łđ˜ąđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜¶đ˜łđ˜Š đ˜Ș𝘮 đ˜”đ˜°đ˜¶đ˜€đ˜©đ˜Ș𝘯𝘹 đ˜€đ˜°đ˜łđ˜Żđ˜Šđ˜łđ˜Ž đ˜ąđ˜łđ˜°đ˜¶đ˜Żđ˜„ đ˜”đ˜©đ˜Š 𝘹𝘭𝘰𝘣𝘩 đ˜ąđ˜Żđ˜„ đ˜©đ˜Șđ˜Żđ˜”đ˜Ž đ˜ąđ˜” đ˜”đ˜Ș𝘩𝘮 đ˜”đ˜° đ˜Šđ˜©đ˜Ș𝘯𝘱."

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/rqcd6OhjfJk
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-18

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Vulnerability Haruspicy: Using Woo To Confirm Your Biases" đ—œđ—źđ—ż/𝗯𝘆 Tod Beardsley (runZero)

Description: "đ˜đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜ș đ˜Žđ˜€đ˜°đ˜łđ˜Ș𝘯𝘹 đ˜Ș𝘮 đ˜Žđ˜¶đ˜±đ˜±đ˜°đ˜Žđ˜Šđ˜„ đ˜”đ˜° 𝘣𝘳đ˜Ș𝘯𝘹 đ˜°đ˜łđ˜„đ˜Šđ˜ł đ˜”đ˜° đ˜”đ˜©đ˜Š đ˜€đ˜©đ˜ąđ˜°đ˜Ž 𝘰𝘧 𝘳đ˜Ș𝘮𝘬 đ˜źđ˜ąđ˜Żđ˜ąđ˜šđ˜Šđ˜źđ˜Šđ˜Żđ˜”, đ˜Łđ˜¶đ˜” đ˜Ș𝘯 đ˜±đ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜€đ˜Š, đ˜Șđ˜” đ˜€đ˜ąđ˜Ż 𝘧𝘩𝘩𝘭𝘮 𝘼𝘰𝘳𝘩 𝘭đ˜Ș𝘬𝘩 đ˜łđ˜Šđ˜ąđ˜„đ˜Ș𝘯𝘹 đ˜”đ˜ąđ˜łđ˜°đ˜” đ˜€đ˜ąđ˜łđ˜„đ˜Ž 𝘰𝘳 đ˜±đ˜°đ˜Źđ˜Ș𝘯𝘹 đ˜ąđ˜” đ˜Šđ˜Żđ˜”đ˜łđ˜ąđ˜Ș𝘭𝘮 đ˜”đ˜©đ˜ąđ˜Ż đ˜ąđ˜±đ˜±đ˜­đ˜șđ˜Ș𝘯𝘹 đ˜Žđ˜€đ˜Șđ˜Šđ˜Żđ˜€đ˜Š. 𝘊𝘝𝘚𝘚 đ˜±đ˜Šđ˜łđ˜§đ˜°đ˜łđ˜źđ˜Ž 𝘼𝘰𝘯𝘬𝘩đ˜ș đ˜źđ˜ąđ˜”đ˜© đ˜”đ˜° đ˜§đ˜°đ˜łđ˜€đ˜Š đ˜§đ˜łđ˜ąđ˜€đ˜”đ˜ąđ˜­ 𝘣𝘩𝘭𝘭 đ˜€đ˜¶đ˜łđ˜·đ˜Šđ˜Ž, 𝘌𝘗𝘚𝘚 đ˜”đ˜łđ˜Ș𝘩𝘮 đ˜”đ˜° đ˜±đ˜łđ˜Šđ˜„đ˜Șđ˜€đ˜” 𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜”đ˜ąđ˜”đ˜Ș𝘰𝘯 𝘾đ˜Șđ˜”đ˜© đ˜Žđ˜”đ˜ąđ˜”đ˜Șđ˜Žđ˜”đ˜Șđ˜€đ˜ąđ˜­ đ˜Łđ˜­đ˜ąđ˜€đ˜Ź 𝘼𝘱𝘹đ˜Șđ˜€đ˜Źđ˜Ž, đ˜ąđ˜Żđ˜„ 𝘚𝘚𝘝𝘊 đ˜„đ˜Șđ˜”đ˜€đ˜©đ˜Šđ˜Ž đ˜źđ˜ąđ˜”đ˜© đ˜Šđ˜Żđ˜”đ˜Ș𝘳𝘩𝘭đ˜ș đ˜Ș𝘯 đ˜§đ˜ąđ˜·đ˜°đ˜ł 𝘰𝘧 đ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜¶đ˜łđ˜Šđ˜„ đ˜šđ˜¶đ˜” 𝘧𝘩𝘩𝘭đ˜Ș𝘯𝘹𝘮.đ˜đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜ș đ˜Žđ˜€đ˜°đ˜łđ˜Ș𝘯𝘹 đ˜Ș𝘮 đ˜Žđ˜¶đ˜±đ˜±đ˜°đ˜Žđ˜Šđ˜„ đ˜”đ˜° 𝘣𝘳đ˜Ș𝘯𝘹 đ˜°đ˜łđ˜„đ˜Šđ˜ł đ˜”đ˜° đ˜”đ˜©đ˜Š đ˜€đ˜©đ˜ąđ˜°đ˜Ž 𝘰𝘧 𝘳đ˜Ș𝘮𝘬 đ˜źđ˜ąđ˜Żđ˜ąđ˜šđ˜Šđ˜źđ˜Šđ˜Żđ˜”, đ˜Łđ˜¶đ˜” đ˜Ș𝘯 đ˜±đ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜€đ˜Š, đ˜Șđ˜” đ˜€đ˜ąđ˜Ż 𝘧𝘩𝘩𝘭𝘮 𝘼𝘰𝘳𝘩 𝘭đ˜Ș𝘬𝘩 đ˜łđ˜Šđ˜ąđ˜„đ˜Ș𝘯𝘹 đ˜”đ˜ąđ˜łđ˜°đ˜” đ˜€đ˜ąđ˜łđ˜„đ˜Ž 𝘰𝘳 đ˜±đ˜°đ˜Źđ˜Ș𝘯𝘹 đ˜ąđ˜” đ˜Šđ˜Żđ˜”đ˜łđ˜ąđ˜Ș𝘭𝘮 đ˜”đ˜©đ˜ąđ˜Ż đ˜ąđ˜±đ˜±đ˜­đ˜șđ˜Ș𝘯𝘹 đ˜Žđ˜€đ˜Șđ˜Šđ˜Żđ˜€đ˜Š. 𝘊𝘝𝘚𝘚 đ˜±đ˜Šđ˜łđ˜§đ˜°đ˜łđ˜źđ˜Ž 𝘼𝘰𝘯𝘬𝘩đ˜ș đ˜źđ˜ąđ˜”đ˜© đ˜”đ˜° đ˜§đ˜°đ˜łđ˜€đ˜Š đ˜§đ˜łđ˜ąđ˜€đ˜”đ˜ąđ˜­ 𝘣𝘩𝘭𝘭 đ˜€đ˜¶đ˜łđ˜·đ˜Šđ˜Ž, 𝘌𝘗𝘚𝘚 đ˜”đ˜łđ˜Ș𝘩𝘮 đ˜”đ˜° đ˜±đ˜łđ˜Šđ˜„đ˜Șđ˜€đ˜” 𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜”đ˜ąđ˜”đ˜Ș𝘰𝘯 𝘾đ˜Șđ˜”đ˜© đ˜Žđ˜”đ˜ąđ˜”đ˜Șđ˜Žđ˜”đ˜Șđ˜€đ˜ąđ˜­ đ˜Łđ˜­đ˜ąđ˜€đ˜Ź 𝘼𝘱𝘹đ˜Șđ˜€đ˜Źđ˜Ž, đ˜ąđ˜Żđ˜„ 𝘚𝘚𝘝𝘊 đ˜„đ˜Șđ˜”đ˜€đ˜©đ˜Šđ˜Ž đ˜źđ˜ąđ˜”đ˜© đ˜Šđ˜Żđ˜”đ˜Ș𝘳𝘩𝘭đ˜ș đ˜Ș𝘯 đ˜§đ˜ąđ˜·đ˜°đ˜ł 𝘰𝘧 đ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜¶đ˜łđ˜Šđ˜„ đ˜šđ˜¶đ˜” 𝘧𝘩𝘩𝘭đ˜Ș𝘯𝘹𝘮.[...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/JWcrvUR0-So

đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-16

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Stolen Laptops - A brief overview of modern physical access attacks" đ—œđ—źđ—ż/𝗯𝘆 Pierre Nicolas Allard Coutu

Description: "đ˜“đ˜ąđ˜±đ˜”đ˜°đ˜±đ˜Ž đ˜©đ˜ąđ˜·đ˜Š đ˜Łđ˜Šđ˜€đ˜°đ˜źđ˜Š đ˜¶đ˜Łđ˜Șđ˜Čđ˜¶đ˜Șđ˜”đ˜°đ˜¶đ˜Ž đ˜Ș𝘯 đ˜źđ˜°đ˜„đ˜Šđ˜łđ˜Ż đ˜”đ˜Ș𝘼𝘩𝘮. 𝘈𝘯 𝘱𝘭𝘭 đ˜Łđ˜¶đ˜” đ˜šđ˜¶đ˜ąđ˜łđ˜ąđ˜Żđ˜”đ˜Šđ˜Šđ˜„ 𝘰𝘳𝘹𝘱𝘯đ˜Șđ˜»đ˜ąđ˜”đ˜Ș𝘰𝘯𝘱𝘭 đ˜ąđ˜Žđ˜Žđ˜Šđ˜” đ˜”đ˜©đ˜ąđ˜” đ˜Čđ˜¶đ˜Șđ˜”đ˜Š 𝘭đ˜Șđ˜”đ˜Šđ˜łđ˜ąđ˜­đ˜­đ˜ș đ˜©đ˜°đ˜­đ˜„đ˜Ž 𝘬𝘩đ˜ș𝘮 đ˜”đ˜° đ˜”đ˜©đ˜Š 𝘬đ˜Șđ˜Żđ˜šđ˜„đ˜°đ˜ź, đ˜Ș𝘯 đ˜Šđ˜·đ˜Šđ˜łđ˜ș đ˜Šđ˜źđ˜±đ˜­đ˜°đ˜ș𝘩𝘩'𝘮 đ˜©đ˜ąđ˜Żđ˜„đ˜Ž. 𝘍𝘰𝘳 𝘱𝘯 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜ł, đ˜žđ˜©đ˜ąđ˜”'𝘮 đ˜Żđ˜°đ˜” đ˜”đ˜° đ˜­đ˜°đ˜·đ˜Š? [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/IVDxu09Qk2g
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec #cybersecurite

2025-10-15

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Social Engineering for Physical Pentesting Assignments" đ—œđ—źđ—ż/𝗯𝘆 Dorota Kozlowska ( @blackhillsinfosec )

Description: "đ˜›đ˜©đ˜Ș𝘮 đ˜±đ˜łđ˜Šđ˜Žđ˜Šđ˜Żđ˜”đ˜ąđ˜”đ˜Ș𝘰𝘯 𝘾đ˜Ș𝘭𝘭 𝘩đ˜čđ˜±đ˜­đ˜°đ˜łđ˜Š đ˜”đ˜©đ˜Š đ˜Žđ˜”đ˜łđ˜ąđ˜”đ˜Šđ˜šđ˜Șđ˜€ đ˜¶đ˜Žđ˜Š 𝘰𝘧 đ˜Žđ˜°đ˜€đ˜Ș𝘱𝘭 𝘩𝘯𝘹đ˜Ș𝘯𝘩𝘩𝘳đ˜Ș𝘯𝘹 đ˜Ș𝘯 đ˜±đ˜Šđ˜Żđ˜Šđ˜”đ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯 đ˜”đ˜Šđ˜Žđ˜”đ˜Ș𝘯𝘹, đ˜§đ˜°đ˜€đ˜¶đ˜Žđ˜Ș𝘯𝘹 𝘰𝘯 𝘹𝘱đ˜Ș𝘯đ˜Ș𝘯𝘹 đ˜€đ˜°đ˜·đ˜Šđ˜łđ˜” đ˜ąđ˜€đ˜€đ˜Šđ˜Žđ˜Ž đ˜”đ˜° 𝘱 đ˜€đ˜­đ˜Șđ˜Šđ˜Żđ˜”'𝘮 đ˜Žđ˜Šđ˜łđ˜·đ˜Šđ˜ł 𝘳𝘰𝘰𝘼. 𝘐 𝘾đ˜Ș𝘭𝘭 đ˜°đ˜¶đ˜”đ˜­đ˜Ș𝘯𝘩 đ˜©đ˜°đ˜ž đ˜”đ˜° đ˜±đ˜Šđ˜łđ˜§đ˜°đ˜łđ˜ź đ˜łđ˜Šđ˜€đ˜°đ˜Żđ˜Żđ˜ąđ˜Șđ˜Žđ˜Žđ˜ąđ˜Żđ˜€đ˜Š, đ˜šđ˜ąđ˜”đ˜©đ˜Šđ˜ł đ˜Șđ˜Żđ˜”đ˜Šđ˜­đ˜­đ˜Șđ˜šđ˜Šđ˜Żđ˜€đ˜Š 𝘰𝘯 đ˜€đ˜°đ˜źđ˜±đ˜ąđ˜Żđ˜ș đ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜¶đ˜łđ˜Š, đ˜Šđ˜źđ˜±đ˜­đ˜°đ˜ș𝘩𝘩 đ˜Łđ˜Šđ˜©đ˜ąđ˜·đ˜Ș𝘰𝘳, đ˜ąđ˜Żđ˜„ đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮. [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/TIfSrX4w2os
đŸŽŸïž Billets tarif prĂ©vente/Early Bird Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-14

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Why preventing phishing is so difficult, and what we can do about it" đ—œđ—źđ—ż/𝗯𝘆 Michael Joyce (Human-Centric Cybersecurity Partnership)

Description: "𝘞𝘩 đ˜Žđ˜”đ˜Ș𝘭𝘭 đ˜©đ˜ąđ˜·đ˜Šđ˜Żâ€™đ˜” đ˜Žđ˜°đ˜­đ˜·đ˜Šđ˜„ đ˜±đ˜©đ˜Șđ˜Žđ˜©đ˜Ș𝘯𝘹. đ˜žđ˜©đ˜ș đ˜„đ˜°đ˜Šđ˜Ž đ˜±đ˜©đ˜Șđ˜Žđ˜©đ˜Ș𝘯𝘹 đ˜Žđ˜”đ˜Ș𝘭𝘭 đ˜©đ˜ąđ˜±đ˜±đ˜Šđ˜Ż đ˜ąđ˜Żđ˜„ đ˜žđ˜©đ˜ș đ˜„đ˜° đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜±đ˜łđ˜°đ˜§đ˜Šđ˜Žđ˜Žđ˜Ș𝘰𝘯𝘱𝘭𝘮 đ˜Žđ˜”đ˜łđ˜¶đ˜šđ˜šđ˜­đ˜Š đ˜”đ˜° đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜ąđ˜Żđ˜„ đ˜¶đ˜Žđ˜Šđ˜ł đ˜Łđ˜Šđ˜©đ˜ąđ˜·đ˜Ș𝘰𝘳? đ˜›đ˜©đ˜Ș𝘮 đ˜±đ˜łđ˜Šđ˜Žđ˜Šđ˜Żđ˜”đ˜ąđ˜”đ˜Ș𝘰𝘯 đ˜„đ˜Šđ˜źđ˜șđ˜Žđ˜”đ˜Ș𝘧đ˜Ș𝘩𝘮 đ˜”đ˜©đ˜Š đ˜€đ˜©đ˜ąđ˜­đ˜­đ˜Šđ˜Żđ˜šđ˜Š 𝘰𝘧 đ˜±đ˜©đ˜Șđ˜Žđ˜©đ˜Ș𝘯𝘹 đ˜ąđ˜Żđ˜„ đ˜±đ˜łđ˜Šđ˜Žđ˜Šđ˜Żđ˜”đ˜Ž 𝘬𝘩đ˜ș 𝘧đ˜Șđ˜Żđ˜„đ˜Ș𝘯𝘹𝘮 𝘧𝘳𝘰𝘼 𝘰𝘯𝘩 𝘰𝘧 đ˜”đ˜©đ˜Š đ˜­đ˜ąđ˜łđ˜šđ˜Šđ˜Žđ˜” đ˜Șđ˜Żđ˜„đ˜Šđ˜±đ˜Šđ˜Żđ˜„đ˜Šđ˜Żđ˜” đ˜Žđ˜”đ˜¶đ˜„đ˜Ș𝘩𝘮 𝘰𝘧 đ˜±đ˜©đ˜Șđ˜Žđ˜©đ˜Ș𝘯𝘹 đ˜Łđ˜Šđ˜©đ˜ąđ˜·đ˜Ș𝘰𝘳 đ˜Ș𝘯 đ˜Šđ˜ąđ˜Żđ˜ąđ˜„đ˜ą. [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/nmOjzAAOiIw
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec

2025-10-13

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "When the threat actor lives under your roof: Fighting Technological Violence in Domestic Abuse Cases" đ—œđ—źđ—ż/𝗯𝘆 Catherine DG (Cyber Citoyen)

Description: "đ˜šđ˜±đ˜Șđ˜Šđ˜„ 𝘰𝘯, đ˜§đ˜°đ˜­đ˜­đ˜°đ˜žđ˜Šđ˜„, đ˜”đ˜°đ˜łđ˜źđ˜Šđ˜Żđ˜”đ˜Šđ˜„: 70% 𝘰𝘧 đ˜·đ˜Șđ˜€đ˜”đ˜Ș𝘼𝘮 𝘰𝘧 đ˜„đ˜°đ˜źđ˜Šđ˜Žđ˜”đ˜Șđ˜€ đ˜·đ˜Șđ˜°đ˜­đ˜Šđ˜Żđ˜€đ˜Š đ˜łđ˜Šđ˜±đ˜°đ˜łđ˜” 𝘩đ˜čđ˜±đ˜Šđ˜łđ˜Șđ˜Šđ˜Żđ˜€đ˜Ș𝘯𝘹 đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜°đ˜­đ˜°đ˜šđ˜Șđ˜€đ˜ąđ˜­ đ˜ąđ˜Łđ˜¶đ˜Žđ˜Š. 𝘈𝘮 đ˜”đ˜©đ˜Š đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜°đ˜­đ˜°đ˜šđ˜Șđ˜€đ˜ąđ˜­ đ˜Šđ˜Żđ˜·đ˜Șđ˜łđ˜°đ˜Żđ˜źđ˜Šđ˜Żđ˜” đ˜ąđ˜łđ˜°đ˜¶đ˜Żđ˜„ đ˜·đ˜Șđ˜€đ˜”đ˜Ș𝘼𝘮 đ˜Łđ˜Šđ˜€đ˜°đ˜źđ˜Šđ˜Ž 𝘼𝘰𝘳𝘩 đ˜€đ˜°đ˜źđ˜±đ˜­đ˜Šđ˜č, đ˜©đ˜°đ˜ž đ˜€đ˜ąđ˜Ż 𝘾𝘩 𝘾𝘰𝘳𝘬 đ˜”đ˜° đ˜Șđ˜źđ˜±đ˜łđ˜°đ˜·đ˜Š đ˜„đ˜Ș𝘹đ˜Șđ˜”đ˜ąđ˜­ 𝘭đ˜Șđ˜”đ˜Šđ˜łđ˜ąđ˜€đ˜ș 𝘱𝘼𝘰𝘯𝘹 đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜­đ˜Š đ˜±đ˜°đ˜±đ˜¶đ˜­đ˜ąđ˜”đ˜Ș𝘰𝘯𝘮 đ˜ąđ˜Żđ˜„ đ˜Șđ˜źđ˜±đ˜­đ˜Šđ˜źđ˜Šđ˜Żđ˜” đ˜Žđ˜¶đ˜±đ˜±đ˜°đ˜łđ˜” đ˜”đ˜°đ˜°đ˜­đ˜Ž? [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/331exnpDyow
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec #cybersecurite

2025-10-12

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Red Team Road Rage: Weaponizing Vulnerable Drivers to Blind EDR" đ—œđ—źđ—ż/𝗯𝘆 Jake Mayhew (White Knight Labs)

Description: "đ˜Œđ˜Żđ˜„đ˜±đ˜°đ˜Șđ˜Żđ˜” đ˜‹đ˜Šđ˜”đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 & đ˜™đ˜Šđ˜Žđ˜±đ˜°đ˜Żđ˜Žđ˜Š (𝘌𝘋𝘙) đ˜”đ˜°đ˜°đ˜­đ˜Ž 𝘱𝘳𝘩 đ˜Łđ˜Šđ˜€đ˜°đ˜źđ˜Ș𝘯𝘹 𝘼𝘰𝘳𝘩 đ˜ąđ˜Żđ˜„ 𝘼𝘰𝘳𝘩 đ˜Žđ˜°đ˜±đ˜©đ˜Șđ˜Žđ˜”đ˜Șđ˜€đ˜ąđ˜”đ˜Šđ˜„, 𝘳𝘩đ˜Čđ˜¶đ˜Ș𝘳đ˜Ș𝘯𝘹 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜łđ˜Ž (đ˜Łđ˜°đ˜”đ˜© đ˜šđ˜°đ˜°đ˜„ & đ˜Šđ˜·đ˜Ș𝘭) đ˜”đ˜° 𝘾𝘰𝘳𝘬 đ˜Šđ˜·đ˜Šđ˜ł đ˜©đ˜ąđ˜łđ˜„đ˜Šđ˜ł đ˜”đ˜° đ˜Žđ˜¶đ˜Łđ˜·đ˜Šđ˜łđ˜” đ˜”đ˜©đ˜Šđ˜ź. [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/Q0Io1baL6rc
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec #cybersecurite

2025-10-10

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Salesforce Snafus: Unveiling and Exploiting Security Misconfigurations Using Commonly Used Widgets" đ—œđ—źđ—ż/𝗯𝘆 Jessa Riley Gegax

Description: "đ˜›đ˜©đ˜Ș𝘮 đ˜”đ˜ąđ˜­đ˜Ź 𝘩đ˜čđ˜±đ˜­đ˜°đ˜łđ˜Šđ˜Ž đ˜©đ˜°đ˜ž đ˜”đ˜° đ˜­đ˜Šđ˜·đ˜Šđ˜łđ˜ąđ˜šđ˜Š đ˜”đ˜©đ˜Š 𝘯𝘰𝘰𝘬𝘮 đ˜ąđ˜Żđ˜„ đ˜€đ˜łđ˜ąđ˜Żđ˜Żđ˜Ș𝘩𝘮 𝘰𝘧 đ˜šđ˜ąđ˜­đ˜Šđ˜Žđ˜§đ˜°đ˜łđ˜€đ˜Š đ˜”đ˜° 𝘧đ˜Șđ˜Żđ˜„ đ˜ąđ˜Żđ˜„ đ˜ąđ˜Łđ˜¶đ˜Žđ˜Š 𝘼đ˜Șđ˜Žđ˜€đ˜°đ˜Żđ˜§đ˜Șđ˜šđ˜¶đ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯𝘮 đ˜”đ˜©đ˜ąđ˜” đ˜€đ˜©đ˜ąđ˜Ș𝘯 đ˜”đ˜°đ˜šđ˜Šđ˜”đ˜©đ˜Šđ˜ł đ˜ąđ˜Żđ˜„ đ˜€đ˜łđ˜Šđ˜ąđ˜”đ˜Š 𝘮𝘩𝘳đ˜Șđ˜°đ˜¶đ˜Ž đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 đ˜”đ˜©đ˜ąđ˜” 𝘭𝘩𝘱𝘬 𝘮𝘩𝘯𝘮đ˜Șđ˜”đ˜Șđ˜·đ˜Š đ˜„đ˜ąđ˜”đ˜ą đ˜”đ˜° đ˜ąđ˜„đ˜·đ˜Šđ˜łđ˜Žđ˜ąđ˜łđ˜Ș𝘩𝘮. [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/rGNk65n3dD8
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec #cybersecurite

2025-10-08

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Linux and IoT malware analysis with r2ai" đ—œđ—źđ—ż/𝗯𝘆 @cryptax

Description: "𝘈 đ˜§đ˜¶đ˜­đ˜­ 𝘼𝘱𝘭𝘾𝘱𝘳𝘩 𝘱𝘯𝘱𝘭đ˜ș𝘮đ˜Ș𝘮 đ˜Ș𝘮 đ˜Čđ˜¶đ˜Șđ˜”đ˜Š 𝘭𝘰𝘯𝘹 đ˜”đ˜° đ˜±đ˜Šđ˜łđ˜§đ˜°đ˜łđ˜ź. đ˜‹đ˜Šđ˜±đ˜Šđ˜Żđ˜„đ˜Ș𝘯𝘹 𝘰𝘯 đ˜Șđ˜”đ˜Ž đ˜€đ˜°đ˜źđ˜±đ˜­đ˜Šđ˜čđ˜Șđ˜”đ˜ș đ˜ąđ˜Żđ˜„ đ˜”đ˜©đ˜Š đ˜„đ˜Šđ˜Žđ˜Șđ˜łđ˜Šđ˜„ đ˜­đ˜Šđ˜·đ˜Šđ˜­ 𝘰𝘧 đ˜„đ˜Šđ˜”đ˜ąđ˜Ș𝘭𝘮, đ˜Șđ˜” đ˜”đ˜ąđ˜Źđ˜Šđ˜Ž đ˜Łđ˜Šđ˜”đ˜žđ˜Šđ˜Šđ˜Ż đ˜©đ˜ąđ˜­đ˜§ 𝘱 đ˜„đ˜ąđ˜ș đ˜ąđ˜Żđ˜„ 10 đ˜„đ˜ąđ˜ș𝘮. 𝘊𝘱𝘯 𝘾𝘩 đ˜Žđ˜±đ˜Šđ˜Šđ˜„ đ˜¶đ˜± đ˜”đ˜©đ˜Š đ˜±đ˜łđ˜°đ˜€đ˜Šđ˜Žđ˜Ž 𝘾đ˜Șđ˜”đ˜© 𝘱𝘮𝘮đ˜Șđ˜Žđ˜”đ˜ąđ˜Żđ˜€đ˜Š 𝘧𝘳𝘰𝘼 đ˜ˆđ˜łđ˜”đ˜Ș𝘧đ˜Șđ˜€đ˜Ș𝘱𝘭 đ˜đ˜Żđ˜”đ˜Šđ˜­đ˜­đ˜Șđ˜šđ˜Šđ˜Żđ˜€đ˜Š (𝘈𝘐)? 𝘞đ˜Ș𝘭𝘭 đ˜”đ˜©đ˜Š đ˜Čđ˜¶đ˜ąđ˜­đ˜Șđ˜”đ˜ș 𝘰𝘧 đ˜”đ˜©đ˜Š 𝘱𝘯𝘱𝘭đ˜ș𝘮đ˜Ș𝘮 𝘣𝘩 đ˜šđ˜°đ˜°đ˜„ đ˜Šđ˜Żđ˜°đ˜¶đ˜šđ˜©? [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/cyuwcKAlE6g
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec #cybersecurite

2025-10-07

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Living Off the Pipeline" đ—œđ—źđ—ż/𝗯𝘆 François Proulx

Description: "đ˜›đ˜©đ˜Š 𝘯𝘩đ˜čđ˜” đ˜žđ˜ąđ˜·đ˜Š 𝘰𝘧 đ˜šđ˜¶đ˜±đ˜±đ˜­đ˜ș đ˜Šđ˜©đ˜ąđ˜Ș𝘯 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Ž đ˜Ș𝘮 𝘣𝘳𝘩𝘾đ˜Ș𝘯𝘹 đ˜Ș𝘯 đ˜°đ˜¶đ˜ł đ˜‰đ˜¶đ˜Șđ˜­đ˜„ 𝘗đ˜Șđ˜±đ˜Šđ˜­đ˜Ș𝘯𝘩𝘮 (𝘊𝘐/𝘊𝘋), đ˜žđ˜©đ˜Šđ˜łđ˜Š 0-đ˜„đ˜ąđ˜ș𝘮 đ˜ąđ˜Żđ˜„ đ˜Żđ˜°đ˜·đ˜Šđ˜­ đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Ź đ˜±đ˜ąđ˜”đ˜©đ˜Ž 𝘱𝘳𝘩 đ˜Žđ˜”đ˜Ș𝘭𝘭 𝘾𝘱đ˜Șđ˜”đ˜Ș𝘯𝘹 đ˜”đ˜° 𝘣𝘩 đ˜„đ˜Șđ˜Žđ˜€đ˜°đ˜·đ˜Šđ˜łđ˜Šđ˜„. 𝘐𝘯 2024, đ˜”đ˜©đ˜Š 𝘟𝘡 đ˜€đ˜°đ˜źđ˜±đ˜łđ˜Šđ˜Žđ˜Žđ˜Ș𝘰𝘯 𝘭đ˜Ș𝘣𝘳𝘱𝘳đ˜ș đ˜€đ˜°đ˜źđ˜±đ˜łđ˜°đ˜źđ˜Ș𝘮𝘩 𝘾𝘱𝘮 đ˜¶đ˜Žđ˜Šđ˜„ 𝘱𝘮 𝘱 đ˜”đ˜łđ˜°đ˜«đ˜ąđ˜Ż đ˜©đ˜°đ˜łđ˜Žđ˜Š đ˜”đ˜° đ˜Łđ˜ąđ˜€đ˜Źđ˜„đ˜°đ˜°đ˜ł đ˜–đ˜±đ˜Šđ˜Żđ˜šđ˜šđ˜, đ˜”đ˜©đ˜ąđ˜Żđ˜Źđ˜§đ˜¶đ˜­đ˜­đ˜ș, đ˜”đ˜©đ˜Ș𝘮 𝘾𝘱𝘮 đ˜€đ˜ąđ˜¶đ˜šđ˜©đ˜” 𝘩𝘱𝘳𝘭đ˜ș 𝘰𝘯, đ˜Łđ˜¶đ˜” đ˜”đ˜©đ˜Š 𝘯𝘩đ˜čđ˜” đ˜”đ˜Ș𝘼𝘩 đ˜Șđ˜” 𝘼đ˜Șđ˜šđ˜©đ˜” 𝘹𝘰 đ˜¶đ˜Żđ˜Żđ˜°đ˜”đ˜Șđ˜€đ˜Šđ˜„ 𝘧𝘰𝘳 đ˜źđ˜¶đ˜€đ˜© 𝘭𝘰𝘯𝘹𝘩𝘳. [...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/FO8eIGu8EJo
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#NorthSec #cybermonth #cybersecurity #infosec #cybersecurite

2025-10-06

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "UNO Reverse Card: Exposing C2 Operators Through Their Own Logs" đ—œđ—źđ—ż/𝗯𝘆 Estelle Ruellan

Tu veux plus de contenu human dans ton fil d'actualité? En ce mois de la cyber, NorthSec te propose de revoir chaque jour une conférence de 2025 sous forme de clip. La version complÚte de la conférence est disponible sur Youtube!

Want more human content in your news feed? This Cyber Month, NorthSec invites you to watch a clip from a 2025 conference every day. The full version of the talk is available on YouTube!

Description: "đ˜đ˜Żđ˜§đ˜°đ˜Žđ˜”đ˜Šđ˜ąđ˜­đ˜Šđ˜łđ˜Ž 𝘱𝘳𝘩 𝘼𝘱𝘭𝘾𝘱𝘳𝘩 đ˜”đ˜©đ˜ąđ˜” đ˜€đ˜°đ˜­đ˜­đ˜Šđ˜€đ˜” 𝘮𝘩𝘯𝘮đ˜Șđ˜”đ˜Șđ˜·đ˜Š đ˜„đ˜ąđ˜”đ˜ą 𝘧𝘳𝘰𝘼 đ˜Șđ˜Żđ˜§đ˜Šđ˜€đ˜”đ˜Šđ˜„ đ˜„đ˜Šđ˜·đ˜Șđ˜€đ˜Šđ˜Ž đ˜ąđ˜Żđ˜„ đ˜”đ˜łđ˜ąđ˜Żđ˜Žđ˜źđ˜Șđ˜” đ˜Șđ˜” đ˜”đ˜° đ˜Šđ˜°đ˜źđ˜źđ˜ąđ˜Żđ˜„-đ˜ąđ˜Żđ˜„-đ˜Šđ˜°đ˜Żđ˜”đ˜łđ˜°đ˜­ (𝘊2) đ˜Žđ˜Šđ˜łđ˜·đ˜Šđ˜łđ˜Ž đ˜°đ˜±đ˜Šđ˜łđ˜ąđ˜”đ˜Šđ˜„ 𝘣đ˜ș đ˜€đ˜șđ˜Łđ˜Šđ˜łđ˜€đ˜łđ˜Ș𝘼đ˜Ș𝘯𝘱𝘭𝘮. đ˜›đ˜©đ˜Š đ˜łđ˜Šđ˜Žđ˜¶đ˜­đ˜”đ˜Ș𝘯𝘹 đ˜Žđ˜”đ˜Šđ˜ąđ˜­đ˜Šđ˜ł 𝘭𝘰𝘹𝘮, đ˜€đ˜°đ˜Żđ˜”đ˜ąđ˜Ș𝘯đ˜Ș𝘯𝘹 đ˜€đ˜łđ˜Šđ˜„đ˜Šđ˜Żđ˜”đ˜Ș𝘱𝘭𝘮 đ˜ąđ˜Żđ˜„ 𝘮đ˜șđ˜Žđ˜”đ˜Šđ˜ź đ˜Șđ˜Żđ˜§đ˜°đ˜łđ˜źđ˜ąđ˜”đ˜Ș𝘰𝘯, đ˜§đ˜¶đ˜Šđ˜­ 𝘱 đ˜­đ˜¶đ˜€đ˜łđ˜ąđ˜”đ˜Șđ˜·đ˜Š đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜šđ˜łđ˜°đ˜¶đ˜Żđ˜„ đ˜źđ˜ąđ˜łđ˜Źđ˜Šđ˜”. đ˜‰đ˜¶đ˜” đ˜žđ˜©đ˜ąđ˜” đ˜Ș𝘧 𝘊2 đ˜°đ˜±đ˜Šđ˜łđ˜ąđ˜”đ˜°đ˜łđ˜Ž 𝘱𝘭𝘮𝘰 𝘧𝘩𝘭𝘭 đ˜·đ˜Șđ˜€đ˜”đ˜Ș𝘼 đ˜”đ˜° đ˜”đ˜©đ˜Šđ˜Ș𝘳 𝘰𝘾𝘯 𝘮𝘬đ˜Ș𝘼 : đ˜”đ˜©đ˜Š 𝘣đ˜Șđ˜”đ˜Šđ˜łđ˜Ž 𝘣đ˜Șđ˜”. đ˜–đ˜¶đ˜ł đ˜łđ˜Šđ˜Žđ˜Šđ˜ąđ˜łđ˜€đ˜© đ˜łđ˜Šđ˜·đ˜Šđ˜ąđ˜­đ˜Ž đ˜”đ˜©đ˜ąđ˜” 𝘊2 đ˜°đ˜±đ˜Šđ˜łđ˜ąđ˜”đ˜°đ˜łđ˜Ž đ˜”đ˜©đ˜Šđ˜źđ˜Žđ˜Šđ˜­đ˜·đ˜Šđ˜Ž đ˜Žđ˜°đ˜źđ˜Šđ˜”đ˜Ș𝘼𝘩𝘮 đ˜Łđ˜Šđ˜€đ˜°đ˜źđ˜Š đ˜¶đ˜Żđ˜žđ˜Șđ˜”đ˜”đ˜Ș𝘯𝘹 đ˜·đ˜Șđ˜€đ˜”đ˜Ș𝘼𝘮, 𝘩đ˜čđ˜±đ˜°đ˜Žđ˜Ș𝘯𝘹 đ˜·đ˜ąđ˜­đ˜¶đ˜ąđ˜Łđ˜­đ˜Š đ˜Șđ˜Żđ˜”đ˜Šđ˜­đ˜­đ˜Șđ˜šđ˜Šđ˜Żđ˜€đ˜Š đ˜ąđ˜Łđ˜°đ˜¶đ˜” đ˜”đ˜©đ˜Šđ˜Ș𝘳 đ˜°đ˜±đ˜Šđ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯𝘮. 𝘐𝘯 đ˜”đ˜©đ˜Ș𝘮 đ˜±đ˜łđ˜Šđ˜Žđ˜Šđ˜Żđ˜”đ˜ąđ˜”đ˜Ș𝘰𝘯, 𝘾𝘩 𝘾đ˜Ș𝘭𝘭 𝘣𝘩 đ˜”đ˜¶đ˜łđ˜Żđ˜Ș𝘯𝘹 đ˜”đ˜©đ˜Š đ˜”đ˜ąđ˜Łđ˜­đ˜Šđ˜Ž 𝘰𝘯 đ˜”đ˜©đ˜Š đ˜·đ˜Šđ˜łđ˜ș đ˜ąđ˜€đ˜”đ˜°đ˜łđ˜Ž đ˜Łđ˜Šđ˜©đ˜Șđ˜Żđ˜„ đ˜Șđ˜Żđ˜§đ˜°đ˜Žđ˜”đ˜Šđ˜ąđ˜­đ˜Šđ˜łđ˜Ž. đ˜›đ˜©đ˜łđ˜°đ˜¶đ˜šđ˜© 𝘱𝘯𝘱𝘭đ˜ș𝘮đ˜Ș𝘮 𝘰𝘧 đ˜Žđ˜”đ˜Šđ˜ąđ˜­đ˜Šđ˜ł 𝘭𝘰𝘹𝘮, 𝘾𝘩 đ˜¶đ˜Żđ˜€đ˜°đ˜·đ˜Šđ˜ł đ˜„đ˜Șđ˜·đ˜Šđ˜łđ˜Žđ˜Š đ˜±đ˜łđ˜°đ˜§đ˜Ș𝘭𝘩𝘮 𝘾đ˜Șđ˜”đ˜©đ˜Ș𝘯 đ˜”đ˜©đ˜Š đ˜Șđ˜Żđ˜§đ˜°đ˜Žđ˜”đ˜Šđ˜ąđ˜­đ˜Šđ˜ł đ˜Šđ˜€đ˜°đ˜Žđ˜șđ˜Žđ˜”đ˜Šđ˜ź.[...]"

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/y4mPoN3Z2Yk
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#nsec2025 #cybermonth #cybersecurity #infosec #cybersecurite

2025-10-05

⏭ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 đŸźđŸŹđŸźđŸ± đ—˜đ—» 𝗿đ—Čđ—œđ—żđ—¶đ˜€đ—Č/đ—„đ—Čđ—œđ—č𝗼𝘆𝘀 : "Keynote: A Pirate's Guide to Snake Oil and Security" đ—œđ—źđ—ż/𝗯𝘆 @hdm

Tu veux plus de contenu human dans ton fil d'actualité? En ce mois de la cyber, NorthSec te propose de revoir chaque jour une conférence de 2025 sous forme de clip. La version complÚte de la conférence est disponible sur Youtube!

Want more human content in your news feed? This Cyber Month, NorthSec invites you to watch a clip from a 2025 conference every day. The full version of the talk is available on YouTube!

Description: "đ˜žđ˜Šđ˜­đ˜€đ˜°đ˜źđ˜Š đ˜ąđ˜Łđ˜°đ˜ąđ˜łđ˜„ đ˜”đ˜©đ˜Š 𝘊𝘝𝘚𝘚 đ˜‰đ˜°đ˜Żđ˜Žđ˜Šđ˜€đ˜°đ˜¶đ˜łđ˜Ž! đ˜–đ˜¶đ˜ł 𝘧đ˜Șđ˜łđ˜Žđ˜” đ˜Žđ˜”đ˜°đ˜± đ˜Ș𝘮 đ˜”đ˜©đ˜Š đ˜Șđ˜Žđ˜­đ˜ąđ˜Żđ˜„ 𝘰𝘧 đ˜đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜ș đ˜”đ˜ąđ˜Żđ˜ąđ˜šđ˜Šđ˜źđ˜Šđ˜Żđ˜”; 𝘱 𝘾đ˜Șđ˜­đ˜„ đ˜±đ˜­đ˜ąđ˜€đ˜Š 𝘧đ˜Șđ˜łđ˜Žđ˜” đ˜Žđ˜Šđ˜”đ˜”đ˜­đ˜Šđ˜„ 𝘣đ˜ș đ˜©đ˜ąđ˜€đ˜Źđ˜Šđ˜łđ˜Ž, 𝘯𝘰𝘾 đ˜€đ˜°đ˜Żđ˜šđ˜Šđ˜Žđ˜”đ˜Šđ˜„ 𝘾đ˜Șđ˜”đ˜© 𝘾𝘱𝘳𝘳đ˜Ș𝘯𝘹 đ˜”đ˜łđ˜Ș𝘣𝘩𝘮, đ˜Šđ˜ąđ˜€đ˜© 𝘮𝘩𝘭𝘭đ˜Ș𝘯𝘹 𝘼𝘱𝘹đ˜Șđ˜€đ˜Ź 𝘰đ˜Șđ˜Żđ˜”đ˜źđ˜Šđ˜Żđ˜”đ˜Ž đ˜”đ˜©đ˜ąđ˜” đ˜”đ˜©đ˜Šđ˜ș đ˜€đ˜­đ˜ąđ˜Ș𝘼 𝘾đ˜Ș𝘭𝘭 đ˜±đ˜łđ˜°đ˜”đ˜Šđ˜€đ˜” đ˜șđ˜°đ˜¶đ˜ł đ˜Žđ˜©đ˜Șđ˜± 𝘧𝘳𝘰𝘼 đ˜šđ˜©đ˜°đ˜Žđ˜”đ˜Ž, đ˜žđ˜©đ˜Șđ˜łđ˜­đ˜±đ˜°đ˜°đ˜­đ˜Ž, đ˜”đ˜Šđ˜łđ˜źđ˜Șđ˜”đ˜Šđ˜Ž, đ˜ąđ˜Żđ˜„ 𝘹đ˜Șđ˜ąđ˜Żđ˜” 𝘮đ˜Čđ˜¶đ˜Șđ˜„đ˜Ž 𝘱𝘭đ˜Ș𝘬𝘩. 𝘞𝘩'𝘭𝘭 đ˜·đ˜Ș𝘮đ˜Șđ˜” đ˜”đ˜©đ˜Šđ˜Žđ˜Š đ˜”đ˜łđ˜Ș𝘣𝘩𝘮, đ˜€đ˜°đ˜źđ˜±đ˜ąđ˜łđ˜Š đ˜”đ˜©đ˜Šđ˜Ș𝘳 đ˜žđ˜ąđ˜łđ˜Šđ˜», đ˜Șđ˜„đ˜Šđ˜Żđ˜”đ˜Ș𝘧đ˜ș đ˜”đ˜©đ˜Š đ˜¶đ˜Žđ˜Šđ˜§đ˜¶đ˜­ đ˜±đ˜łđ˜°đ˜„đ˜¶đ˜€đ˜”đ˜Ž, đ˜ąđ˜Żđ˜„ đ˜©đ˜Șđ˜šđ˜©đ˜­đ˜Șđ˜šđ˜©đ˜” đ˜”đ˜©đ˜°đ˜Žđ˜Š đ˜”đ˜©đ˜ąđ˜” đ˜«đ˜¶đ˜Žđ˜” đ˜­đ˜Šđ˜ąđ˜·đ˜Š đ˜șđ˜°đ˜¶ 𝘹𝘳𝘩𝘱𝘮đ˜ș đ˜ąđ˜Żđ˜„ đ˜±đ˜°đ˜°đ˜ł."

🔗 ConfĂ©rence complĂšte/Full Talk: youtu.be/yHHImYJ9yKM
đŸŽŸïž Billets/Tickets NorthSec 2026: nsec.io/
👉 Suivez-vous pour plus de contenu cyber! Follow us for more cyber content!

#nsec2025 #cybermonth #cybersecurity #infosec #cybersecurite

empressbatempressbat
2025-09-29

- pleased to see Department of Home Affairs (Australia) has released fact sheets on cyber security and online safety tailored to Australia’s people. With so much of our lives online we cannot leave anyone behind. actnowstaysecure.gov.au/first-

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst