BSidesTLV 2022 - Amichai's And Stav Shulman's 'Now You C(&C), Now You Don’t' →
Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel.
Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel.
Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel.
Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel.
Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel.
Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel.
Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel.
Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel.
Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel.
Infosecurity.US extends our best wishes to the State of Israel on the occasion of their 72nd Independence Day!
> Image Credit> , > Israeli Defense Forces> , The > IDF**> Desert Rreconnaissance Battalion**> Training Exercises
Terrific blog post by Gerhard Jacobs, writing at the Imperva Cybersecurity blog, and discussing IoT and ML with Gilad Yehudai (Gilad is a Security Research Engineer at Imperva), this time, where connected devices and machine learning interact in concert with and inform warfighting and warrior, and machine capabilities. Today's Must Read.
A new research paper has attracted my attention at arXiv.org; and from Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici, all from the astonishingly prolific Ben-Gurion University of the Negev, in southern Israel's blooming desert - the Negev. Interestingly, all working in the Cyber-Security Research Center a component - if you will - of the Department of Software and Information Systems Engineering.
This is one of those seemingly easy to grasp, easy to execute (for the right entities, and with the apropos hardware and software exfiltration tools) in which, data may be slurped-up, with minimal invasive telltale artifacts left behind, simply from sampling the modulated goodness of the electrical power connection to the targeted device.
Importantly, this form of attack would be devestating to the target, of which, has essentially no in-built incusion defense watching over the electrical power flow into the machies PDU (other than the usual gatekeeping set up around and amongst whatever payload is being sought (think diretory services, database passwords, API security, tokens, et cetera). Certainly, today's Must Read.
Infosecurity.US wishes to extend our hearty best wishes to the State of Israel on the occasion of their sixty-ninth Independence Day!
Israel Hayom is reporting the Israel Defense Forces (IDF) plans to create an entirely separate and new branch of the State of Israel's primary military defense targeting cyberwarfare. The decision to create a separate military service targeting electronic warfare appears to be one of the first of it's kind worldwide, and significantly forward-thinking.
'The new branch will join the Israeli Air Force, Navy, and GOC Army Headquarters as a main service branch that will oversee the military's cyberwarfare strategy, as well as its proactive cyber efforts, which are currently headed by Military Intelligence, and its cyberdefense efforts, currently headed by the C4I Corps.' - via Israel Hayom's Lilach Shoval and Israel Hayom Staff.