Paulo Silva
Diogo Carapinha
Gabriela Campos de Sousa
Julio Camargo
Jezer Ferreira
Robson Silva
Miguel Casares
El Wali Karboub
Pedro Vieira
Duarte Manuel Coelho dos Santos
Raphael Silva
Roman Ramirez
Gabriela García
David Melendez
Pedro Umbelino
Un apagón electromagnético global provocaría un cambio radical en la sociedad, similar a "Demolition Man". La cultura "prepper" se vuelve esencial, con su énfasis en la autosuficiencia y preparación ante desastres. Infraestructuras clave como electricidad, comunicaciones y transporte sufrirían enormemente. La ciberseguridad debe adaptarse a la falta de tecnología digital, y el papel de los hackers se torna ambiguo. Consejos como mantener la calma y preparar kits de emergencia son vitales. Los equipos de seguridad informática enfrentan dilemas éticos, y la dependencia excesiva en tecnologías como la nube y el IoT se cuestiona, impulsando la búsqueda de soluciones más resilientes.
Gabriela García
Gabriela (Gabs) García is a Secure Software Developer, professor, mentor, and instructor in coding and cybersecurity for organizations including LinkedIn, Cyber Hunter Academy, and Kschool. She specializes in teaching software development with a focus on security. Additionally, she is an active participant in hacker communities such as HackMadrid%27 and Hack%27, both in Spain and internationally. Gabriela has also been a speaker at prominent global conferences like DEFCON USA, Codemotion Madrid and RootedCON Valencia & Madrid.
David Melendez
David Melendez is an R&D Engineer and Red Team member at Innotec Security Part of Accenture, with over twelve years of experience in cybersecurity and hardware hacking. He has a proven track record of presenting his groundbreaking investigations at prestigious conferences around the world, including DEFCON, BLACKHAT, and ROOTEDCON. David is also a drone creator and author of the book "Hacking with Drones," which showcases his innovative use of drones in cybersecurity research. With his passion for pushing the boundaries of technology, David is constantly seeking new ways to improve the security and functionality of embedded systems
Code Injection is one of the most severe security vulnerabilities, as it allows attackers to inject and execute malicious code in the application, completely compromising the system's security. Although there is usually some care taken when implementing features that are prone to this issue, without knowing how an attacker can get around these security mechanisms, it becomes difficult to develop a truly robust defense. In this talk we'll see how an attacker can bypass these defenses, taking the example of CVE-2023-50447, where it was possible to leverage Dunder methods and some creativity to achieve Arbitrary Code Execution in the Pillow library - one of the most widely used Python libraries.
Duarte Manuel Coelho dos Santos
I'm currently an AppSec Analyst at Checkmarx, where I delve into the intricate world of application security. My academic path led me to a Master's degree in Computer Science and Engineering with a focus on Cybersecurity at Instituto Superior Técnico, which culminated in a thesis on the automatic patching of software vulnerabilities. Outside of work, I share some of my insights on my security blog, discussing everything from CVEs I've discovered to broader security topics. I'd love to hear what you think about them! From time to time, I also take part in CTF competitions with team STT. In my spare time, I like to relax with a few bouldering sessions and also to play the drums.
Em julho do ano passado, um importante oficial militar russo foi atacado por um drone enquanto ia de bicicleta em sua rotina matinal. Meses antes, um promotor paraguaio foi atacado por jet skis em um resort no Caribe. O próprio Elon Musk implorou a um adolescente que rastreava seu paradeiro a partir de seu jato particular que o deixasse em nome de sua segurança. O que eles têm em comum? Todos eles subestimaram o poder da OSINT para rastrear, localizar geograficamente e encontrar vulnerabilidades em sistemas e pessoas. Esta palestra explicará "Quem" e "Como" a OSINT está sendo usada para atacar usinas, redes ferroviárias, sistemas de alerta de desastres naturais e até prisões espanholas e é claro, as pessoas que as operam... vocês ja sabem, o elo mais fraco da Segurança de Informação.
Jezer Ferreira
Professor oficial de inteligência cibernética e OSINT para polícia de investigação e forense na América Latina, Espanha e nos EUA. Instrutor especialista da INTERPOL no programa FOSI - Fundamentals of Open Source Intelligence. Coordenador de treinamentos de Inteligência Cibernética e OSINT na Cyber Hunter Academy Professor de OSINT e CySA na Universidade de Santiago de Compostela (USC), Espanha. Professor de SOCMINT no Mestrado em Segurança Cibernética do Campus de Segurança Cibernética e da Universidade Católica de Murcia (UCAM), Espanha. Professor da extensão universitária em OSINT e Inteligência Cibernética da RaSeg, México. Diretor do Mestrado em Segurança Cibernética e Hacker Ético na Kschool - Grupo UNIR - Universidade de La Rioja, Espanha. Professor do Mestrado em Inteligência de Ameaças Cibernéticas na Kschool. Professor de OSINT no Mestrado em Segurança Cibernética na Escuela de Organización Industrial (EOI), Espanha. Organización Industrial (EOI), Espanha. Professor de OSINT na Pós Graduação Cyber Threat Intelligence - Pós Graduação Cyber Threat Intelligence - DARYUS, Brasil. Professor da Pós Graduação em Inteligência Cibernética - WB Educação, Brasil. Juiz e membro do comitê global OSINT Search Party CTF (Missing Persons Search Party CTF). Instrutor da IACA - International Association of Crime Analysts com treinamento ao FBI e a Homeland Security. Co-criador do maior evento de OSINT e Engenharia Social da Europa: OSINTOMATICO Conference e da conferência OSINTOMATICOPS dedicada à militares e policiais de todo o mundo. Condecorado em 2022 e 2023 com a medalha: Santos Ángeles Custódios - Amigos da Polícia Nacional: em reconhecimento ao trabalho em colaboração com a FFCCS na busca de pessoas desaparecidas e na luta contra o terrorismo cibernético.
XZ Utils is a widely utilized open source suite of command-line tools for lossless data compression on virtually all Unix-like operating systems, including Linux. The vulnerability originated from a carefully orchestrated supply chain attack, where an adversary compromised the upstream source code repository of the XZ project, discreetly implanting the backdoor into the source code tarball releases. In this talk we'll explore what we know about the backdoor and how to detect it with Wazuh, the open source security platform.
Miguel Casares
Miguel Casares is a security engineer and Director of Operations at Wazuh, Inc., with over 6 years of experience in cybersecurity and system administration. He specializes in leveraging open source tools and methodologies to fortify environments against evolving cyber threats. He aims to continue helping build free, open source cybersecurity for everyone while developing his cybersecurity knowledge.
El Wali Karboub
With over five years of experience in cybersecurity, Elwali Karkoub works as a solution architect at Wazuh, Inc. His main focus is on assisting in efficiently utilizing open-source technologies to identify cyber risks and improve the security of environments. He enjoys web penetration and sharing knowledge on blogs and videos.
In the age of AI, when choosing a new ride, we could have just asked ChatGPT or Bard for a quick recommendation. But nope, we're not taking the easy route. We put our hacking skills at service to check how seriously car manufacturers take their security game. We're here to spill the tea on some of the security hiccups we've uncovered in the online realms of various car manufacturers. This is a presentation that's as street legal as your grandma's Sunday drive, respecting all those speed limits. We're not just here to bore you with technical jargon; we're here to make you dream of owning a Ferrari, give you a taste of a wild Porsche experience, and spill the beans on how to overtake a Mercedes with the utmost style. And hey, if you're rolling in a different brand, don't worry - we've got your back. So buckle up, folks! This talk is going to be a wild ride, but fear not, a driving license is not required. We promise not to crash your expectations – just the insecure parts of those online car assets. See you at the intersection of laughs and cybersecurity!
Paulo Silva
Paulo is a security practitioner with a solid background in software development, who has spent the last decade focused on identifying critical vulnerabilities and breaking software. He is a long-time OWASP volunteer and co-leader of the OWASP API Security Project, where he advocates for secure API practices and contributes significantly to mitigating security risks in the API landscape.
Open-source intelligence is the process of transforming data, available from publicly sources, into intelligence. Intelligence being value added information that allows increased knowledge, decisions or actions to be taken. The questions to be answered by OSINT are: How to get the right/related data? Internet was created with the purpose of sharing data. Every day the amount of information is growing at an exponential rate. Finding the needle in haystack is quite valuable. How to transform the filtered data into intelligence? We'll be showing how to pivot from one piece of information to another, aggregate the gathered information, improve the filtering, and transform the data. It's ok to have nothing to hide, but is it ok to show everything? Why can this be dangerous?
Pedro Vieira
Pedro Vieira is an experienced security researcher with a wide range of expertise. He is passionate about raising awareness about cybersecurity best practices and empowering individuals and organizations to proactively defend against evolving threats in the digital landscape. In his free time, Pedro enjoys sharing his knowledge and expertise with aspiring cybersecurity professionals through mentoring, coaching, and contributing to online forums and communities. He is committed to making a positive impact on the cybersecurity landscape and ensuring a safer and more secure digital future for all.
Este paper analisa o papel do hacktivismo, ciberguerra e ciberespionagem no contexto do conflito entre Israel e Hamas. Examinando ao detalhe os primeiros 20 dias pós-ataque, destaca as atividades e táticas utilizadas por ambos os lados no ciberespaço, bem como os elementos influenciam e são influenciados pelo conflito armado. Com exemplos e situações concretas, propõe estudar as estratégias de ataque e defesa cibernética, motivações por trás das ações digitais e o impacto das operações cibernéticas no desenrolar do conflito. Além disso, este estudo discute implicações éticas, legais e políticas relacionadas com o uso dessas ferramentas no contexto de um conflito militar e as suas consequências para a segurança cibernética global e os direitos humanos.
Diogo Carapinha
With a degree in International Relations from the Instituto Superior de Ciências Sociais e Políticas (ISCSP-UL), Diogo Carapinha is a Strategic Intelligence and Risk Analysis consultant at VisionWare - Sistemas de Informação, S.A. He is also sub- coordinator of the VisionWare Threat Intelligence Centre, a centre that monitors - in real time - and identifies actors in cyberspace, studying the latest threat phenomena and producing geopolitical and risk reports. Guest lecturer and coordinator of the specialisation courses "Contemporary Transnational Terrorism" and "Geopolitics and Security of the Mediterranean" at the Autonomous University of Lisbon, he writes for El Periódico on issues related to geopolitics and international security. He is frequently invited by the media and is a regular presence at conferences on topics such as Cyber Geopolitics and Cyber Warfare. He also has experience in the field of political consultancy and advisory services.
Gabriela Campos de Sousa
Transitioning from theoretical knowledge to the practical aspect in web security often presents some extra challenges. Real-world scenarios introduce complexities such as bad character filters and Web Application Firewalls (WAFs), demanding the researcher to investigate some way to bypass these restrictions. Here's some of our learnings: 1) Drawing from collaborative efforts and senior industry research becomes pivotal, offering insights that streamline exploits. 2) Embracing failure as a learning experience is fundamental. Despite unsuccessful attempts to escalate Cross-Site Scripting (XSS) vulnerabilities, this still proves useful as it makes you investigate topics you wouldn’t otherwise. Also learn a bit about how ethical security research faces legal hurdles in countries like Portugal, hindering progress and discouraging potential researchers. Navigating this bridge from theory to practice in web security requires both technical prowess and resilience, and I hope to share some of my learnings from this journey with you on this talk.
Raphael Silva
Hi! My name is Raphael Silva a 24yr old AppSec Researcher from Portugal. Having graduated college in 2021 with a degree in Information Systems, I’ve worked as a freelancer web developer for a year before joining my current company, Checkmarx. Since then, apart from my usual work doing research for our SAST engines I've taken part in some public speaking and public-facing activities, the more notable ones being conducting a Code Review workshop at AppSec Village at DEFCON30 and giving talks about AI and AppSec at my former university. I participate and help expand my company's vulnerability research initiatives, having found multiple vulnerabilities in open-source products over the years, such as: Odoo, OSTicket, Jellyfin and UmbracoCMS. I'm always looking for ways to expand my knowledge in the field, be that sharpening my technical skills by reading innovative research, practicing CTFs, engaging in some bug bounty hunting, and taking certifications. I'm eWPTXv2 certified and currently enrolled in OSCP.
Unindo o "Safety" ao "Open Source Security"
Julio Camargo
Julio Cesar Camargo is a cybersecurity professional with +20 years of experience working with open-source software. He started with Conectiva Linux and later became the official instructor helping dozens of students. As an aviation enthusiast and airplane pilot, he strives to bring all the aviation best practices to his professional routine. Julio started working with OPNsense in 2016, contributing to the project with code, official forum moderation, articles, Udemy course and author of the book OPNsense Beginner to Professional (Packt). He founded Cloudfence in 2018, a cybersecurity startup and a Luso-Brazilian-managed security services firm with an open-source DNA. As its CTO, Julio aims to spread open source security as a service to companies from different parts of the world.
A palestra tem como objetivo demonstrar técnicas de Malware Analysis & Reverse Engineer com Cyber paleontology na atribuição de ameaças e análise de operações ofensivas cibernéticas ICS/OT, patrocinado por Estado-nação, grupos de ameaça, mercenários e ciberterroristas contra infraestruturas críticas do setor elétrico e seus respectivos impactos geopolíticos a sociedade civil, defesa nacional e empresas.
Robson Silva
Robson Silva é veterano da Força Aérea Brasileira e do Corpo de Fuzileiros Navais do Brasil. Trabalhou em empresas de consultoria de Threat Intelligence, desenvolveu projetos e pesquisas de ameaças ICS para empresas nacionais e internacionais, trabalhou em empresas do setor de Petróleo, Gás, e Energia Elétrica. Profissional com 15 anos de experiência atuando em Inteligência de Ameaças, pesquisa de operações ofensivas ICS/OT, análise de Ameaças Persistentes Avançadas - APT's ICS/OT, detecção de ciber-espionagem e ransomware em ambientes ICS. Profundas habilidades em Threat Intelligence, Malware analysis, Reverse Engineering e geopolítica de conflitos cibernéticos. • Fundador e CEO da ADINT Cyber Intelligence Institute; • Mestre em Cibersegurança,Ciberterrorismo e Ciberguerra (Università d’ Italia); • Doutorando em Inteligência de Infraestruturas Críticas ICS/OT (King’s College London) • Pós -Graduado em Rel.Internacionais: Geopolítica e Defesa (UFRGS) • Pós-graduação em Cyber Threat Intelligence; • Bacharel em Relações Internacionais • Instrutor EC-Council ICS/SCADA Cybersecurity e CTIA - Certified Threat Intelligence Analyst. • Certificações: CTIA, GCTI, GRID & ICS/SCADA Cybersecurity
TBD
Roman Ramirez
TBD
In this talk, we will go over the vulnerability and events around the active and ongoing exploitation of KEV vulnerability CVE-2023-29552, a massive denial-of-service amplification attack vector. We will talk about the root cause, how it works and it’s current prevalence and distribution (vendors, sectors and geographies). We will go through the disclosure timeline and our collaboration with DHS/CISA in the process to reach out to vendors and service providers, and how almost by chance we found ourselves in a group to manage the ‘imminent’ crisis, that turned out different than expected... We will explore the timeline around it, why the most recent data leads me to believe there is a botnet behind the recent attacks and what you can do to help.
Pedro Umbelino
Pedro is a security researcher by day and Hackaday contributor by night. He started messing around with computers on a Spectrum, watched the bulletin board systems being dropped for the Internet, but still roams around in IRC. Known by the handle [kripthor], he likes all kind of hacks, hardware and software. If it’s security related even better. Pedro currently works at Bitsight as a Principal Security Researcher.
Este paper analisa o papel do hacktivismo, ciberguerra e ciberespionagem no contexto do conflito entre Israel e Hamas. Examinando ao detalhe os primeiros 20 dias pós-ataque, destaca as atividades e táticas utilizadas por ambos os lados no ciberespaço, bem como os elementos influenciam e são influenciados pelo conflito armado. Com exemplos e situações concretas, propõe estudar as estratégias de ataque e defesa cibernética, motivações por trás das ações digitais e o impacto das operações cibernéticas no desenrolar do conflito. Além disso, este estudo discute implicações éticas, legais e políticas relacionadas com o uso dessas ferramentas no contexto de um conflito militar e as suas consequências para a segurança cibernética global e os direitos humanos.
Diogo Carapinha
With a degree in International Relations from the Instituto Superior de Ciências Sociais e Políticas (ISCSP-UL), Diogo Carapinha is a Strategic Intelligence and Risk Analysis consultant at VisionWare - Sistemas de Informação, S.A. He is also sub- coordinator of the VisionWare Threat Intelligence Centre, a centre that monitors - in real time - and identifies actors in cyberspace, studying the latest threat phenomena and producing geopolitical and risk reports. Guest lecturer and coordinator of the specialisation courses "Contemporary Transnational Terrorism" and "Geopolitics and Security of the Mediterranean" at the Autonomous University of Lisbon, he writes for El Periódico on issues related to geopolitics and international security. He is frequently invited by the media and is a regular presence at conferences on topics such as Cyber Geopolitics and Cyber Warfare. He also has experience in the field of political consultancy and advisory services.
Este paper analisa o papel do hacktivismo, ciberguerra e ciberespionagem no contexto do conflito entre Israel e Hamas. Examinando ao detalhe os primeiros 20 dias pós-ataque, destaca as atividades e táticas utilizadas por ambos os lados no ciberespaço, bem como os elementos influenciam e são influenciados pelo conflito armado. Com exemplos e situações concretas, propõe estudar as estratégias de ataque e defesa cibernética, motivações por trás das ações digitais e o impacto das operações cibernéticas no desenrolar do conflito. Além disso, este estudo discute implicações éticas, legais e políticas relacionadas com o uso dessas ferramentas no contexto de um conflito militar e as suas consequências para a segurança cibernética global e os direitos humanos.
Gabriela Campos de Sousa
Unindo o "Safety" ao "Open Source Security"
Julio Camargo
Julio Cesar Camargo is a cybersecurity professional with +20 years of experience working with open-source software. He started with Conectiva Linux and later became the official instructor helping dozens of students. As an aviation enthusiast and airplane pilot, he strives to bring all the aviation best practices to his professional routine. Julio started working with OPNsense in 2016, contributing to the project with code, official forum moderation, articles, Udemy course and author of the book OPNsense Beginner to Professional (Packt). He founded Cloudfence in 2018, a cybersecurity startup and a Luso-Brazilian-managed security services firm with an open-source DNA. As its CTO, Julio aims to spread open source security as a service to companies from different parts of the world.
Transitioning from theoretical knowledge to the practical aspect in web security often presents some extra challenges. Real-world scenarios introduce complexities such as bad character filters and Web Application Firewalls (WAFs), demanding the researcher to investigate some way to bypass these restrictions. Here's some of our learnings: 1) Drawing from collaborative efforts and senior industry research becomes pivotal, offering insights that streamline exploits. 2) Embracing failure as a learning experience is fundamental. Despite unsuccessful attempts to escalate Cross-Site Scripting (XSS) vulnerabilities, this still proves useful as it makes you investigate topics you wouldn’t otherwise. Also learn a bit about how ethical security research faces legal hurdles in countries like Portugal, hindering progress and discouraging potential researchers. Navigating this bridge from theory to practice in web security requires both technical prowess and resilience, and I hope to share some of my learnings from this journey with you on this talk.
Raphael Silva
Hi! My name is Raphael Silva a 24yr old AppSec Researcher from Portugal. Having graduated college in 2021 with a degree in Information Systems, I’ve worked as a freelancer web developer for a year before joining my current company, Checkmarx. Since then, apart from my usual work doing research for our SAST engines I've taken part in some public speaking and public-facing activities, the more notable ones being conducting a Code Review workshop at AppSec Village at DEFCON30 and giving talks about AI and AppSec at my former university. I participate and help expand my company's vulnerability research initiatives, having found multiple vulnerabilities in open-source products over the years, such as: Odoo, OSTicket, Jellyfin and UmbracoCMS. I'm always looking for ways to expand my knowledge in the field, be that sharpening my technical skills by reading innovative research, practicing CTFs, engaging in some bug bounty hunting, and taking certifications. I'm eWPTXv2 certified and currently enrolled in OSCP.
A palestra tem como objetivo demonstrar técnicas de Malware Analysis & Reverse Engineer com Cyber paleontology na atribuição de ameaças e análise de operações ofensivas cibernéticas ICS/OT, patrocinado por Estado-nação, grupos de ameaça, mercenários e ciberterroristas contra infraestruturas críticas do setor elétrico e seus respectivos impactos geopolíticos a sociedade civil, defesa nacional e empresas.
Robson Silva
Robson Silva é veterano da Força Aérea Brasileira e do Corpo de Fuzileiros Navais do Brasil. Trabalhou em empresas de consultoria de Threat Intelligence, desenvolveu projetos e pesquisas de ameaças ICS para empresas nacionais e internacionais, trabalhou em empresas do setor de Petróleo, Gás, e Energia Elétrica. Profissional com 15 anos de experiência atuando em Inteligência de Ameaças, pesquisa de operações ofensivas ICS/OT, análise de Ameaças Persistentes Avançadas - APT's ICS/OT, detecção de ciber-espionagem e ransomware em ambientes ICS. Profundas habilidades em Threat Intelligence, Malware analysis, Reverse Engineering e geopolítica de conflitos cibernéticos. • Fundador e CEO da ADINT Cyber Intelligence Institute; • Mestre em Cibersegurança,Ciberterrorismo e Ciberguerra (Università d’ Italia); • Doutorando em Inteligência de Infraestruturas Críticas ICS/OT (King’s College London) • Pós -Graduado em Rel.Internacionais: Geopolítica e Defesa (UFRGS) • Pós-graduação em Cyber Threat Intelligence; • Bacharel em Relações Internacionais • Instrutor EC-Council ICS/SCADA Cybersecurity e CTIA - Certified Threat Intelligence Analyst. • Certificações: CTIA, GCTI, GRID & ICS/SCADA Cybersecurity
Un apagón electromagnético global provocaría un cambio radical en la sociedad, similar a "Demolition Man". La cultura "prepper" se vuelve esencial, con su énfasis en la autosuficiencia y preparación ante desastres. Infraestructuras clave como electricidad, comunicaciones y transporte sufrirían enormemente. La ciberseguridad debe adaptarse a la falta de tecnología digital, y el papel de los hackers se torna ambiguo. Consejos como mantener la calma y preparar kits de emergencia son vitales. Los equipos de seguridad informática enfrentan dilemas éticos, y la dependencia excesiva en tecnologías como la nube y el IoT se cuestiona, impulsando la búsqueda de soluciones más resilientes.
Gabriela García
Gabriela (Gabs) García is a Secure Software Developer, professor, mentor, and instructor in coding and cybersecurity for organizations including LinkedIn, Cyber Hunter Academy, and Kschool. She specializes in teaching software development with a focus on security. Additionally, she is an active participant in hacker communities such as HackMadrid%27 and Hack%27, both in Spain and internationally. Gabriela has also been a speaker at prominent global conferences like DEFCON USA, Codemotion Madrid and RootedCON Valencia & Madrid.
Un apagón electromagnético global provocaría un cambio radical en la sociedad, similar a "Demolition Man". La cultura "prepper" se vuelve esencial, con su énfasis en la autosuficiencia y preparación ante desastres. Infraestructuras clave como electricidad, comunicaciones y transporte sufrirían enormemente. La ciberseguridad debe adaptarse a la falta de tecnología digital, y el papel de los hackers se torna ambiguo. Consejos como mantener la calma y preparar kits de emergencia son vitales. Los equipos de seguridad informática enfrentan dilemas éticos, y la dependencia excesiva en tecnologías como la nube y el IoT se cuestiona, impulsando la búsqueda de soluciones más resilientes.
David Melendez
David Melendez is an R&D Engineer and Red Team member at Innotec Security Part of Accenture, with over twelve years of experience in cybersecurity and hardware hacking. He has a proven track record of presenting his groundbreaking investigations at prestigious conferences around the world, including DEFCON, BLACKHAT, and ROOTEDCON. David is also a drone creator and author of the book "Hacking with Drones," which showcases his innovative use of drones in cybersecurity research. With his passion for pushing the boundaries of technology, David is constantly seeking new ways to improve the security and functionality of embedded systems
Code Injection is one of the most severe security vulnerabilities, as it allows attackers to inject and execute malicious code in the application, completely compromising the system's security. Although there is usually some care taken when implementing features that are prone to this issue, without knowing how an attacker can get around these security mechanisms, it becomes difficult to develop a truly robust defense. In this talk we'll see how an attacker can bypass these defenses, taking the example of CVE-2023-50447, where it was possible to leverage Dunder methods and some creativity to achieve Arbitrary Code Execution in the Pillow library - one of the most widely used Python libraries.
Duarte Manuel Coelho dos Santos
I'm currently an AppSec Analyst at Checkmarx, where I delve into the intricate world of application security. My academic path led me to a Master's degree in Computer Science and Engineering with a focus on Cybersecurity at Instituto Superior Técnico, which culminated in a thesis on the automatic patching of software vulnerabilities. Outside of work, I share some of my insights on my security blog, discussing everything from CVEs I've discovered to broader security topics. I'd love to hear what you think about them! From time to time, I also take part in CTF competitions with team STT. In my spare time, I like to relax with a few bouldering sessions and also to play the drums.
In the age of AI, when choosing a new ride, we could have just asked ChatGPT or Bard for a quick recommendation. But nope, we're not taking the easy route. We put our hacking skills at service to check how seriously car manufacturers take their security game. We're here to spill the tea on some of the security hiccups we've uncovered in the online realms of various car manufacturers. This is a presentation that's as street legal as your grandma's Sunday drive, respecting all those speed limits. We're not just here to bore you with technical jargon; we're here to make you dream of owning a Ferrari, give you a taste of a wild Porsche experience, and spill the beans on how to overtake a Mercedes with the utmost style. And hey, if you're rolling in a different brand, don't worry - we've got your back. So buckle up, folks! This talk is going to be a wild ride, but fear not, a driving license is not required. We promise not to crash your expectations – just the insecure parts of those online car assets. See you at the intersection of laughs and cybersecurity!
Paulo Silva
Paulo is a security practitioner with a solid background in software development, who has spent the last decade focused on identifying critical vulnerabilities and breaking software. He is a long-time OWASP volunteer and co-leader of the OWASP API Security Project, where he advocates for secure API practices and contributes significantly to mitigating security risks in the API landscape.
Open-source intelligence is the process of transforming data, available from publicly sources, into intelligence. Intelligence being value added information that allows increased knowledge, decisions or actions to be taken. The questions to be answered by OSINT are: How to get the right/related data? Internet was created with the purpose of sharing data. Every day the amount of information is growing at an exponential rate. Finding the needle in haystack is quite valuable. How to transform the filtered data into intelligence? We'll be showing how to pivot from one piece of information to another, aggregate the gathered information, improve the filtering, and transform the data. It's ok to have nothing to hide, but is it ok to show everything? Why can this be dangerous?
Pedro Vieira
Pedro Vieira is an experienced security researcher with a wide range of expertise. He is passionate about raising awareness about cybersecurity best practices and empowering individuals and organizations to proactively defend against evolving threats in the digital landscape. In his free time, Pedro enjoys sharing his knowledge and expertise with aspiring cybersecurity professionals through mentoring, coaching, and contributing to online forums and communities. He is committed to making a positive impact on the cybersecurity landscape and ensuring a safer and more secure digital future for all.
Em julho do ano passado, um importante oficial militar russo foi atacado por um drone enquanto ia de bicicleta em sua rotina matinal. Meses antes, um promotor paraguaio foi atacado por jet skis em um resort no Caribe. O próprio Elon Musk implorou a um adolescente que rastreava seu paradeiro a partir de seu jato particular que o deixasse em nome de sua segurança. O que eles têm em comum? Todos eles subestimaram o poder da OSINT para rastrear, localizar geograficamente e encontrar vulnerabilidades em sistemas e pessoas. Esta palestra explicará "Quem" e "Como" a OSINT está sendo usada para atacar usinas, redes ferroviárias, sistemas de alerta de desastres naturais e até prisões espanholas e é claro, as pessoas que as operam... vocês ja sabem, o elo mais fraco da Segurança de Informação.
Jezer Ferreira
Professor oficial de inteligência cibernética e OSINT para polícia de investigação e forense na América Latina, Espanha e nos EUA. Instrutor especialista da INTERPOL no programa FOSI - Fundamentals of Open Source Intelligence. Coordenador de treinamentos de Inteligência Cibernética e OSINT na Cyber Hunter Academy Professor de OSINT e CySA na Universidade de Santiago de Compostela (USC), Espanha. Professor de SOCMINT no Mestrado em Segurança Cibernética do Campus de Segurança Cibernética e da Universidade Católica de Murcia (UCAM), Espanha. Professor da extensão universitária em OSINT e Inteligência Cibernética da RaSeg, México. Diretor do Mestrado em Segurança Cibernética e Hacker Ético na Kschool - Grupo UNIR - Universidade de La Rioja, Espanha. Professor do Mestrado em Inteligência de Ameaças Cibernéticas na Kschool. Professor de OSINT no Mestrado em Segurança Cibernética na Escuela de Organización Industrial (EOI), Espanha. Organización Industrial (EOI), Espanha. Professor de OSINT na Pós Graduação Cyber Threat Intelligence - Pós Graduação Cyber Threat Intelligence - DARYUS, Brasil. Professor da Pós Graduação em Inteligência Cibernética - WB Educação, Brasil. Juiz e membro do comitê global OSINT Search Party CTF (Missing Persons Search Party CTF). Instrutor da IACA - International Association of Crime Analysts com treinamento ao FBI e a Homeland Security. Co-criador do maior evento de OSINT e Engenharia Social da Europa: OSINTOMATICO Conference e da conferência OSINTOMATICOPS dedicada à militares e policiais de todo o mundo. Condecorado em 2022 e 2023 com a medalha: Santos Ángeles Custódios - Amigos da Polícia Nacional: em reconhecimento ao trabalho em colaboração com a FFCCS na busca de pessoas desaparecidas e na luta contra o terrorismo cibernético.
TBD
Roman Ramirez
TBD
In this talk, we will go over the vulnerability and events around the active and ongoing exploitation of KEV vulnerability CVE-2023-29552, a massive denial-of-service amplification attack vector. We will talk about the root cause, how it works and it’s current prevalence and distribution (vendors, sectors and geographies). We will go through the disclosure timeline and our collaboration with DHS/CISA in the process to reach out to vendors and service providers, and how almost by chance we found ourselves in a group to manage the ‘imminent’ crisis, that turned out different than expected... We will explore the timeline around it, why the most recent data leads me to believe there is a botnet behind the recent attacks and what you can do to help.
Pedro Umbelino
Pedro is a security researcher by day and Hackaday contributor by night. He started messing around with computers on a Spectrum, watched the bulletin board systems being dropped for the Internet, but still roams around in IRC. Known by the handle [kripthor], he likes all kind of hacks, hardware and software. If it’s security related even better. Pedro currently works at Bitsight as a Principal Security Researcher.
XZ Utils is a widely utilized open source suite of command-line tools for lossless data compression on virtually all Unix-like operating systems, including Linux. The vulnerability originated from a carefully orchestrated supply chain attack, where an adversary compromised the upstream source code repository of the XZ project, discreetly implanting the backdoor into the source code tarball releases. In this talk we'll explore what we know about the backdoor and how to detect it with Wazuh, the open source security platform.
Miguel Casares
Miguel Casares is a security engineer and Director of Operations at Wazuh, Inc., with over 6 years of experience in cybersecurity and system administration. He specializes in leveraging open source tools and methodologies to fortify environments against evolving cyber threats. He aims to continue helping build free, open source cybersecurity for everyone while developing his cybersecurity knowledge.
XZ Utils is a widely utilized open source suite of command-line tools for lossless data compression on virtually all Unix-like operating systems, including Linux. The vulnerability originated from a carefully orchestrated supply chain attack, where an adversary compromised the upstream source code repository of the XZ project, discreetly implanting the backdoor into the source code tarball releases. In this talk we'll explore what we know about the backdoor and how to detect it with Wazuh, the open source security platform.
El Wali Karboub
With over five years of experience in cybersecurity, Elwali Karkoub works as a solution architect at Wazuh, Inc. His main focus is on assisting in efficiently utilizing open-source technologies to identify cyber risks and improve the security of environments. He enjoys web penetration and sharing knowledge on blogs and videos.