SlideShare a Scribd company logo
1 of 79
Download to read offline
I’VE BEEN HACKED!
SO, NOW WHAT!!
By Néstor Angulo de Ugarte
WordCamp Tokyo 2019 #WCTOKYO
2
こんにちわ!
WHO I AM
• Computer Science Engineer &
Technology consultant
• Photographer & Early
Adopter
• Truly curious guy
• 2015: SUCURI
Incident Response & Easy SSL
• 2019: GoDaddy Spain
Head of IT @ GoDaddy Spain
#WCTokyo 19 Néstor Angulo (@pharar) 3
ABOUT
• Sucuri: Anaconda
(No Securi / Security)
• Website security
• Fully remote (people from > 25 countries
around the world)
• 2008: Foundation
• 2017: Got part of the
GoDaddy family
• Free interesting scanners:
• Sitecheck (sitecheck.sucuri.net)
• Performance (performance.sucuri.net)
4
5
LET’S CONNECT THE DOTS
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA Horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
6
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA Horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
7
CONCEPTS & DISCLAIMER
Some things to be aware first
DISCLAIMER
9
Any sensitive information has been protected/encrypted to preserve privacy.
Any similiarity with real persons or real situations is a coincidence.
I’m responsible of what I say, not what you interpret.
Always ask to an expert.
#WCTokyo 19 Néstor Angulo (@pharar) 10
#WCTokyo 19 Néstor Angulo (@pharar) 11
ハッキングされた企業と、
ハッキングされたことをま
だ知らない企業の2種類があ
ります。
HACKER VS CYBERTERRORIST
12
Hacker:
• Curious person who loves to go
beyond limits or convetionalisms.
Cyberterrorist / Cracker:
• Computer Hacker, whom
intentions are always aligned to enrich
himself in a zero-sum game situation.
• The bad guy / the bad hacker
BAD HACKER VS SECURITY ANALYST
13
THE BAD HACKER:
CYBERCRIMINAL
THE GOOD HACKER:
CRIME SCENE INVESTIGATOR
(CSI) / POLICE
WEB SECURITY
• Cybersecurity:
Security in the digital world
• Web Security:
Field of Cybersecurity
• Covers what happens through
port 80 / 443
14
FACTS
15
Site hacking
almost never
is client-oriented
(98% of cases)
Almost always
happens due to a
deficient monitoring
/ maintenance
Security never is
(nor will be)
100% effective
A SSL certificate
is not
an antihacking shield
Patches & security
updates
appear almost always
after hacking exploits
Errare Humanum
Est
(Human being fails)
WORDPRESS TYPICAL OBJECTIVES
16
USERS INFO DATABASE WEBSITE CONTENT INFRAESTRUCTURE BOT NET REPUTATION
HOW TO HACK A WORDPRESS
Exploit /
vulnerability
Injection
Final code Backdoor
Spam /
defacement
BotNode Final code
17
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
18
AAAARGH!!
NOOOOO!
A.K.A.
The Horror Gallery
DEFACEMENTS
20
DEFACEMENTS
21
22
23
24
25
26
DEFACEMENTS
27
Partial / full replacement of website
frontend.
Very obvious
Easy detection:
Users (hear them!)
Scanners
Objective:
Awareness / social or political revindication
PHISHING
28
PHISHING
29
Login / checkout environment imitation
Sutile
Detection:
Scanners
Blacklists
Objective:
Steal credentials / sensitive information
30
31
32
33
34
BLACK SEO / SPAM
35
36
37
38
39
BLACK HAT SEO
/ SPAM
40
Spam/unwanted content in
your site
Detection:
Scanners (Easy)
Users (hear them!)
Search Engine warnings
Objective:
Affect your SEO
REDIRECTIONS
41
REDIRECTIONS
42
Open unwanted affiliate links to
suspicious websites
Detection:
Scanners (NOT Easy)
Users (hear them!)
Search Engine warnings
Objective:
Affect your SEO or the affiliate
ones
43
44
45
46
CC / LOGIN STEALERS
47
48
CC/LOGIN
STEALER
49
Sensitive information leak
Detection: File integrity
scanner
In EUROPE:
Must report to
Police
GDPR Compliance
DDOS ATTACKS / BOT NETS
50
Situación normal
51
52
53
BOTNETS,
CRYPTOMINERS,
DDOS
54
Affecting to your infraestructure
Detection:
Usually difficult
Strange use of resources
File Integrity Scanner
WAF recommended
Objective:
Your server’s resources or user’s
ones.
To make your site a zombie node
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
55
SO, NOW
WHAT!??
A.K.A.
reactive measures
HIERARCHY AND AGENTS
You
• Owner / Admins
• Developer &
Designer
• Users/clients
Hosting
Provider
• Agent / C3
• Support &
Backups
Security
Expert
• Security
department
• External
services
57
ACTIONS YOU CAN DO
YOURSELVES
58
SCAN
YOUR SITE
• Let’s try to figure out what
happened
• Free scanners:
• sitecheck.sucuri.net
• Blacklisting
• virustotal.com (blacklist)
59
60
CRC: CHECK, REMOVE AND CHANGE
61
Check and Remove
• Unneeded admin users
• Plugins and themes which are
strictly not in use
• Outdated backups
• DEV/TEST sites in your production
server
Change Passwords
• Connections (cPanel, FTP, SSH, …)
• Database (remember to update
your wp-config.php)
• Dashboard (wp-admin)
• Hosting provider
62
RESTORE A BACKUP
• Last option
• You can loose
information
• We not always know
when the infection
begun
63
RESTORE A BACKUP
Do you THINK you
have backups?
64
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
65
NEVER
EVER
AGAIN!!
A.K.A.
proactive measures
SECURITY IN LAYERS
You ( the weakest layer )
Your device ( Antivirus )
Your connection ( SSL )
Your website ( WAF )
Your credentials ( Strong Passwords / 2FA )
Your site security ( monitor / updates )
Your server security ( monitor / updates )
Your database ( monitor )
Maintenance tasks
67
MINIMUM
PRIVILEGE
PRINCIPLE
68
“To Caesar, what is
Caesar’s”.
Admin stuff with
admin account.The
rest, with a limited
account
The more
admins,
the more
risk
All user’s
passwords
MUST be
unique and
strong
(better with 2FA
when possible)
Applied to all
layers
(wp-admin, [S]FTP,
cPanel, dashboard,
db, …)
BACKUPS
• Have a backups strategy
• NEVER store the backups in your
production server
• A clean and FUNCTIONAL
backup will be your best friend a
bad day
69
BACKUPS
• Have a backups strategy
• NEVER store the backups in your
production server
• A clean and
backup will be your best friend a
bad day
70
UPDATES
• PLUGINS
• THEMES
• CORE
• PHP
• APACHE / NGINX
• SERVER
• CPANEL / PLESK
• …
71
UPDATE
...
ALWAYS!
REMEMBER TO INVEST IN
72
HOSTING SECURITY
HOSTING
FIRST LAYER OF
YOUR SITE’S DEFENSE
BALANCE BETWEEN
PRICE AND FEATURES
THEY ARE IN CHARGE OF THE
SERVER’S SERVICES, DATABASE
AND MAINTENANCE
73
SHARED HOSTING VS DEDICATED
#WCTokyo 19 Néstor Angulo (@pharar) 74
WAF
YOUR GUARD
DOG
75
Filters all your web traffic
Protects against XSS, DDoS, …
Patchs virtually well known software vulnerabilities
If it includes CDN, your site will improve its speed and
performance
Forensic analisys tool
Allows manual blocking
WAF
YOUR GUARD
DOG
76
Filters all your web traffic
Protects against XSS, DDoS, …
Patchs virtually well known software vulnerabilities
If it includes CDN, your site will improve its speed and
performance
Forensic analisys tool
Allows manual blocking
77
#WCTokyo 19 Néstor Angulo (@pharar) 78
ご質問は?
ありがとうございました!
@pharar #WCTOKYO

More Related Content

Similar to I've been hacked! So, now, what!?

Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.Nestor Angulo de Ugarte
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest Haydn Johnson
 
Software Security : From school to reality and back!
Software Security : From school to reality and back!Software Security : From school to reality and back!
Software Security : From school to reality and back!Peter Hlavaty
 
Building a Modern Security Engineering Organization. Zane Lackey
 Building a Modern Security Engineering Organization. Zane Lackey Building a Modern Security Engineering Organization. Zane Lackey
Building a Modern Security Engineering Organization. Zane LackeyYandex
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Nick Galbreath
 
Hacking - high school intro
Hacking - high school introHacking - high school intro
Hacking - high school introPeter Hlavaty
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoTouhami Kasbaoui
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...AgileNetwork
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Jim Manico
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Adrian Sanabria
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptricagip499
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdfCyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdfRoger Qiu
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Adrian Sanabria
 

Similar to I've been hacked! So, now, what!? (20)

Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
Super1
Super1Super1
Super1
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 
Software Security : From school to reality and back!
Software Security : From school to reality and back!Software Security : From school to reality and back!
Software Security : From school to reality and back!
 
Building a Modern Security Engineering Organization. Zane Lackey
 Building a Modern Security Engineering Organization. Zane Lackey Building a Modern Security Engineering Organization. Zane Lackey
Building a Modern Security Engineering Organization. Zane Lackey
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013
 
Hacking - high school intro
Hacking - high school introHacking - high school intro
Hacking - high school intro
 
So You Want to be a Hacker?
So You Want to be a Hacker?So You Want to be a Hacker?
So You Want to be a Hacker?
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Blockaudit Presentation
Blockaudit PresentationBlockaudit Presentation
Blockaudit Presentation
 
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdfCyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
 
Hacking101 delhi 2013
Hacking101 delhi 2013Hacking101 delhi 2013
Hacking101 delhi 2013
 

More from Nestor Angulo de Ugarte

More from Nestor Angulo de Ugarte (7)

¿Cuál es el coste real de un hackeo en web?
¿Cuál es el coste real de un hackeo en web?¿Cuál es el coste real de un hackeo en web?
¿Cuál es el coste real de un hackeo en web?
 
Limpiar Sitios Hackeados
Limpiar Sitios HackeadosLimpiar Sitios Hackeados
Limpiar Sitios Hackeados
 
Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.
 
Hacking WordPress. El Arte de La Guerra.
Hacking WordPress. El Arte de La Guerra.Hacking WordPress. El Arte de La Guerra.
Hacking WordPress. El Arte de La Guerra.
 
Me han Hackeado... ¿Y ahora qué?
Me han Hackeado... ¿Y ahora qué?Me han Hackeado... ¿Y ahora qué?
Me han Hackeado... ¿Y ahora qué?
 
WordCamp Madrid CSI: El caso de las Backdoors
WordCamp Madrid CSI: El caso de las BackdoorsWordCamp Madrid CSI: El caso de las Backdoors
WordCamp Madrid CSI: El caso de las Backdoors
 
Backdoor: El Bueno, El Feo y el Malo
Backdoor: El Bueno, El Feo y el MaloBackdoor: El Bueno, El Feo y el Malo
Backdoor: El Bueno, El Feo y el Malo
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

I've been hacked! So, now, what!?