SlideShare a Scribd company logo
1 of 37
Download to read offline
SESSION	ID:SESSION	ID:
#RSAC
Konstantinos	Karagiannis
Hacking	Blockchain
PDAC-T10F
Chief	Technology	Officer,	Security	Consulting
BT	Americas
@konstanthacker
#RSAC
Another	sea	change	upon	us
#RSAC
It	all	started	Halloween	2008…
3
#RSAC
Bitcoin
4
Satoshi’s	altruistic	goals	
met
Strong	investment—5	
million	dollar	pizza
Widespread	“positioning”	
of	cryptocurrency
Literally	and	figuratively	
created	the	blockchain
movement
#RSAC
Blockchain transaction	and	verification
5
Parties	exchange	data
Transaction	verified	or	queued
#RSAC
Blockchain structure	and	validation
6
Each	block	identified	by	hash
Blocks	must	be	validated	to	be	added	to	chain
#RSAC
Blockchain mining and	chain
7
Miners	“solve	puzzle”	(proof	of	work)
Miners	rewarded,	block	added	to	majority	chain
#RSAC
Blockchain defense
8
Trying	to	submit	an	altered	block	would	change	hash	
function	of	that	block	and	all	following	blocks—nodes	
would	detect	and	reject	block.
#RSAC
Some	proposed	blockchain applications
9
Digital	assets
Identity	(black	box)
Verifiable	data
Smart	contracts
#RSAC
Attacks	past	and	present
#RSAC
Quick	caveat
11
Not	allowed	to	discuss	
vulnerabilities	found	during	ethical	
hacks	of	BT-client	financial	
applications	
Publicized	examples	follow	to	
highlight	types	of	attacks	possible
May	use	occasional	“guesses”	to	fill	
in	blanks	based	on	experience
If	I’m	wrong,	I	know	the	attacks	still	
work!
#RSAC
1	RETURN	– responsible	disclosure
12
First	security	vuln identified	July,	2010	
by	ArtForz
Allows	spending	of	other	user’s	bitcoins	
via		Sig OP_1 OP_RETURN
Satoshi	kept	1	RETURN	quiet	as	he	
rolled	out	a	patch
ArtForz proved	Satoshi’s	belief	early	
users	would	want	to	maintain	value	in	
Bitcoin
#RSAC
Attacks	against	blockchain infrastructure
13
Mt.	Gox first	major	bitcoin	disaster
June	2011:	$8	million	stolen	(admin	pw)
Feb	2014:	$460	million	stolen	(transaction	
malleability)
No	version	control	software	in	Mt.	
Gox—bug	fixes	often	delayed,	untested	
code	pushed	straight	to	production
Gatecoin hacked	May	2016	via	a	server	
disruption	and	reboot	(bypassing	
multisig cold	wallets)—more	modest	
250	BTC	and	185,000	ETH.
#RSAC
Attacks	against	code
14
DAO	smart	contract	flaw	
known	of	since	May	2016
June	17,	hacker	used	
recursive	flaw	to	make	
splits	inside	splits,	moving	
Ether	repeatedly	without	
checking	“balance”
Hard	fork	resulted
#RSAC
Attacks	against	blockchain sites
15
2013,	payments	processor	Inputs.io	site	
compromised—for	$1	million	(social	
engineering)
Steemit blockchain-based	blogging	
platform	web	site	authentication	
targeted	July	(no	2FA)—$85,000	funds	
stolen	by	transactions	(hard	fork	after)
Reports	of	Coinbase hacking	incidents	
appear	on	the	net	regularly.	Insured	
against	mass	breach,	not	individual	
credential	attacks
#RSAC
Attacks	against	hot	wallets
16
Dec	7,	hacker	compromises	VC	Bo	
Shen’s	phone,	gaining	access	to	
$300,000	in	Augur	and	Ether	from	
wallet
Ransomware	obvious	issue,	but	
malware	that	steals	credentials	like	
Mokes.A can	lead	to	transactions
Android	phones	more	susceptible	
than	ever	due	to	poor	updating	in	all	
but	newest	devices
#RSAC
Attacks	against	cold	wallets
17
Bitfinex tried	to	remove	risk	
of	“security	exposures”	by	
adding	an	extra	layer	via	
BitGo
BitGo as	part	of	multisig it	
seems	could	do	whatever	it	
wished
Cold	wallets	turned	hot	Aug	
2016
Over	$70	million	swiped
Losses	of	36%	across	all	users	
unlike	FDIC
#RSAC
Attacks	against	nodes
18
Major	node	attack	thwarted	Aug	
2010—Bitcoin	block	74638	flaw	could	
generate	184	Billion	transactions!
Sept	18,	Geth nodes	(Ethereum)	ran	
out	of	memory	and	crashed	on		block	
2283416	(Ethereum classic	
sabotage?)
Aug,	Krypton	and	Shift	hit	by	proof	of	
concept	51%	attack—overpowered	
by	rented	NiceHash hashpower
Scanning	for	nodes	to	target	(e.g.	TCP	
port	8333)	possible
#RSAC
Traditional	risks	to	new	applications
19
Digital	assets
Ownership
Identity
Black	box	interactions	at	risk
Verifiable	data
Malicious	transactions
Smart	contracts
Code	flaws,	repudiation
#RSAC
Coming	attacks	against	
blockchain’s biggest	flaw
#RSAC
Remember	Satoshi’s	words?
21
August	2015:	NSA	publicly	warned	against	using	ECC,	the	type	
of	encryption	in	blockchain
#RSAC
Elliptic	curve	cryptography
22
Public	key	system,	like	RSA,	El	Gamal,	
Rabin
Based	on	algebraic	structure	of	elliptic	
curves	over	finite	fields
Public	key	for	encryption	or	sig	validation
Private	key	for	decryption	or	sig	
generation
#RSAC
ECC	Bitcoin	example
23
Bitcoin	wallet	addresses	made	of:	Public	key,	
private	key,	and	address
Public	key	derived	from	private	key	by	elliptic	
curve	multiplication
Address	derived	by:
applying	SHA256	hash	function	to	public	key
applying	RIPEMD-160	hash	function
adding	checksum	for	error	correction
“Used”	bitcoin	or	other	entities	have	public	
keys	exposed	on	blockchain
#RSAC
Quantum	threat	looming
24
Quantum	computers	can	crack	ECC
Machines	exploit	quantum	
“weirdness”	of	superposition	to	
allow	existence	of	qubits
Qubits	can	be	a	percentage	of	both	
zero	and	one	at	the	same	time
Qubits	and	special	algorithms	allow	
quantum	computers	to	do	things	
classical	computers	can’t	do	in	
thousands	of	years
#RSAC
World’s	easiest	explanation	of	superposition
25
Expected	particle	behavior	or	“pooling”
#RSAC
World’s	easiest	explanation	of	superposition
26
Wave	pattern	without	observation	of	which	
slit	a	particle	goes	through
#RSAC
World’s	easiest	explanation	of	superposition
27
Even	one	particle	going	through	at	a	time	
creates	wave	pattern
#RSAC
World’s	easiest	explanation	of	superposition
28
Use	a	detector	on	either	slit,	and	pooling	
appears:	particle-wave	duality
#RSAC
Maintaining	superposition
29
Observing	either	slit	destroyed	the	
superposition
Quantum	computers	need	to	maintain	
superposition	among	many	qubits	to	
perform	calculations
University	of	Maryland	and	others	have	
found	new	ways	to	chain	together	qubits
#RSAC
With	enough	stable	qubits…
30
A	quantum	computer	can	run	Shor’s	
algorithm	(1994)	and	quickly	crack	any	
public	key	encryption	by	finding	
factors	of	large	numbers
Likely	answers	interfere	constructively,	
unlikely	ones	destructively
Simple	quantum	computers	run	it	with	
two	photonic	qubits,	showing	21=3*7
Within	3	years	QCs	may	have	
hundreds	of	qubits
#RSAC
Bitcoin	example	within	3	years
31
Bitcoin	transaction	includes	a	signature	
and	a	public	key	to	verify	owner
That	publicly	available	information	is	all	a	
quantum	computer	needs	to	get	private	
key	and	“become”	another	user
This	type	of	attack	can	be	done	passively	
(offline)	by	downloading	any	type	of	
blockchain
No	reuse?
#RSAC
Lamport signatures—a	stopgap?
32
Public	key	consists	of	320	hashes	rather	than	an	
elliptic	curve	point
Address	is	SHA256+RIPEMD-160	hash	of	public	key
Transaction	includes	public	key	and	signature—
verifiers	check	if:
public	key	matches	address
signature	matches	message	and	public	key
Even	with	Grover’s	algorithm,	it	takes	2^80	steps	to	
construct	a	fraudulent	transaction	or	2^80	*	80	
steps	to	crack	all	hashes	(trillions	of	trillions)
#RSAC
Post-quantum	crypto
33
Code	based
Hash	based
Lattice	based
Multivariate	quadratic	equations
One	time	pad
liboqs,	open	source	C	library	
(https://openquantumsafe.org/
have	fork	for	SSL	as	well)
#RSAC
Apply	these	warnings!
34
As	soon	as	possible,	take	a	new	look	at	any	blockchain applications	
you’re	developing	or	using	in	your	company
Be	sure	any	of	these	applications	actually	need	to	be	blockchain
based,	considering:
security
permanence	of	data	(being	able	to	make	changes	can	be	a	good	thing)
whether	current	technology	may	be	superior	(not	everything	should	be	bc)
Is	your	blockchain app	an	overlay	to	a	proven	blockchain and	protocol,	
or	is	it	potentially	too	untested	for	critical	applications?
#RSAC
Apply	these	warnings!
35
Within	the	next	three	months	prioritize	testing	the	security	of	
blockchain applications	by	their	criticality	to	your	business
Perform	ethical	hacking	engagements	against	the	implementation of	
your	platform—remember	all	the	basic	flaws	that	undo	even	sound	
crypto
Make	sure	your	ethical	hackers	have	actually	worked	with	blockchain
protocols	before—this	isn’t	the	time	for	a	vendor	to	learn	on	your	
dime
#RSAC
Apply	these	warnings!
36
Looking	ahead,	six	months	and	on,	what	
can	you	do	to	ensure	the	future	of	
blockchain security
It’s	too	late	to	develop	applications	that	
are	not	post-quantum	safe
Consider	investing	your	dev	resources	to	
give	something	back	to	blockchain
NIST	has	made	call	to	arms	to	develop	
post	quantum	crypto	solutions	for	PK—
working	on	this	could	improve	bc going	
forward (http://www.nist.gov/​pqcrypto)
#RSAC
Questions?	Please	join	me	for	a	“focus	
on”	session	(FON4-T11)	today	in	
Moscone West	2024	from	3:45	to	4:15
@konstanthacker

More Related Content

What's hot

Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...Melanie Swan
 
What is Decentralized Autonomous Organization (DAO) & How DAO works?
What is Decentralized Autonomous Organization (DAO) & How DAO works?What is Decentralized Autonomous Organization (DAO) & How DAO works?
What is Decentralized Autonomous Organization (DAO) & How DAO works?Blockchain Council
 
Blockchain 51% attack
Blockchain  51% attackBlockchain  51% attack
Blockchain 51% attackTom Yang
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain PresentationZied GUESMI
 
Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchainBellaj Badr
 
Basic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersBasic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersKoen Vingerhoets
 
Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Qais Ammari
 
what is bitcoin, its history and detail
what is bitcoin, its history and detailwhat is bitcoin, its history and detail
what is bitcoin, its history and detailSelf-employed
 
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Simplilearn
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architectureEY
 
Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Tsasaa Tsas
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithmsAnurag Dashputre
 
Blockchain Technology Explained | Blockchain Technology Tutorial | Blockchain...
Blockchain Technology Explained | Blockchain Technology Tutorial | Blockchain...Blockchain Technology Explained | Blockchain Technology Tutorial | Blockchain...
Blockchain Technology Explained | Blockchain Technology Tutorial | Blockchain...Simplilearn
 

What's hot (20)

Introduction to Blockchain
Introduction to Blockchain Introduction to Blockchain
Introduction to Blockchain
 
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
Bitcoin Protocols 1.0 and 2.0 Explained in the Series: Blockchain: The Inform...
 
What is Decentralized Autonomous Organization (DAO) & How DAO works?
What is Decentralized Autonomous Organization (DAO) & How DAO works?What is Decentralized Autonomous Organization (DAO) & How DAO works?
What is Decentralized Autonomous Organization (DAO) & How DAO works?
 
Ethereum 2.0
Ethereum 2.0Ethereum 2.0
Ethereum 2.0
 
Blockchain 51% attack
Blockchain  51% attackBlockchain  51% attack
Blockchain 51% attack
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchain
 
Basic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersBasic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgers
 
Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Ethereum (Blockchain Network)
Ethereum (Blockchain Network)
 
Bitcoin & Bitcoin Mining
Bitcoin & Bitcoin MiningBitcoin & Bitcoin Mining
Bitcoin & Bitcoin Mining
 
what is bitcoin, its history and detail
what is bitcoin, its history and detailwhat is bitcoin, its history and detail
what is bitcoin, its history and detail
 
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
 
Bitcoin history
Bitcoin historyBitcoin history
Bitcoin history
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architecture
 
Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
Ethereum
EthereumEthereum
Ethereum
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Technology Explained | Blockchain Technology Tutorial | Blockchain...
Blockchain Technology Explained | Blockchain Technology Tutorial | Blockchain...Blockchain Technology Explained | Blockchain Technology Tutorial | Blockchain...
Blockchain Technology Explained | Blockchain Technology Tutorial | Blockchain...
 

Similar to Hacking Blockchain

2018 SAI workshop blockchain Kristof Verslype
2018 SAI  workshop blockchain Kristof Verslype2018 SAI  workshop blockchain Kristof Verslype
2018 SAI workshop blockchain Kristof VerslypeSmals
 
Blockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchainsBlockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchainsBrett Colbert
 
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain FutureLost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain FuturePriyanka Aash
 
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case StudiesRSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case StudiesWayne Huang
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyNavin Kumar
 
Lapine blockchain introduction 10/04/2018
Lapine blockchain introduction 10/04/2018Lapine blockchain introduction 10/04/2018
Lapine blockchain introduction 10/04/2018Chuck Bair
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain DemystifiedMahesh M Reddy
 
Tutorial blockchain technical overview-ss
Tutorial blockchain technical overview-ssTutorial blockchain technical overview-ss
Tutorial blockchain technical overview-ssHoward Anglin
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat ModelPeteLind
 
Bruno Lowagie (iText) #cfoconferenz
Bruno Lowagie (iText) #cfoconferenzBruno Lowagie (iText) #cfoconferenz
Bruno Lowagie (iText) #cfoconferenzFDMagazine
 
Public blockchains and municipalities en v1.0_hc
Public blockchains and municipalities en v1.0_hcPublic blockchains and municipalities en v1.0_hc
Public blockchains and municipalities en v1.0_hcHenk van Cann
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesSébastien Tandel
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchainseancarmody
 
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdfLilminow
 
Unchain Blockchain by Eva Rez
Unchain Blockchain by Eva RezUnchain Blockchain by Eva Rez
Unchain Blockchain by Eva Rezrezeva
 
Unchain Blockchain by Eva Rez
Unchain Blockchain by Eva RezUnchain Blockchain by Eva Rez
Unchain Blockchain by Eva Rezrezeva
 

Similar to Hacking Blockchain (20)

2018 SAI workshop blockchain Kristof Verslype
2018 SAI  workshop blockchain Kristof Verslype2018 SAI  workshop blockchain Kristof Verslype
2018 SAI workshop blockchain Kristof Verslype
 
Blockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchainsBlockchain 101 - public, tokenized blockchains
Blockchain 101 - public, tokenized blockchains
 
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain FutureLost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
 
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case StudiesRSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
State of Crypto in 2019
State of Crypto in 2019State of Crypto in 2019
State of Crypto in 2019
 
State of Crypto in 2019
State of Crypto in 2019State of Crypto in 2019
State of Crypto in 2019
 
Lapine blockchain introduction 10/04/2018
Lapine blockchain introduction 10/04/2018Lapine blockchain introduction 10/04/2018
Lapine blockchain introduction 10/04/2018
 
Blockchain Demystified
Blockchain DemystifiedBlockchain Demystified
Blockchain Demystified
 
Tutorial blockchain technical overview-ss
Tutorial blockchain technical overview-ssTutorial blockchain technical overview-ss
Tutorial blockchain technical overview-ss
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat Model
 
blockchain.pptx
blockchain.pptxblockchain.pptx
blockchain.pptx
 
Bruno Lowagie (iText) #cfoconferenz
Bruno Lowagie (iText) #cfoconferenzBruno Lowagie (iText) #cfoconferenz
Bruno Lowagie (iText) #cfoconferenz
 
Public blockchains and municipalities en v1.0_hc
Public blockchains and municipalities en v1.0_hcPublic blockchains and municipalities en v1.0_hc
Public blockchains and municipalities en v1.0_hc
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
 
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
 
Unchain Blockchain by Eva Rez
Unchain Blockchain by Eva RezUnchain Blockchain by Eva Rez
Unchain Blockchain by Eva Rez
 
Unchain Blockchain by Eva Rez
Unchain Blockchain by Eva RezUnchain Blockchain by Eva Rez
Unchain Blockchain by Eva Rez
 
Rafael Oliveira | All About Blockchain
Rafael Oliveira | All About BlockchainRafael Oliveira | All About Blockchain
Rafael Oliveira | All About Blockchain
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Hacking Blockchain