SlideShare a Scribd company logo
I’VE BEEN HACKED!
SO, NOW WHAT!!
By Néstor Angulo de Ugarte
WordCamp Tokyo 2019 #WCTOKYO
2
こんにちわ!
WHO I AM
• Computer Science Engineer &
Technology consultant
• Photographer & Early
Adopter
• Truly curious guy
• 2015: SUCURI
Incident Response & Easy SSL
• 2019: GoDaddy Spain
Head of IT @ GoDaddy Spain
#WCTokyo 19 Néstor Angulo (@pharar) 3
ABOUT
• Sucuri: Anaconda
(No Securi / Security)
• Website security
• Fully remote (people from > 25 countries
around the world)
• 2008: Foundation
• 2017: Got part of the
GoDaddy family
• Free interesting scanners:
• Sitecheck (sitecheck.sucuri.net)
• Performance (performance.sucuri.net)
4
5
LET’S CONNECT THE DOTS
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA Horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
6
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA Horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
7
CONCEPTS & DISCLAIMER
Some things to be aware first
DISCLAIMER
9
Any sensitive information has been protected/encrypted to preserve privacy.
Any similiarity with real persons or real situations is a coincidence.
I’m responsible of what I say, not what you interpret.
Always ask to an expert.
#WCTokyo 19 Néstor Angulo (@pharar) 10
#WCTokyo 19 Néstor Angulo (@pharar) 11
ハッキングされた企業と、
ハッキングされたことをま
だ知らない企業の2種類があ
ります。
HACKER VS CYBERTERRORIST
12
Hacker:
• Curious person who loves to go
beyond limits or convetionalisms.
Cyberterrorist / Cracker:
• Computer Hacker, whom
intentions are always aligned to enrich
himself in a zero-sum game situation.
• The bad guy / the bad hacker
BAD HACKER VS SECURITY ANALYST
13
THE BAD HACKER:
CYBERCRIMINAL
THE GOOD HACKER:
CRIME SCENE INVESTIGATOR
(CSI) / POLICE
WEB SECURITY
• Cybersecurity:
Security in the digital world
• Web Security:
Field of Cybersecurity
• Covers what happens through
port 80 / 443
14
FACTS
15
Site hacking
almost never
is client-oriented
(98% of cases)
Almost always
happens due to a
deficient monitoring
/ maintenance
Security never is
(nor will be)
100% effective
A SSL certificate
is not
an antihacking shield
Patches & security
updates
appear almost always
after hacking exploits
Errare Humanum
Est
(Human being fails)
WORDPRESS TYPICAL OBJECTIVES
16
USERS INFO DATABASE WEBSITE CONTENT INFRAESTRUCTURE BOT NET REPUTATION
HOW TO HACK A WORDPRESS
Exploit /
vulnerability
Injection
Final code Backdoor
Spam /
defacement
BotNode Final code
17
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
18
AAAARGH!!
NOOOOO!
A.K.A.
The Horror Gallery
DEFACEMENTS
20
DEFACEMENTS
21
22
23
24
25
26
DEFACEMENTS
27
Partial / full replacement of website
frontend.
Very obvious
Easy detection:
Users (hear them!)
Scanners
Objective:
Awareness / social or political revindication
PHISHING
28
PHISHING
29
Login / checkout environment imitation
Sutile
Detection:
Scanners
Blacklists
Objective:
Steal credentials / sensitive information
30
31
32
33
34
BLACK SEO / SPAM
35
36
37
38
39
BLACK HAT SEO
/ SPAM
40
Spam/unwanted content in
your site
Detection:
Scanners (Easy)
Users (hear them!)
Search Engine warnings
Objective:
Affect your SEO
REDIRECTIONS
41
REDIRECTIONS
42
Open unwanted affiliate links to
suspicious websites
Detection:
Scanners (NOT Easy)
Users (hear them!)
Search Engine warnings
Objective:
Affect your SEO or the affiliate
ones
43
44
45
46
CC / LOGIN STEALERS
47
48
CC/LOGIN
STEALER
49
Sensitive information leak
Detection: File integrity
scanner
In EUROPE:
Must report to
Police
GDPR Compliance
DDOS ATTACKS / BOT NETS
50
Situación normal
51
52
53
BOTNETS,
CRYPTOMINERS,
DDOS
54
Affecting to your infraestructure
Detection:
Usually difficult
Strange use of resources
File Integrity Scanner
WAF recommended
Objective:
Your server’s resources or user’s
ones.
To make your site a zombie node
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
55
SO, NOW
WHAT!??
A.K.A.
reactive measures
HIERARCHY AND AGENTS
You
• Owner / Admins
• Developer &
Designer
• Users/clients
Hosting
Provider
• Agent / C3
• Support &
Backups
Security
Expert
• Security
department
• External
services
57
ACTIONS YOU CAN DO
YOURSELVES
58
SCAN
YOUR SITE
• Let’s try to figure out what
happened
• Free scanners:
• sitecheck.sucuri.net
• Blacklisting
• virustotal.com (blacklist)
59
60
CRC: CHECK, REMOVE AND CHANGE
61
Check and Remove
• Unneeded admin users
• Plugins and themes which are
strictly not in use
• Outdated backups
• DEV/TEST sites in your production
server
Change Passwords
• Connections (cPanel, FTP, SSH, …)
• Database (remember to update
your wp-config.php)
• Dashboard (wp-admin)
• Hosting provider
62
RESTORE A BACKUP
• Last option
• You can loose
information
• We not always know
when the infection
begun
63
RESTORE A BACKUP
Do you THINK you
have backups?
64
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
65
NEVER
EVER
AGAIN!!
A.K.A.
proactive measures
SECURITY IN LAYERS
You ( the weakest layer )
Your device ( Antivirus )
Your connection ( SSL )
Your website ( WAF )
Your credentials ( Strong Passwords / 2FA )
Your site security ( monitor / updates )
Your server security ( monitor / updates )
Your database ( monitor )
Maintenance tasks
67
MINIMUM
PRIVILEGE
PRINCIPLE
68
“To Caesar, what is
Caesar’s”.
Admin stuff with
admin account.The
rest, with a limited
account
The more
admins,
the more
risk
All user’s
passwords
MUST be
unique and
strong
(better with 2FA
when possible)
Applied to all
layers
(wp-admin, [S]FTP,
cPanel, dashboard,
db, …)
BACKUPS
• Have a backups strategy
• NEVER store the backups in your
production server
• A clean and FUNCTIONAL
backup will be your best friend a
bad day
69
BACKUPS
• Have a backups strategy
• NEVER store the backups in your
production server
• A clean and
backup will be your best friend a
bad day
70
UPDATES
• PLUGINS
• THEMES
• CORE
• PHP
• APACHE / NGINX
• SERVER
• CPANEL / PLESK
• …
71
UPDATE
...
ALWAYS!
REMEMBER TO INVEST IN
72
HOSTING SECURITY
HOSTING
FIRST LAYER OF
YOUR SITE’S DEFENSE
BALANCE BETWEEN
PRICE AND FEATURES
THEY ARE IN CHARGE OF THE
SERVER’S SERVICES, DATABASE
AND MAINTENANCE
73
SHARED HOSTING VS DEDICATED
#WCTokyo 19 Néstor Angulo (@pharar) 74
WAF
YOUR GUARD
DOG
75
Filters all your web traffic
Protects against XSS, DDoS, …
Patchs virtually well known software vulnerabilities
If it includes CDN, your site will improve its speed and
performance
Forensic analisys tool
Allows manual blocking
WAF
YOUR GUARD
DOG
76
Filters all your web traffic
Protects against XSS, DDoS, …
Patchs virtually well known software vulnerabilities
If it includes CDN, your site will improve its speed and
performance
Forensic analisys tool
Allows manual blocking
77
#WCTokyo 19 Néstor Angulo (@pharar) 78
ご質問は?
ありがとうございました!
@pharar #WCTOKYO

More Related Content

Similar to I've been hacked! So, now, what!?

Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.
Nestor Angulo de Ugarte
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
Haydn Johnson
 
Software Security : From school to reality and back!
Software Security : From school to reality and back!Software Security : From school to reality and back!
Software Security : From school to reality and back!
Peter Hlavaty
 
Building a Modern Security Engineering Organization. Zane Lackey
 Building a Modern Security Engineering Organization. Zane Lackey Building a Modern Security Engineering Organization. Zane Lackey
Building a Modern Security Engineering Organization. Zane Lackey
Yandex
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Nick Galbreath
 
Hacking - high school intro
Hacking - high school introHacking - high school intro
Hacking - high school intro
Peter Hlavaty
 
So You Want to be a Hacker?
So You Want to be a Hacker?So You Want to be a Hacker?
So You Want to be a Hacker?
Christopher Grayson
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
Touhami Kasbaoui
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
AgileNetwork
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
Jim Manico
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
Adrian Sanabria
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
ricagip499
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
Adrian Sanabria
 
Blockaudit Presentation
Blockaudit PresentationBlockaudit Presentation
Blockaudit Presentation
Antoine Chabert
 
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdfCyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
Roger Qiu
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Adrian Sanabria
 
Hacking101 delhi 2013
Hacking101 delhi 2013Hacking101 delhi 2013
Hacking101 delhi 2013
Jithin Emmanuel
 

Similar to I've been hacked! So, now, what!? (20)

Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
Super1
Super1Super1
Super1
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 
Software Security : From school to reality and back!
Software Security : From school to reality and back!Software Security : From school to reality and back!
Software Security : From school to reality and back!
 
Building a Modern Security Engineering Organization. Zane Lackey
 Building a Modern Security Engineering Organization. Zane Lackey Building a Modern Security Engineering Organization. Zane Lackey
Building a Modern Security Engineering Organization. Zane Lackey
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013
 
Hacking - high school intro
Hacking - high school introHacking - high school intro
Hacking - high school intro
 
So You Want to be a Hacker?
So You Want to be a Hacker?So You Want to be a Hacker?
So You Want to be a Hacker?
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Blockaudit Presentation
Blockaudit PresentationBlockaudit Presentation
Blockaudit Presentation
 
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdfCyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
 
Hacking101 delhi 2013
Hacking101 delhi 2013Hacking101 delhi 2013
Hacking101 delhi 2013
 

More from Nestor Angulo de Ugarte

¿Cuál es el coste real de un hackeo en web?
¿Cuál es el coste real de un hackeo en web?¿Cuál es el coste real de un hackeo en web?
¿Cuál es el coste real de un hackeo en web?
Nestor Angulo de Ugarte
 
Limpiar Sitios Hackeados
Limpiar Sitios HackeadosLimpiar Sitios Hackeados
Limpiar Sitios Hackeados
Nestor Angulo de Ugarte
 
Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.
Nestor Angulo de Ugarte
 
Hacking WordPress. El Arte de La Guerra.
Hacking WordPress. El Arte de La Guerra.Hacking WordPress. El Arte de La Guerra.
Hacking WordPress. El Arte de La Guerra.
Nestor Angulo de Ugarte
 
Me han Hackeado... ¿Y ahora qué?
Me han Hackeado... ¿Y ahora qué?Me han Hackeado... ¿Y ahora qué?
Me han Hackeado... ¿Y ahora qué?
Nestor Angulo de Ugarte
 
WordCamp Madrid CSI: El caso de las Backdoors
WordCamp Madrid CSI: El caso de las BackdoorsWordCamp Madrid CSI: El caso de las Backdoors
WordCamp Madrid CSI: El caso de las Backdoors
Nestor Angulo de Ugarte
 
Backdoor: El Bueno, El Feo y el Malo
Backdoor: El Bueno, El Feo y el MaloBackdoor: El Bueno, El Feo y el Malo
Backdoor: El Bueno, El Feo y el Malo
Nestor Angulo de Ugarte
 

More from Nestor Angulo de Ugarte (7)

¿Cuál es el coste real de un hackeo en web?
¿Cuál es el coste real de un hackeo en web?¿Cuál es el coste real de un hackeo en web?
¿Cuál es el coste real de un hackeo en web?
 
Limpiar Sitios Hackeados
Limpiar Sitios HackeadosLimpiar Sitios Hackeados
Limpiar Sitios Hackeados
 
Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.
 
Hacking WordPress. El Arte de La Guerra.
Hacking WordPress. El Arte de La Guerra.Hacking WordPress. El Arte de La Guerra.
Hacking WordPress. El Arte de La Guerra.
 
Me han Hackeado... ¿Y ahora qué?
Me han Hackeado... ¿Y ahora qué?Me han Hackeado... ¿Y ahora qué?
Me han Hackeado... ¿Y ahora qué?
 
WordCamp Madrid CSI: El caso de las Backdoors
WordCamp Madrid CSI: El caso de las BackdoorsWordCamp Madrid CSI: El caso de las Backdoors
WordCamp Madrid CSI: El caso de las Backdoors
 
Backdoor: El Bueno, El Feo y el Malo
Backdoor: El Bueno, El Feo y el MaloBackdoor: El Bueno, El Feo y el Malo
Backdoor: El Bueno, El Feo y el Malo
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

I've been hacked! So, now, what!?