Kategoria: Bez kategorii

Who will you meet at CONFidence 2025? A cybersecurity networking scene

With each edition, CONFidence grows both as a leading cybersecurity conference in Central Europe and an unmatched networking destination. CONFidence 2025 brings together representatives from over 500 organizations across industries, countries, and cybersecurity domains. This year’s attendee list reflects the growing importance of cooperation and cross-sector dialogue in today’s threat landscape. Whether you’re a security…
Read more

CONFidence: the cybersecurity conference that became a legend

From a local initiative to one of Europe’s most respected cybersecurity events, CONFidence has spent the last 20 years shaping the future of IT security. What began as a bold experiment in community-driven knowledge sharing has grown into an international conference, renowned for its technical depth, vibrant atmosphere, and commitment to hacker culture. The PROIDEA…
Read more

CONFidence 2025 schedule is out! A walkthrough

This year’s CONFidence lineup is stronger than ever, covering everything from red teaming and car hacking to cyberwarfare and the future of AI in security. Whether you’re in offensive security, blue teaming, or just passionate about tech, there’s something here for you. Let’s dive into the core areas and what you can expect to learn! …
Read more

Exec Track: Exclusive C-Level Security Track at CONFidence 2025

During the 25th edition of CONFidence, we’re upgrading the conference experience and expanding our scope with the Exec Track. This invite-only track is designed exclusively for senior executives from directors up to C-Level, providing deep insights into modern cyber threats and defense strategies. In a rapidly evolving digital world, executives must stay ahead of emerging…
Read more

Hacking mObywatel 2.0: exploring security challenges of digital identity apps

In a compelling presentation at CONFidence 2024, Szymon Chadam delved into the security vulnerabilities of mObywatel 2.0, Poland’s innovative electronic identity application. This app, intended to revolutionize identity verification processes, comes with promises of convenience but also faces significant risks if not implemented securely. Below, we summarize key insights into the app’s functionality, vulnerabilities, and…
Read more

What’s up with caches? A security perspective on caching in web applications

Caching is a critical mechanism in web applications, designed to optimize performance and reduce server load. However, as Iwona Polak discussed in her insightful presentation from CONFidence 2024, improper cache configuration can introduce significant security risks. This article explores the types of caching, associated vulnerabilities, and best practices for mitigating risks. Read our summary and…
Read more

DoubleDrive: leveraging cloud services as ransomware agents

In a world where ransomware attacks are growing increasingly sophisticated, Or Yair presented an innovative and concerning method for executing ransomware attacks at CONFidence 2024. Named “DoubleDrive,” this attack exploits the synchronization mechanisms of popular cloud storage services – OneDrive and Google Drive – to bypass traditional security measures. Read our summary and watch the…
Read more

Windows Registry Deja Vu: The Return of Confused Deputies

Mateusz Jurczyk’s presentation at CONFidence 2024 delves into the complexities and vulnerabilities of the Windows registry, particularly focusing on symbolic links and predefined keys. His research reveals how seemingly outdated features and insufficient mitigations can still expose modern Windows systems to privilege escalation attacks. This article provides an overview of the registry’s fundamentals, its historical…
Read more

Linux privilege escalation via arbitrary x86 MSRS: A case study from CTF challenge

Dominik Czarnota’s presentation from CONFidence 2024 showcased a fascinating Capture The Flag challenge that explored the exploitation of arbitrary Model-Specific Registers (MSRs) in Linux systems. This case study illustrates how a small misconfiguration in the Linux kernel can lead to privilege escalation and provides valuable insights into advanced exploitation techniques. Below, we delve into the…
Read more

CALL FOR PAPERS: Speak at CONFidence 2025

The CONFidence 2025 Call For Papers is now open. We’re looking for cybersecurity speakers worldwide who are dedicated to sharing the latest research and innovative, advanced solutions.  If you’d like to speak at the CONFidence conference, submit your lecture or workshop proposal by 7 March 2025 by completing the CFP form. Share your skills and…
Read more