Kategoria: Bez kategorii

Tech trivia with a twist: Va Bank IT at the After Party!

Why will this year’s After Party be epic? Because once again, we’re hosting the Va Bank IT contest with your favourite cybersecurity pros! Join us at the After Party by Relativity on the first day of the conference, June 2nd! The contest kicks off at 20:30.

Community Corner: Where cybersecurity meets community

As CONFidence 2025 approaches, we’re excited to highlight the Community Corner – a dedicated space for grassroots initiatives, open-source projects, and real-world cybersecurity stories. This year’s lineup offers a diverse array of sessions that blend technical insight with community engagement. June 2nd highlights: 10:00-10:20 – Flag Hunt kickoff Join Adam Borzymowski for the launch of…
Read more

Who will you meet at CONFidence 2025? A cybersecurity networking scene

With each edition, CONFidence grows both as a leading cybersecurity conference in Central Europe and an unmatched networking destination. CONFidence 2025 brings together representatives from over 500 organizations across industries, countries, and cybersecurity domains. This year’s attendee list reflects the growing importance of cooperation and cross-sector dialogue in today’s threat landscape. Whether you’re a security…
Read more

CONFidence: the cybersecurity conference that became a legend

From a local initiative to one of Europe’s most respected cybersecurity events, CONFidence has spent the last 20 years shaping the future of IT security. What began as a bold experiment in community-driven knowledge sharing has grown into an international conference, renowned for its technical depth, vibrant atmosphere, and commitment to hacker culture. The PROIDEA…
Read more

CONFidence 2025 schedule is out! A walkthrough

This year’s CONFidence lineup is stronger than ever, covering everything from red teaming and car hacking to cyberwarfare and the future of AI in security. Whether you’re in offensive security, blue teaming, or just passionate about tech, there’s something here for you. Let’s dive into the core areas and what you can expect to learn! …
Read more

Exec Track: Exclusive C-Level Security Track at CONFidence 2025

During the 25th edition of CONFidence, we’re upgrading the conference experience and expanding our scope with the Exec Track. This invite-only track is designed exclusively for senior executives from directors up to C-Level, providing deep insights into modern cyber threats and defense strategies. In a rapidly evolving digital world, executives must stay ahead of emerging…
Read more

Hacking mObywatel 2.0: exploring security challenges of digital identity apps

In a compelling presentation at CONFidence 2024, Szymon Chadam delved into the security vulnerabilities of mObywatel 2.0, Poland’s innovative electronic identity application. This app, intended to revolutionize identity verification processes, comes with promises of convenience but also faces significant risks if not implemented securely. Below, we summarize key insights into the app’s functionality, vulnerabilities, and…
Read more

What’s up with caches? A security perspective on caching in web applications

Caching is a critical mechanism in web applications, designed to optimize performance and reduce server load. However, as Iwona Polak discussed in her insightful presentation from CONFidence 2024, improper cache configuration can introduce significant security risks. This article explores the types of caching, associated vulnerabilities, and best practices for mitigating risks. Read our summary and…
Read more

DoubleDrive: leveraging cloud services as ransomware agents

In a world where ransomware attacks are growing increasingly sophisticated, Or Yair presented an innovative and concerning method for executing ransomware attacks at CONFidence 2024. Named “DoubleDrive,” this attack exploits the synchronization mechanisms of popular cloud storage services – OneDrive and Google Drive – to bypass traditional security measures. Read our summary and watch the…
Read more

Windows Registry Deja Vu: The Return of Confused Deputies

Mateusz Jurczyk’s presentation at CONFidence 2024 delves into the complexities and vulnerabilities of the Windows registry, particularly focusing on symbolic links and predefined keys. His research reveals how seemingly outdated features and insufficient mitigations can still expose modern Windows systems to privilege escalation attacks. This article provides an overview of the registry’s fundamentals, its historical…
Read more