Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Filters

Changing any of the form inputs will cause the list of events to refresh with the filtered results.

Anti-Cast: The Wrong Beer to the Barbecue – BYOVD Attacks with Alissa Torres

Based on recent threat reports, a growing number of bad actors are bringing vulnerable drivers to victim environments to exploit and guarantee a more successful attack path. These kernel drivers are legitimate, trusted and... vulnerable!  Amazingly, some have CVEs dating back to 2015 or earlier. ...

Anti-Cast: API-ocalypse Now with Jennifer Shannon

Get ready for a wild ride as Jennifer Shannon, a Senior Security Consultant at Secure Ideas, presents "API-ocalypse Now." In this thrilling and entertaining webcast, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if left unaddressed. Through live pentesting ...

Anti-Cast: Infiltrating Kubernetes – Attacker Motives and Methods with Cory Sabol

In this one-hour webinar, we will explore an overview of the threats targeting Kubernetes, a crucial technology for managing containerized applications. “Infiltrating Kubernetes: An Overview of Attacker Motives and Methods,” aims to equip IT professionals, DevOps engineers, and cybersecurity enthusiasts with insights into why and ...

Anti-Cast: Applying WWII-Era Analytic Techniques to CTI with Jake Williams

Everything old is new again, including intelligence analytic techniques. In today's webcast, Jake will introduce you to Kent's Analytic Doctrine, a formal intelligence analysis doctrine developed and refined in WWII. You don't need to be a CTI analyst to benefit from this webcast. Practically every ...

Anti-Cast: Go St*lk Yourself – Privacy Through OSINT with Mishaal Khan

It's always scary to Google yourself and see what you find.In this session, we dive into the eerie reality of personal information exposure on the internet. We'll look at some of the resources stalkers use to get information on their victims. The combination of home ...

Anti-Cast: Enterprise DFIR Investigation Scenario with Markus Schober

Based on a compromised employee workstation scenario, we'll discuss how to conduct an effective DFIR investigation within enterprise environments, following the incident response lifecycle. We'll discuss triage and containment considerations, as well as elaborate on best practices for performing effective data collections and forensic analysis. ...

Anti-Cast: How to Write an Adduser Shellcode with Marco Lux

This Anti-Cast jumps right into writing a linux 32Bit shellcode, for adding a new uid 0 user to the system passwd file.With 20 years of experience in the field, Marco has developed a strong interest in computer security, hacking, and penetration testing.Throughout his career, he ...

Shopping Cart

No products in the cart.