Welcome to Miami – Hacker Halted USA

The 5th Hacker Halted USA is now taking place in Miami under the slogan – Unravel the Enigma of Insecurity after hurricane Sandy passed Florida last weekend.

Day 1 is the keynote day, so luckily no splitted presentation-streams. After a nice conference opening by Eric Lopez (Conference Director), Jay Bavisi gave a good introduction about the challenges of the post-PC era. He described the evolution of the hardware landscape from classic PCs to small, mobile and smart devices and how the requirements for it-security change. Further this brings problems to forensics, more privacy risks and new social engineering attacks as well as other threats.

The second presentation was given by Jack Daniel talking about responsibilities of hackers like helping and teaching other people. Later Winn Schwartau gave a very nice presentation about problems talented people face while hiring. In general he pointed out that discrimination is one big issue to solve in order to get more talented people hired and to stop the current “cyber security hiring crisis”.

A maybe interesting talk about open source intelligence was cancelled, as the presenter didn’t show up.

The day was closed with a panel discussion on end user security awareness. Following some key points of the discussion:

  • Use teachable moments, e.g. an incident
  • Use this to create an uncomfortable for similar future situations, so the user don’t run into the same problem again
  • Use positive incentives
  • Think about methods to ensure that the users follow the policies in general (not limited to the office/work)

Besides the talks some other cool things are going on here:

  • The global CISO forum
  • The Global Cyberlympics world finals. Winner is the team from the Netherlands – congratulations!
  • Capture the packet competition
  • Warl0ck gam3z competition

Welcome to Miami – Hacker Halted USA

Your email address will not be published. Required fields are marked *



APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox