Twelvesec
BLOG
  • SERVICES
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
  • SERVICES
    • Security Assurance
    • Security Management
    • Security Training
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Careers
    • News
    • Contact
BSides Athens 2018 – This is a serious laptop; No games and chatting possible, OK?

BSides Athens 2018 – This is a serious laptop; No games and chatting possible, OK?

by Yiannis Koukouras | Oct 1, 2018 | 0 comments

During the Bsides Athens 2018 conference, I made a presentation on how – during a penetration test exercise – we managed to infiltrate malware and exfiltrate data in/out of a corporate secure laptop, that was using the “Walled Garden”...

LATEST POSTS

  • Basic knowledge to get started with Penetration Testing November 18, 2022
  • Free Application Security Assessment for Start – Ups September 30, 2022
  • War is Never the Answer February 22, 2022
  • Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
  • EU GDPR vs Virginia CDPA April 22, 2021
  • Data protection around the world – Part II March 31, 2021
  • Data protection around the world March 24, 2021

TAGS

infosec Encryption Misconfigurations Information Leakage community Privacy TwelveSec Cyber Defense tool pentest IT security event vulnerabilities Covid-19 GDPR self-isolation collaborations Penetration Testing cybersecurity reversing social responsibility Corelan GDPR compliance Application Penetration Test Burp Extender partnerships ICT security Coronavirus Ransomware attacks information security ctf Web Security NY SHIELD pen-test teleworking cyber security android Mobile Security capture the flag Ethics CCPA social distancing computer security Reverse Engineering bruteforce Web Application Penetration Testing

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2023 Twelvesec | Created by Amiad
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.
REJECTCookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
SAVE & ACCEPT