際際滷shows by User: NazarTymoshyk / http://www.slideshare.net/images/logo.gif 際際滷shows by User: NazarTymoshyk / Thu, 21 Dec 2017 15:28:07 GMT 際際滷Share feed for 際際滷shows by User: NazarTymoshyk Black magic of web attacks Detection and Prevention /NazarTymoshyk/black-magic-of-web-attacks-detection-and-prevention blackmagicofwebattacksdetectionandprevention-171221152807
Splunk and AuditD, Mod_Security WAF]]>

Splunk and AuditD, Mod_Security WAF]]>
Thu, 21 Dec 2017 15:28:07 GMT /NazarTymoshyk/black-magic-of-web-attacks-detection-and-prevention NazarTymoshyk@slideshare.net(NazarTymoshyk) Black magic of web attacks Detection and Prevention NazarTymoshyk Splunk and AuditD, Mod_Security WAF <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/blackmagicofwebattacksdetectionandprevention-171221152807-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Splunk and AuditD, Mod_Security WAF
Black magic of web attacks Detection and Prevention from Nazar Tymoshyk, CEH, Ph.D.
]]>
187 1 https://cdn.slidesharecdn.com/ss_thumbnails/blackmagicofwebattacksdetectionandprevention-171221152807-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CIA Hacking Organization in the Nutshell /slideshow/cia-hacking-organization-in-the-nutshell/77201981 cianutshell-170623095400
Analysis of CIA Vault 7 leakage on Wikileaks, how organization is build, tools they use, best practices and how to avoid spying]]>

Analysis of CIA Vault 7 leakage on Wikileaks, how organization is build, tools they use, best practices and how to avoid spying]]>
Fri, 23 Jun 2017 09:54:00 GMT /slideshow/cia-hacking-organization-in-the-nutshell/77201981 NazarTymoshyk@slideshare.net(NazarTymoshyk) CIA Hacking Organization in the Nutshell NazarTymoshyk Analysis of CIA Vault 7 leakage on Wikileaks, how organization is build, tools they use, best practices and how to avoid spying <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cianutshell-170623095400-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Analysis of CIA Vault 7 leakage on Wikileaks, how organization is build, tools they use, best practices and how to avoid spying
CIA Hacking Organization in the Nutshell from Nazar Tymoshyk, CEH, Ph.D.
]]>
204 2 https://cdn.slidesharecdn.com/ss_thumbnails/cianutshell-170623095400-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security as a new metric for Business, Product and Development Lifecycle /slideshow/security-as-a-new-metric-for-business-product-and-development-lifecycle/54115343 itarena2015-151019124218-lva1-app6892
Security as a new metric for Business, Product and Development Lifecycle]]>

Security as a new metric for Business, Product and Development Lifecycle]]>
Mon, 19 Oct 2015 12:42:18 GMT /slideshow/security-as-a-new-metric-for-business-product-and-development-lifecycle/54115343 NazarTymoshyk@slideshare.net(NazarTymoshyk) Security as a new metric for Business, Product and Development Lifecycle NazarTymoshyk Security as a new metric for Business, Product and Development Lifecycle <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/itarena2015-151019124218-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Security as a new metric for Business, Product and Development Lifecycle
Security as a new metric for Business, Product and Development Lifecycle from Nazar Tymoshyk, CEH, Ph.D.
]]>
651 4 https://cdn.slidesharecdn.com/ss_thumbnails/itarena2015-151019124218-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
"亠仂仂亰于亟从舒-于于": 仂亰于亳仂从 弍亠亰仗仍仂仆仂 舒于舒 亠亠亰 于仂仍仂仆亠从亳亶 /slideshow/ss-51906108/51906108 random-150821145337-lva1-app6892
, 仍舒仍仆 舒仗舒舒亳, 亟仂仗仂仄仂亞舒 丐, 于仂仍仂仆亠于仂]]>

, 仍舒仍仆 舒仗舒舒亳, 亟仂仗仂仄仂亞舒 丐, 于仂仍仂仆亠于仂]]>
Fri, 21 Aug 2015 14:53:37 GMT /slideshow/ss-51906108/51906108 NazarTymoshyk@slideshare.net(NazarTymoshyk) "亠仂仂亰于亟从舒-于于": 仂亰于亳仂从 弍亠亰仗仍仂仆仂 舒于舒 亠亠亰 于仂仍仂仆亠从亳亶 NazarTymoshyk , 仍舒仍仆 舒仗舒舒亳, 亟仂仗仂仄仂亞舒 丐, 于仂仍仂仆亠于仂 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/random-150821145337-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> , 仍舒仍仆 舒仗舒舒亳, 亟仂仗仂仄仂亞舒 丐, 于仂仍仂仆亠于仂
"亠仂仂亰于亟从舒-于于": 仂亰于亳仂从 弍亠亰仗仍仂仆仂 舒于舒 亠亠亰 于仂仍仂仆亠从亳亶 from Nazar Tymoshyk, CEH, Ph.D.
]]>
904 7 https://cdn.slidesharecdn.com/ss_thumbnails/random-150821145337-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OWASP Top 10 practice workshop by Stanislav Breslavskyi /slideshow/owasp-top-10-practice-workshop-by-stanislav-breslavsky/51537932 decodeowaspt10-150812101552-lva1-app6891
OWASP Top 10 security fails in web-apps - a practice workshop by Stanislav Breslavskyi]]>

OWASP Top 10 security fails in web-apps - a practice workshop by Stanislav Breslavskyi]]>
Wed, 12 Aug 2015 10:15:52 GMT /slideshow/owasp-top-10-practice-workshop-by-stanislav-breslavsky/51537932 NazarTymoshyk@slideshare.net(NazarTymoshyk) OWASP Top 10 practice workshop by Stanislav Breslavskyi NazarTymoshyk OWASP Top 10 security fails in web-apps - a practice workshop by Stanislav Breslavskyi <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/decodeowaspt10-150812101552-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> OWASP Top 10 security fails in web-apps - a practice workshop by Stanislav Breslavskyi
OWASP Top 10 practice workshop by Stanislav Breslavskyi from Nazar Tymoshyk, CEH, Ph.D.
]]>
504 4 https://cdn.slidesharecdn.com/ss_thumbnails/decodeowaspt10-150812101552-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Automotive security testing /slideshow/automotive-security-testing/50466967 automotivesecuritytesting-150713131331-lva1-app6892
Connected Car Security]]>

Connected Car Security]]>
Mon, 13 Jul 2015 13:13:31 GMT /slideshow/automotive-security-testing/50466967 NazarTymoshyk@slideshare.net(NazarTymoshyk) Automotive security testing NazarTymoshyk Connected Car Security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/automotivesecuritytesting-150713131331-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Connected Car Security
Automotive security testing from Nazar Tymoshyk, CEH, Ph.D.
]]>
618 4 https://cdn.slidesharecdn.com/ss_thumbnails/automotivesecuritytesting-150713131331-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Agile and Secure Development /slideshow/agile-and-secure-development/43239250 agileandsecuredevelopment-150106050051-conversion-gate01
]]>

]]>
Tue, 06 Jan 2015 05:00:50 GMT /slideshow/agile-and-secure-development/43239250 NazarTymoshyk@slideshare.net(NazarTymoshyk) Agile and Secure Development NazarTymoshyk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/agileandsecuredevelopment-150106050051-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Agile and Secure Development from Nazar Tymoshyk, CEH, Ph.D.
]]>
797 1 https://cdn.slidesharecdn.com/ss_thumbnails/agileandsecuredevelopment-150106050051-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hack through Injections /slideshow/hack-through-injections/41341182 hackthroughinjections-141110032409-conversion-gate01
IT Weeked SQL injections Introduction. More Advanced topic will be presented on next Security Hole.]]>

IT Weeked SQL injections Introduction. More Advanced topic will be presented on next Security Hole.]]>
Mon, 10 Nov 2014 03:24:09 GMT /slideshow/hack-through-injections/41341182 NazarTymoshyk@slideshare.net(NazarTymoshyk) Hack through Injections NazarTymoshyk IT Weeked SQL injections Introduction. More Advanced topic will be presented on next Security Hole. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hackthroughinjections-141110032409-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> IT Weeked SQL injections Introduction. More Advanced topic will be presented on next Security Hole.
Hack through Injections from Nazar Tymoshyk, CEH, Ph.D.
]]>
5241 16 https://cdn.slidesharecdn.com/ss_thumbnails/hackthroughinjections-141110032409-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Agile and Secure SDLC /slideshow/agile-and-secure-sdlc/39843165 itarena-securesdlc-141003093913-phpapp02
How we implement and apply security on our development projects.]]>

How we implement and apply security on our development projects.]]>
Fri, 03 Oct 2014 09:39:13 GMT /slideshow/agile-and-secure-sdlc/39843165 NazarTymoshyk@slideshare.net(NazarTymoshyk) Agile and Secure SDLC NazarTymoshyk How we implement and apply security on our development projects. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/itarena-securesdlc-141003093913-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How we implement and apply security on our development projects.
Agile and Secure SDLC from Nazar Tymoshyk, CEH, Ph.D.
]]>
9636 6 https://cdn.slidesharecdn.com/ss_thumbnails/itarena-securesdlc-141003093913-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
仂亠从 亠舒弍仍舒 于亶从仂于亳 于 丐 /slideshow/ss-39838727/39838727 random-141003072911-phpapp02
仂亠从 亠舒弍仍舒 于亶从仂于亳 于 丐]]>

仂亠从 亠舒弍仍舒 于亶从仂于亳 于 丐]]>
Fri, 03 Oct 2014 07:29:11 GMT /slideshow/ss-39838727/39838727 NazarTymoshyk@slideshare.net(NazarTymoshyk) 仂亠从 亠舒弍仍舒 于亶从仂于亳 于 丐 NazarTymoshyk 仂亠从 亠舒弍仍舒 于亶从仂于亳 于 丐 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/random-141003072911-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 仂亠从 亠舒弍仍舒 于亶从仂于亳 于 丐
仂亠从 亠舒弍仍舒 于亶从仂于亳 于 丐 from Nazar Tymoshyk, CEH, Ph.D.
]]>
8558 17 https://cdn.slidesharecdn.com/ss_thumbnails/random-141003072911-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication" /slideshow/security-hole-105-lviv-softservesymphony-solutions-lockpicking-authentication/36824368 symphonysolutions-sh10-140710031502-phpapp02
Security Hole #12 OWASP Lviv SoftServe-Symphony Solutions Topic - "Lockpicking Authentication"]]>

Security Hole #12 OWASP Lviv SoftServe-Symphony Solutions Topic - "Lockpicking Authentication"]]>
Thu, 10 Jul 2014 03:15:02 GMT /slideshow/security-hole-105-lviv-softservesymphony-solutions-lockpicking-authentication/36824368 NazarTymoshyk@slideshare.net(NazarTymoshyk) Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication" NazarTymoshyk Security Hole #12 OWASP Lviv SoftServe-Symphony Solutions Topic - "Lockpicking Authentication" <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/symphonysolutions-sh10-140710031502-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Security Hole #12 OWASP Lviv SoftServe-Symphony Solutions Topic - &quot;Lockpicking Authentication&quot;
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication" from Nazar Tymoshyk, CEH, Ph.D.
]]>
4594 6 https://cdn.slidesharecdn.com/ss_thumbnails/symphonysolutions-sh10-140710031502-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Hole #11 - Unusual security vulnerabilities - Yuriy Bilyk /NazarTymoshyk/security-hole-11-unusual-security-vulnerabilities-yuriy-bilyk securityhole11-unusualsecurityvulnerabilities-yuriybilyk-140709083925-phpapp01
]]>

]]>
Wed, 09 Jul 2014 08:39:25 GMT /NazarTymoshyk/security-hole-11-unusual-security-vulnerabilities-yuriy-bilyk NazarTymoshyk@slideshare.net(NazarTymoshyk) Security Hole #11 - Unusual security vulnerabilities - Yuriy Bilyk NazarTymoshyk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityhole11-unusualsecurityvulnerabilities-yuriybilyk-140709083925-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Security Hole #11 - Unusual security vulnerabilities - Yuriy Bilyk from Nazar Tymoshyk, CEH, Ph.D.
]]>
4423 7 https://cdn.slidesharecdn.com/ss_thumbnails/securityhole11-unusualsecurityvulnerabilities-yuriybilyk-140709083925-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Hole #11 - Competitive intelligence - Beliaiev /slideshow/security-hole-11-competitive-intelligence-beliaiev/36791435 securityhole11-competitiveintelligence-beliaiev-140709083727-phpapp02
]]>

]]>
Wed, 09 Jul 2014 08:37:27 GMT /slideshow/security-hole-11-competitive-intelligence-beliaiev/36791435 NazarTymoshyk@slideshare.net(NazarTymoshyk) Security Hole #11 - Competitive intelligence - Beliaiev NazarTymoshyk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityhole11-competitiveintelligence-beliaiev-140709083727-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Security Hole #11 - Competitive intelligence - Beliaiev from Nazar Tymoshyk, CEH, Ph.D.
]]>
3865 5 https://cdn.slidesharecdn.com/ss_thumbnails/securityhole11-competitiveintelligence-beliaiev-140709083727-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-NazarTymoshyk-48x48.jpg?cb=1686088374 Ph.D. OWASP Chapter Leader. Security Researcher, Team lead for bright and smart geeks. Specialties: BizDev, R&D, AppSec, Cloud, Pentesting Automation, Linux, Networking, Windows Server, Virtualization, Forensics, Reverse Engineering, Malware analysis, OWASP, SIEM, Splunk Security Certifications: Certified Ethical Hacker (EC-Council), , AWS Certified SysOps, HP Fortify Security Technical Specialist, CIW Web Security Specialist, Cisco SMB Security Specialist, Zyxel Security Specialist IT Certifications:CLE,DCTS,DCATS,NAI,CLP,NLTS,CNA,NCLA,MCTS https://cdn.slidesharecdn.com/ss_thumbnails/blackmagicofwebattacksdetectionandprevention-171221152807-thumbnail.jpg?width=320&height=320&fit=bounds NazarTymoshyk/black-magic-of-web-attacks-detection-and-prevention Black magic of web att... https://cdn.slidesharecdn.com/ss_thumbnails/cianutshell-170623095400-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cia-hacking-organization-in-the-nutshell/77201981 CIA Hacking Organizati... https://cdn.slidesharecdn.com/ss_thumbnails/itarena2015-151019124218-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/security-as-a-new-metric-for-business-product-and-development-lifecycle/54115343 Security as a new metr...