際際滷shows by User: balgan / http://www.slideshare.net/images/logo.gif 際際滷shows by User: balgan / Mon, 20 Nov 2023 13:04:16 GMT 際際滷Share feed for 際際滷shows by User: balgan BSides Lisbon 2023 - AI in Cybersecurity.pdf /slideshow/bsides-lisbon-2023-ai-in-cybersecuritypdf/263670127 bsideslisbon2023-aiincybersecurity-231120130416-bf511a72
際際滷s from Bsides Lisbon 2023 about practical use cases for AI in cybersecurity - this presentation attempts to build the knowledge of cybersecurity professionals in the world of AI and present a set of tools and techniques they can use on their day to day.]]>

際際滷s from Bsides Lisbon 2023 about practical use cases for AI in cybersecurity - this presentation attempts to build the knowledge of cybersecurity professionals in the world of AI and present a set of tools and techniques they can use on their day to day.]]>
Mon, 20 Nov 2023 13:04:16 GMT /slideshow/bsides-lisbon-2023-ai-in-cybersecuritypdf/263670127 balgan@slideshare.net(balgan) BSides Lisbon 2023 - AI in Cybersecurity.pdf balgan 際際滷s from Bsides Lisbon 2023 about practical use cases for AI in cybersecurity - this presentation attempts to build the knowledge of cybersecurity professionals in the world of AI and present a set of tools and techniques they can use on their day to day. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsideslisbon2023-aiincybersecurity-231120130416-bf511a72-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 際際滷s from Bsides Lisbon 2023 about practical use cases for AI in cybersecurity - this presentation attempts to build the knowledge of cybersecurity professionals in the world of AI and present a set of tools and techniques they can use on their day to day.
BSides Lisbon 2023 - AI in Cybersecurity.pdf from Tiago Henriques
]]>
134 0 https://cdn.slidesharecdn.com/ss_thumbnails/bsideslisbon2023-aiincybersecurity-231120130416-bf511a72-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Pixels Camp 2017 - Stories from the trenches of building a data architecture /slideshow/pixels-camp-2017-stories-from-the-trenches-of-building-a-data-architecture/80313665 pixelscamp2017-florentino-170930121419
We live in a Data-centric era. Nowadays we have at our disposal an enormous variety of services using data. Behind those services there are architectures supporting the flowing and processing of that data. BinaryEdge.io is no exception. Supporting our platform, we have a data architecture processing 1000s of events per second, which was built and is currently maintained by us. In this talk we are going to review the parts that compose a data architecture, and discuss which tools can be used at each step to arrive at a functional architecture. Note that the insights given will not be based of theoretical documents or truckloads of years of experience, but on our own experience of building and maintaining a large scale data infrastructure and architecture]]>

We live in a Data-centric era. Nowadays we have at our disposal an enormous variety of services using data. Behind those services there are architectures supporting the flowing and processing of that data. BinaryEdge.io is no exception. Supporting our platform, we have a data architecture processing 1000s of events per second, which was built and is currently maintained by us. In this talk we are going to review the parts that compose a data architecture, and discuss which tools can be used at each step to arrive at a functional architecture. Note that the insights given will not be based of theoretical documents or truckloads of years of experience, but on our own experience of building and maintaining a large scale data infrastructure and architecture]]>
Sat, 30 Sep 2017 12:14:19 GMT /slideshow/pixels-camp-2017-stories-from-the-trenches-of-building-a-data-architecture/80313665 balgan@slideshare.net(balgan) Pixels Camp 2017 - Stories from the trenches of building a data architecture balgan We live in a Data-centric era. Nowadays we have at our disposal an enormous variety of services using data. Behind those services there are architectures supporting the flowing and processing of that data. BinaryEdge.io is no exception. Supporting our platform, we have a data architecture processing 1000s of events per second, which was built and is currently maintained by us. In this talk we are going to review the parts that compose a data architecture, and discuss which tools can be used at each step to arrive at a functional architecture. Note that the insights given will not be based of theoretical documents or truckloads of years of experience, but on our own experience of building and maintaining a large scale data infrastructure and architecture <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pixelscamp2017-florentino-170930121419-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We live in a Data-centric era. Nowadays we have at our disposal an enormous variety of services using data. Behind those services there are architectures supporting the flowing and processing of that data. BinaryEdge.io is no exception. Supporting our platform, we have a data architecture processing 1000s of events per second, which was built and is currently maintained by us. In this talk we are going to review the parts that compose a data architecture, and discuss which tools can be used at each step to arrive at a functional architecture. Note that the insights given will not be based of theoretical documents or truckloads of years of experience, but on our own experience of building and maintaining a large scale data infrastructure and architecture
Pixels Camp 2017 - Stories from the trenches of building a data architecture from Tiago Henriques
]]>
1251 3 https://cdn.slidesharecdn.com/ss_thumbnails/pixelscamp2017-florentino-170930121419-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Pixels Camp 2017 - Stranger Things the internet version /slideshow/pixels-camp-2017-stranger-things-the-internet-version/80313656 pixelscamp2017-balgan-170930121328
Much like Eleven and the gang, we at BinaryEdge sometimes are confronted with real monsters. Unlike in the series "Stranger Things" however, the monsters we're faced with take different shapes. Our monsters are usually found in the shape of weird things people connect to the internet. Often we're asked "What is the craziest things you guys have found connected to the internet?" In this talk we intend to answer and show exactly that. If you've seen our previous talks and/or read our "World Security Report" for 2016 (ise.binaryedge.io) you know that we have found some of the weirdest things online. From water dams, to electricity grids, and nuclear laboratory sensors, people simply love connecting things to the internet. And in this talk, we are going to explore the top "things" we've found exposed, talk about the different protocols they use and also allow YOU live on talk to search for your own things! On this talk we will also release our 2017 report, where we show how we detected some of the NSA tools such as Double pulsar. We will also make an interesting reveal on this topic. :)]]>

Much like Eleven and the gang, we at BinaryEdge sometimes are confronted with real monsters. Unlike in the series "Stranger Things" however, the monsters we're faced with take different shapes. Our monsters are usually found in the shape of weird things people connect to the internet. Often we're asked "What is the craziest things you guys have found connected to the internet?" In this talk we intend to answer and show exactly that. If you've seen our previous talks and/or read our "World Security Report" for 2016 (ise.binaryedge.io) you know that we have found some of the weirdest things online. From water dams, to electricity grids, and nuclear laboratory sensors, people simply love connecting things to the internet. And in this talk, we are going to explore the top "things" we've found exposed, talk about the different protocols they use and also allow YOU live on talk to search for your own things! On this talk we will also release our 2017 report, where we show how we detected some of the NSA tools such as Double pulsar. We will also make an interesting reveal on this topic. :)]]>
Sat, 30 Sep 2017 12:13:28 GMT /slideshow/pixels-camp-2017-stranger-things-the-internet-version/80313656 balgan@slideshare.net(balgan) Pixels Camp 2017 - Stranger Things the internet version balgan Much like Eleven and the gang, we at BinaryEdge sometimes are confronted with real monsters. Unlike in the series "Stranger Things" however, the monsters we're faced with take different shapes. Our monsters are usually found in the shape of weird things people connect to the internet. Often we're asked "What is the craziest things you guys have found connected to the internet?" In this talk we intend to answer and show exactly that. If you've seen our previous talks and/or read our "World Security Report" for 2016 (ise.binaryedge.io) you know that we have found some of the weirdest things online. From water dams, to electricity grids, and nuclear laboratory sensors, people simply love connecting things to the internet. And in this talk, we are going to explore the top "things" we've found exposed, talk about the different protocols they use and also allow YOU live on talk to search for your own things! On this talk we will also release our 2017 report, where we show how we detected some of the NSA tools such as Double pulsar. We will also make an interesting reveal on this topic. :) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pixelscamp2017-balgan-170930121328-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Much like Eleven and the gang, we at BinaryEdge sometimes are confronted with real monsters. Unlike in the series &quot;Stranger Things&quot; however, the monsters we&#39;re faced with take different shapes. Our monsters are usually found in the shape of weird things people connect to the internet. Often we&#39;re asked &quot;What is the craziest things you guys have found connected to the internet?&quot; In this talk we intend to answer and show exactly that. If you&#39;ve seen our previous talks and/or read our &quot;World Security Report&quot; for 2016 (ise.binaryedge.io) you know that we have found some of the weirdest things online. From water dams, to electricity grids, and nuclear laboratory sensors, people simply love connecting things to the internet. And in this talk, we are going to explore the top &quot;things&quot; we&#39;ve found exposed, talk about the different protocols they use and also allow YOU live on talk to search for your own things! On this talk we will also release our 2017 report, where we show how we detected some of the NSA tools such as Double pulsar. We will also make an interesting reveal on this topic. :)
Pixels Camp 2017 - Stranger Things the internet version from Tiago Henriques
]]>
1261 3 https://cdn.slidesharecdn.com/ss_thumbnails/pixelscamp2017-balgan-170930121328-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The state of cybersecurity in Switzerland - FinTechDay 2017 /slideshow/the-state-of-cybersecurity-in-switzerland-fintechday-2017/79418912 fintechday030920171-170904162128
In this presentation we make a quick overview of the exposure of companies in Switzerland to cyber attacks.]]>

In this presentation we make a quick overview of the exposure of companies in Switzerland to cyber attacks.]]>
Mon, 04 Sep 2017 16:21:28 GMT /slideshow/the-state-of-cybersecurity-in-switzerland-fintechday-2017/79418912 balgan@slideshare.net(balgan) The state of cybersecurity in Switzerland - FinTechDay 2017 balgan In this presentation we make a quick overview of the exposure of companies in Switzerland to cyber attacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fintechday030920171-170904162128-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation we make a quick overview of the exposure of companies in Switzerland to cyber attacks.
The state of cybersecurity in Switzerland - FinTechDay 2017 from Tiago Henriques
]]>
1112 3 https://cdn.slidesharecdn.com/ss_thumbnails/fintechday030920171-170904162128-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Webzurich - The State of Web Security in Switzerland /slideshow/webzurich-the-state-of-web-security-in-switzerland/70215550 webzurich-161216195754
On this talk BinaryEdge looked at the state of the main Websites of Switzerland, we also looked at the 3 pillars that it stands on banking, insurance and pharma and how they looked from an external perspective.]]>

On this talk BinaryEdge looked at the state of the main Websites of Switzerland, we also looked at the 3 pillars that it stands on banking, insurance and pharma and how they looked from an external perspective.]]>
Fri, 16 Dec 2016 19:57:54 GMT /slideshow/webzurich-the-state-of-web-security-in-switzerland/70215550 balgan@slideshare.net(balgan) Webzurich - The State of Web Security in Switzerland balgan On this talk BinaryEdge looked at the state of the main Websites of Switzerland, we also looked at the 3 pillars that it stands on banking, insurance and pharma and how they looked from an external perspective. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webzurich-161216195754-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> On this talk BinaryEdge looked at the state of the main Websites of Switzerland, we also looked at the 3 pillars that it stands on banking, insurance and pharma and how they looked from an external perspective.
Webzurich - The State of Web Security in Switzerland from Tiago Henriques
]]>
1333 3 https://cdn.slidesharecdn.com/ss_thumbnails/webzurich-161216195754-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BSides Lisbon - Data science, machine learning and cybersecurity /slideshow/bsides-lisbon-data-science-machine-learning-and-cybersecurity/68829546 bsidespresentation-161113194223
In this talk we will present some techniques that we use on a day to day basis in our research, where we combine our internet-wide data scanning and acquisition platform with ML/Data science techniques which allows us to find things faster or extract results in a more automated way. We will focus on practical cases and examples that even our audience at home will be able to use if they want. A couple of examples we will look at is how to classify images such as VNC screenshots, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. We will start by giving a very brief entry to the data science world and talk about: Technologies Techniques How these relate to infosec Algorithms and how they can be used How people can come into the world of data and machine learning Data visualization techniques and what are the best choices for different types of data A couple of examples we will look at is how to classify images such as VNC or x11 screenshots, OCR, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will look at scoring and classification algorithms and how they can be used on ip addresses and we will talk about the use of learning and how we are applying it in real life. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. Some specific examples of our research that should give you an idea of some things we will talk about can be seen here: https://blog.binaryedge.io/2015/11/10/ssh/ https://blog.binaryedge.io/2015/09/30/vnc-image-analysis-and-data-science/ https://blog.binaryedge.io/2015/08/10/data-technologies-and-security-part-1/]]>

In this talk we will present some techniques that we use on a day to day basis in our research, where we combine our internet-wide data scanning and acquisition platform with ML/Data science techniques which allows us to find things faster or extract results in a more automated way. We will focus on practical cases and examples that even our audience at home will be able to use if they want. A couple of examples we will look at is how to classify images such as VNC screenshots, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. We will start by giving a very brief entry to the data science world and talk about: Technologies Techniques How these relate to infosec Algorithms and how they can be used How people can come into the world of data and machine learning Data visualization techniques and what are the best choices for different types of data A couple of examples we will look at is how to classify images such as VNC or x11 screenshots, OCR, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will look at scoring and classification algorithms and how they can be used on ip addresses and we will talk about the use of learning and how we are applying it in real life. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. Some specific examples of our research that should give you an idea of some things we will talk about can be seen here: https://blog.binaryedge.io/2015/11/10/ssh/ https://blog.binaryedge.io/2015/09/30/vnc-image-analysis-and-data-science/ https://blog.binaryedge.io/2015/08/10/data-technologies-and-security-part-1/]]>
Sun, 13 Nov 2016 19:42:23 GMT /slideshow/bsides-lisbon-data-science-machine-learning-and-cybersecurity/68829546 balgan@slideshare.net(balgan) BSides Lisbon - Data science, machine learning and cybersecurity balgan In this talk we will present some techniques that we use on a day to day basis in our research, where we combine our internet-wide data scanning and acquisition platform with ML/Data science techniques which allows us to find things faster or extract results in a more automated way. We will focus on practical cases and examples that even our audience at home will be able to use if they want. A couple of examples we will look at is how to classify images such as VNC screenshots, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. We will start by giving a very brief entry to the data science world and talk about: Technologies Techniques How these relate to infosec Algorithms and how they can be used How people can come into the world of data and machine learning Data visualization techniques and what are the best choices for different types of data A couple of examples we will look at is how to classify images such as VNC or x11 screenshots, OCR, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will look at scoring and classification algorithms and how they can be used on ip addresses and we will talk about the use of learning and how we are applying it in real life. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. Some specific examples of our research that should give you an idea of some things we will talk about can be seen here: https://blog.binaryedge.io/2015/11/10/ssh/ https://blog.binaryedge.io/2015/09/30/vnc-image-analysis-and-data-science/ https://blog.binaryedge.io/2015/08/10/data-technologies-and-security-part-1/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsidespresentation-161113194223-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this talk we will present some techniques that we use on a day to day basis in our research, where we combine our internet-wide data scanning and acquisition platform with ML/Data science techniques which allows us to find things faster or extract results in a more automated way. We will focus on practical cases and examples that even our audience at home will be able to use if they want. A couple of examples we will look at is how to classify images such as VNC screenshots, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. We will start by giving a very brief entry to the data science world and talk about: Technologies Techniques How these relate to infosec Algorithms and how they can be used How people can come into the world of data and machine learning Data visualization techniques and what are the best choices for different types of data A couple of examples we will look at is how to classify images such as VNC or x11 screenshots, OCR, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will look at scoring and classification algorithms and how they can be used on ip addresses and we will talk about the use of learning and how we are applying it in real life. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. Some specific examples of our research that should give you an idea of some things we will talk about can be seen here: https://blog.binaryedge.io/2015/11/10/ssh/ https://blog.binaryedge.io/2015/09/30/vnc-image-analysis-and-data-science/ https://blog.binaryedge.io/2015/08/10/data-technologies-and-security-part-1/
BSides Lisbon - Data science, machine learning and cybersecurity from Tiago Henriques
]]>
1700 6 https://cdn.slidesharecdn.com/ss_thumbnails/bsidespresentation-161113194223-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
I FOR ONE WELCOME OUR NEW CYBER OVERLORDS! AN INTRODUCTION TO THE USE OF MACHINE LEARNING IN CYBERSECURITY /balgan/i-for-one-welcome-our-new-cyber-overlords-an-introduction-to-the-use-of-machine-learning-in-cybersecurity pixelspresentation-161007204143
Talk given at Pixels Camp 2016 about combining Machine Learning and CyberSecurity]]>

Talk given at Pixels Camp 2016 about combining Machine Learning and CyberSecurity]]>
Fri, 07 Oct 2016 20:41:43 GMT /balgan/i-for-one-welcome-our-new-cyber-overlords-an-introduction-to-the-use-of-machine-learning-in-cybersecurity balgan@slideshare.net(balgan) I FOR ONE WELCOME OUR NEW CYBER OVERLORDS! AN INTRODUCTION TO THE USE OF MACHINE LEARNING IN CYBERSECURITY balgan Talk given at Pixels Camp 2016 about combining Machine Learning and CyberSecurity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pixelspresentation-161007204143-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Talk given at Pixels Camp 2016 about combining Machine Learning and CyberSecurity
I FOR ONE WELCOME OUR NEW CYBER OVERLORDS! AN INTRODUCTION TO THE USE OF MACHINE LEARNING IN CYBERSECURITY from Tiago Henriques
]]>
1086 3 https://cdn.slidesharecdn.com/ss_thumbnails/pixelspresentation-161007204143-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015 /slideshow/binaryedge-presentationbsides/50417661 binaryedge-presentation-bsides-150711140705-lva1-app6892
In this presentation we talk about the research we are doing combining Machine learning techniques with Cybersecurity data.]]>

In this presentation we talk about the research we are doing combining Machine learning techniques with Cybersecurity data.]]>
Sat, 11 Jul 2015 14:07:05 GMT /slideshow/binaryedge-presentationbsides/50417661 balgan@slideshare.net(balgan) BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015 balgan In this presentation we talk about the research we are doing combining Machine learning techniques with Cybersecurity data. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/binaryedge-presentation-bsides-150711140705-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation we talk about the research we are doing combining Machine learning techniques with Cybersecurity data.
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015 from Tiago Henriques
]]>
2457 2 https://cdn.slidesharecdn.com/ss_thumbnails/binaryedge-presentation-bsides-150711140705-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Codebits 2014 - Secure Coding - Gamification and automation for the win /slideshow/codebits-2014-secure-coding-gamification-and-automation-for-the-win/34910915 codebits-2014-140520112028-phpapp02
]]>

]]>
Tue, 20 May 2014 11:20:28 GMT /slideshow/codebits-2014-secure-coding-gamification-and-automation-for-the-win/34910915 balgan@slideshare.net(balgan) Codebits 2014 - Secure Coding - Gamification and automation for the win balgan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/codebits-2014-140520112028-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Codebits 2014 - Secure Coding - Gamification and automation for the win from Tiago Henriques
]]>
1603 5 https://cdn.slidesharecdn.com/ss_thumbnails/codebits-2014-140520112028-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Presentation Brucon - Anubisnetworks and PTCoresec /slideshow/presentation-brucon-anubisnetworks-and-ptcoresec/26666835 apresentacaobrucon1-130929095636-phpapp02
]]>

]]>
Sun, 29 Sep 2013 09:56:36 GMT /slideshow/presentation-brucon-anubisnetworks-and-ptcoresec/26666835 balgan@slideshare.net(balgan) Presentation Brucon - Anubisnetworks and PTCoresec balgan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/apresentacaobrucon1-130929095636-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Presentation Brucon - Anubisnetworks and PTCoresec from Tiago Henriques
]]>
3910 3 https://cdn.slidesharecdn.com/ss_thumbnails/apresentacaobrucon1-130929095636-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hardware hacking 101 /slideshow/hardware-hacking-101/22676318 hardwarehacking101-130608195527-phpapp01
Presentation done at confraria]]>

Presentation done at confraria]]>
Sat, 08 Jun 2013 19:55:27 GMT /slideshow/hardware-hacking-101/22676318 balgan@slideshare.net(balgan) Hardware hacking 101 balgan Presentation done at confraria <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hardwarehacking101-130608195527-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation done at confraria
Hardware hacking 101 from Tiago Henriques
]]>
8678 8 https://cdn.slidesharecdn.com/ss_thumbnails/hardwarehacking101-130608195527-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Workshop https://pt.slideshare.net/slideshow/workshop-17753781/17753781 workshop-130327061746-phpapp01
]]>

]]>
Wed, 27 Mar 2013 06:17:46 GMT https://pt.slideshare.net/slideshow/workshop-17753781/17753781 balgan@slideshare.net(balgan) Workshop balgan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/workshop-130327061746-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
from Tiago Henriques
]]>
1511 5 https://cdn.slidesharecdn.com/ss_thumbnails/workshop-130327061746-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Enei /slideshow/enei/17753744 enei-130327061617-phpapp01
]]>

]]>
Wed, 27 Mar 2013 06:16:17 GMT /slideshow/enei/17753744 balgan@slideshare.net(balgan) Enei balgan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/enei-130327061617-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Enei from Tiago Henriques
]]>
2637 4 https://cdn.slidesharecdn.com/ss_thumbnails/enei-130327061617-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Confraria 28-feb-2013 mesa redonda https://pt.slideshare.net/slideshow/confraria-28feb2013-mesa-redonda/16820018 confra-130227204054-phpapp02
]]>

]]>
Wed, 27 Feb 2013 20:40:54 GMT https://pt.slideshare.net/slideshow/confraria-28feb2013-mesa-redonda/16820018 balgan@slideshare.net(balgan) Confraria 28-feb-2013 mesa redonda balgan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/confra-130227204054-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
from Tiago Henriques
]]>
727 3 https://cdn.slidesharecdn.com/ss_thumbnails/confra-130227204054-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Preso fcul /slideshow/preso-fcul/15684074 preso-fcul-121218054249-phpapp01
]]>

]]>
Tue, 18 Dec 2012 05:42:49 GMT /slideshow/preso-fcul/15684074 balgan@slideshare.net(balgan) Preso fcul balgan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/preso-fcul-121218054249-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Preso fcul from Tiago Henriques
]]>
1273 2 https://cdn.slidesharecdn.com/ss_thumbnails/preso-fcul-121218054249-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to dominate a country /slideshow/how-to-dominate-a-country/15212420 howtodominateacountry-121116120158-phpapp01
]]>

]]>
Fri, 16 Nov 2012 12:01:56 GMT /slideshow/how-to-dominate-a-country/15212420 balgan@slideshare.net(balgan) How to dominate a country balgan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtodominateacountry-121116120158-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
How to dominate a country from Tiago Henriques
]]>
2344 7 https://cdn.slidesharecdn.com/ss_thumbnails/howtodominateacountry-121116120158-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Country domination - Causing chaos and wrecking havoc /slideshow/country-domination-causing-chaos-and-wrecking-havoc/13521693 countrydomination-120702193815-phpapp01
How to own a country]]>

How to own a country]]>
Mon, 02 Jul 2012 19:38:13 GMT /slideshow/country-domination-causing-chaos-and-wrecking-havoc/13521693 balgan@slideshare.net(balgan) Country domination - Causing chaos and wrecking havoc balgan How to own a country <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/countrydomination-120702193815-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to own a country
Country domination - Causing chaos and wrecking havoc from Tiago Henriques
]]>
1514 4 https://cdn.slidesharecdn.com/ss_thumbnails/countrydomination-120702193815-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
(Mis)trusting and (ab)using ssh /slideshow/mistrusting-and-abusing-ssh/13521668 mistrustingandabusingssh-120702193359-phpapp02
Bruno Morisson e Herman Duarte (http://pt.linkedin.com/in/morisson /http://pt.linkedin.com/in/hcoduarte) T鱈tulo: (ab)using SSH - Tips & Tricks for Pentesters and Sysadmins]]>

Bruno Morisson e Herman Duarte (http://pt.linkedin.com/in/morisson /http://pt.linkedin.com/in/hcoduarte) T鱈tulo: (ab)using SSH - Tips & Tricks for Pentesters and Sysadmins]]>
Mon, 02 Jul 2012 19:33:58 GMT /slideshow/mistrusting-and-abusing-ssh/13521668 balgan@slideshare.net(balgan) (Mis)trusting and (ab)using ssh balgan Bruno Morisson e Herman Duarte (http://pt.linkedin.com/in/morisson /http://pt.linkedin.com/in/hcoduarte) T鱈tulo: (ab)using SSH - Tips & Tricks for Pentesters and Sysadmins <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mistrustingandabusingssh-120702193359-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Bruno Morisson e Herman Duarte (http://pt.linkedin.com/in/morisson /http://pt.linkedin.com/in/hcoduarte) T鱈tulo: (ab)using SSH - Tips &amp; Tricks for Pentesters and Sysadmins
(Mis)trusting and (ab)using ssh from Tiago Henriques
]]>
1468 4 https://cdn.slidesharecdn.com/ss_thumbnails/mistrustingandabusingssh-120702193359-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure coding - Balgan - Tiago Henriques /slideshow/secure-coding-balgan-tiago-henriques/13167517 securecoding-120601180100-phpapp01
]]>

]]>
Fri, 01 Jun 2012 18:00:58 GMT /slideshow/secure-coding-balgan-tiago-henriques/13167517 balgan@slideshare.net(balgan) Secure coding - Balgan - Tiago Henriques balgan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securecoding-120601180100-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Secure coding - Balgan - Tiago Henriques from Tiago Henriques
]]>
3670 4 https://cdn.slidesharecdn.com/ss_thumbnails/securecoding-120601180100-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Vulnerability, exploit to metasploit /slideshow/vulnerability-exploit-to-metasploit/11832917 vulnerabilityexploittometasploit-120302075652-phpapp01
My Talk @ Confraria February 2012]]>

My Talk @ Confraria February 2012]]>
Fri, 02 Mar 2012 07:56:52 GMT /slideshow/vulnerability-exploit-to-metasploit/11832917 balgan@slideshare.net(balgan) Vulnerability, exploit to metasploit balgan My Talk @ Confraria February 2012 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vulnerabilityexploittometasploit-120302075652-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My Talk @ Confraria February 2012
Vulnerability, exploit to metasploit from Tiago Henriques
]]>
2661 6 https://cdn.slidesharecdn.com/ss_thumbnails/vulnerabilityexploittometasploit-120302075652-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-balgan-48x48.jpg?cb=1701042762 https://balgan.world balgan.world https://cdn.slidesharecdn.com/ss_thumbnails/bsideslisbon2023-aiincybersecurity-231120130416-bf511a72-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/bsides-lisbon-2023-ai-in-cybersecuritypdf/263670127 BSides Lisbon 2023 - A... https://cdn.slidesharecdn.com/ss_thumbnails/pixelscamp2017-florentino-170930121419-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/pixels-camp-2017-stories-from-the-trenches-of-building-a-data-architecture/80313665 Pixels Camp 2017 - Sto... https://cdn.slidesharecdn.com/ss_thumbnails/pixelscamp2017-balgan-170930121328-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/pixels-camp-2017-stranger-things-the-internet-version/80313656 Pixels Camp 2017 - Str...