44CON Announce logo

44CON Announce

Subscribe
Archives
August 6, 2019

[44Con Announce] 1 Month till training. Don't miss out: book now.

|IF:MC_PREVIEW_TEXT|

[if !gte mso 9]>|MC_PREVIEW_TEXT|

img
Try viewing this email in your browser
end header bar header left
September Training: Book Your Seats Now!
We're closing in on cut-offs for training numbers. To secure your seat on a course, book now. Check out the 9 high quality training courses available.
Mastering Container Security
An updated 2-day course covering everything about Docker and k8s attack and defence.
Read more →
Cloud Security & DevSecOps Workshop
Paul Schwarzenberger's 3-day course covering AWS, Azure, GCP and DevSecOps in-depth.
Read more →
SAP Cybersecurity For Practitioners
The best 2-day SAP course for pentesters and IT security practitioners, direct from Buenos Aires.
Read more →
The Web App Hacker's Handbook
The original and best 2-day lab-based applied web application security testing training course.
Read more →
The Mobile App Hacker's Handbook
2 Days of mobile app iOS and Android security training based on the book of the same name.
Read more →
Adversary Simulation & Red Team Tactics
Advanced Red Team training over 2 days. Ideal for CC SAS exam preparation.
Sold Out →
The ARM IoT Exploit Laboratory
So many updates. Includes access to the unreleased ARM-X firmware emulation framework.
Read more →
In & Out: Data Exfiltration Techniques
Penetrate, pivot and pilfer with Lezek Miś' 3 day pivoting and data exfiltration course.
Read more →
Code Injections From Beginner To Advanced
David Korczynski covers everything from CreateRemoteThread to Atom Smashing.
Read more →
LIMITED HOTEL ROOMS LEFT.
TICKETS FROM £349
Register Now →
Talks We've Loved
We're moving all of our talks from Vimeo to our 44CON TV YouTube channel. Here are a couple of talks we think you'll enjoy.
JTAGSploitation: 5 Wires, 5 ways to root
Joe Fitz and Matt King look at turning checks for JTAG into checkmate, with 5 different routes to hardware root access.
WATCH NOW
Reverse Engineering and Exploiting Font Rasterizers
Mateusz Jurczyk explores/exploits the world of font handlers in style.
WATCH NOW
end header left 1/2 right 1 end 1/2 right 1 1/2 left 1 end 1/2 left 1 cta end cta headline end headline 1/1 panel end 1/1 panel 2/2 content end 2/2 content 3/3 content end 3/3 content 2/2 panel end 2/2 panel 3/3 panel end 3/3 panel profile end profile contact end contact 1/2 left 2 end 1/2 left 2 1/2 right 2 end 1/2 right 2 header right end header right content right end content right content left end content left quote end quote 1/3 left end 1/3 left 1/3 right end 1/3 right 1/1 content end 1/1 content footer

end footer

img
img @44CON
About 44CON
Since 2011 we've been breaking things, highlighting flaws and presenting the latest international research in London, UK. We're back from the 11th to 13th September 2019 at the ILEC, London.
If you’d prefer not to receive updates, you can unsubscribe here.
Don't miss what's next. Subscribe to 44CON Announce:
Website Bluesky X LinkedIn Facebook
Powered by Buttondown, the easiest way to start and grow your newsletter.