August 13, 2019
[44Con Announce] Help Those That Need It With 44CON
|IF:MC_PREVIEW_TEXT|
[if !gte mso 9]>|MC_PREVIEW_TEXT|
|
|
Try viewing this email in your browser |
|
|
end header bar
header left
|
|
|
Help Someone In Need Into Industry |
|
Do you know someone who's life would be transformed by a cybersecurity career, but needs a hand? Our assistance programme is open now. 13 successful applicants will receive a 44CON ticket, a hotel room for the conference and meet our sponsors to discuss career opportunities. Applications close on the 20th of August. |
|
|
|
|
|
|
|
David Korczynski's State Of Code Injection Post |
|
ADALogics' David Korczynski delivers a technical overview of the current state of code injection techniques, from CreateRemoteThread to Ghostwriting, Atom Bombing and PROPagate. |
|
|
|
|
Enjoy the Blog Post? Check out the course! |
|
This September, David is teaching a 3-day course on Code Injection from beginner to advanced. The course provides everything you need to implement and defend against code injection techniques. |
|
|
|
|
|
|
|
|
Thanks To All Our Sponsors! |
|
44CON Wouldn't happen if it wasn't for our sponsors. Make sure you pick up your sponsor passport with your ticket and say hello. We'll highlight more next week. Click here to see all our sponsors, and for info on sponsor opportunities. |
|
|
|
|
|
|
|
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. |
|
|
|
|
|
|
|
2T Security |
|
2T Security provides expert client-side advice, with specialists who help solve the difficult security problems faced by our clients.
|
|
|
|
|
SpectX |
|
Unlimited volume lightning-fast data analytics software. Just download and point SpectX to your data and find out what’s really going on!
|
|
|
|
|
Microsoft |
|
As a leader in cloud-enabled applications and infrastructure, Microsoft is by necessity also a leader in cybersecurity.
|
|
|
|
|
|
|
|
|
Talks We've Loved |
|
We're adding talks to our 44CON TV YouTube channel every weekday. Here are a couple of talks we think you'll enjoy. |
|
|
|
|
Old Dog, New Tricks: PowerShell Forensics |
|
|
80 minutes of practical tips, tricks and techniques for conducting forensics using PowerShell from Jared Atkinson. What's not to love? |
|
|
|
|
|
|
|
|
|
Hunting Asynchronous Vulnerabilities |
|
|
Portswigger's James Kettle dives into callback abuse and other asynchronous web bugs. |
|
|
|
|
|
|
|
end header left
1/2 right 1
end 1/2 right 1
1/2 left 1
end 1/2 left 1
cta
end cta
headline
end headline
1/1 panel
end 1/1 panel
2/2 content
end 2/2 content
3/3 content
end 3/3 content
2/2 panel
end 2/2 panel
3/3 panel
end 3/3 panel
profile
end profile
contact
end contact
1/2 left 2
end 1/2 left 2
1/2 right 2
end 1/2 right 2
header right
end header right
content right
end content right
content left
end content left
quote
end quote
1/3 left
end 1/3 left
1/3 right
end 1/3 right
1/1 content
end 1/1 content
footer