Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Category: Conferences

Our DefCamp 2022 talks are here!

February 1, 2023 Eduard Agavriloae

Both presentations we held this year at DefCamp are now available online (recordings and slides). DefCamp is one of the largest and most important cybersecurity

Continue reading

My first Defcon experience

August 12, 2015 Ionut Popescu

Defcon is a meta-conference which anyone passionate by IT security should attend. It is more than a conference, it is the heaven of hackers and security

Continue reading

NetRipper – Smart traffic sniffing for penetration testers

July 31, 2015 Mihai Gabriel Tanase

Ionut Popescu, Senior Security Consultant @ KPMG Romania has been accepted as speaker at the prestigious DEFCON conference. He will present one of his projects: NetRipper

Continue reading

Hacknet 2015

May 21, 2015 Ionuț Ambrosie

KPMG Europe’s internal information security conference – Hacknet, was held in Berlin and lasted two days, the 29th and the 30th of April. This year,

Continue reading

Top Posts

  • AWS CloudQuarry: Digging for Secrets in Public AMIs
  • Mobile Pentesting 101: How to Install Split APKs
  • AWS ssm:SendCommand or network agnostic built-in RCE as root
  • A Complete Kubernetes Config Review Methodology
  • Introduction to Windows shellcode development - Part 1

Blog Stats

  • 552,865 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 156 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (12)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (24)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 156 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...