Please enable JavaScript to use this page!

AllTalks site logo
πŸ”

#security

YaTalks

28 min

DDoS-Π°Ρ‚Π°ΠΊΠ° MΔ“ris ΠΈ ΠΊΠ°ΠΊ ЯндСкс Π΅Ρ‘ ΠΏΠ΅Ρ€Π΅ΠΆΠΈΠ»

Π”ΠΌΠΈΡ‚Ρ€ΠΈΠΉ Носов

ΠšΠ°ΠΆΠ΅Ρ‚ΡΡ, Ρ‡Ρ‚ΠΎ ΡƒΠΆΠ΅ всС ΡΠ»Ρ‹ΡˆΠ°Π»ΠΈ ΠΎ самой ΠΌΠ°ΡΡˆΡ‚Π°Π±Π½ΠΎΠΉ DDoS-Π°Ρ‚Π°ΠΊΠ΅ Π² истории ΠΈΠ½Ρ‚Π΅Ρ€Π½Π΅Ρ‚Π° β€” MΔ“ris. ΠžΡ‡Π΅Π½ΡŒ ΠΌΠ½ΠΎΠ³ΠΎΠ΅ Π² этой истории ΠΏΠΎΠΊΠ° Π΅Ρ‰Ρ‘ ΠΏΡ€ΠΎΡ…ΠΎΠ΄ΠΈΡ‚ Β«ΠΏΠΎΠ΄ Π³Ρ€ΠΈΡ„ΠΎΠΌ сСкрСтно». Но сСйчас ΠΌΡ‹ Π³ΠΎΡ‚ΠΎΠ²Ρ‹ ΠΏΠΎΠ΄Π΅Π»ΠΈΡ‚ΡŒΡΡ большой час…

TechTrain

67 min

Π­Π²ΠΎΠ»ΡŽΡ†ΠΈΡ способов сохранСния ΠΊΠΎΠ½Ρ„ΠΈΠ΄Π΅Π½Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠΉ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ Π² сСкрСтС

АлСксандра Калинина

ΠšΠ°ΠΆΠ΄Ρ‹ΠΉ программист Π² своСй ΠΆΠΈΠ·Π½ΠΈ встрСчаСтся с ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠ΅ΠΉ, ΠΊΠΎΡ‚ΠΎΡ€ΡƒΡŽ Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΠΎ Π΄Π΅Ρ€ΠΆΠ°Ρ‚ΡŒ Π² сСкрСтС: ΠΏΠ°Ρ€ΠΎΠ»ΠΈ ΠΊ ΡƒΡ‡Π΅Ρ‚ΠΊΠ°ΠΌ, сСкрСтныС ΠΊΠ»ΡŽΡ‡ΠΈ доступа, CVV ΠΊΠΎΠ΄ ΠΎΡ‚ ΠΊΠ°Ρ€Ρ‚ΠΎΡ‡ΠΊΠΈ, Π² ΠΊΠΎΠ½Ρ†Π΅ ΠΊΠΎΠ½Ρ†ΠΎΠ². Однако Π½Π΅ ΠΊΠ°ΠΆΠ΄Ρ‹ΠΉ сраз…

MinskJS

20 min

БСзопасный input. Π‘Π±ΠΎΡ€ Π΄Π°Π½Π½Ρ‹Ρ… пластиковой ΠΊΠ°Ρ€Ρ‚Ρ‹ Π² iframe

Π­Π΄ΡƒΠ°Ρ€Π΄ Π’ΠΈΡ‚ΠΎΠ²

Β«Π”ΠΎΠΊΠ»Π°Π΄ ΠΎΠ± отрисовкС Ρ„ΠΎΡ€ΠΌΡ‹ Π² iframeΒ», β€” скаТСтС Π²Ρ‹. И Π΄Π°, ΠΈ Π½Π΅Ρ‚. Π‘ΡƒΠ΄Π΅Ρ‚ Π½Π΅ Ρ‚ΠΎΠ»ΡŒΠΊΠΎ Ρ„ΠΎΡ€ΠΌΠ°, Π΄Π° ΠΈ iframe Π±ΡƒΠ΄Π΅Ρ‚ Π½Π΅ ΠΎΠ΄ΠΈΠ½, ΠΏΠΎΡΠΊΠΎΠ»ΡŒΠΊΡƒ ΠΎΡ‚Ρ€ΠΈΡΠΎΠ²Π°Ρ‚ΡŒ Ρ„ΠΎΡ€ΠΌΡƒ β€” это Π΄Π°Π»Π΅ΠΊΠΎ Π½Π΅ всё. Π’Ρ‹ ΡƒΠ·Π½Π°Π΅Ρ‚Π΅, Ρ‡Ρ‚ΠΎ Π½ΡƒΠΆΠ½ΠΎ ΡΠ΄Π΅Π»Π°Ρ‚ΡŒ для бС…

AWS re:Invent

59 min

Security best practices for the Amazon EC2 instance metadata service

Mark Ryland

The Amazon EC2 instance metadata service (IMDS) provides a rich set of relevant data to software on that instance. The IMDS ability to perform introspection about the runtime environment, as well as …

AWS re:Invent

50 min

Provable access control: Know who can access your AWS resources

Neha Rungta, Eric Brandwin

The AWS Automated Reasoning Group focuses on strengthening the security foundations of AWS and provides customers with tools to verify their own security posture. In this session, we discuss the evol…

NDC DevOps

58 min

Top Secret Cloud Native Security Lessons

Ben Hall

Cloud native technologies such as Kubernetes, Docker, Istio and more are becoming the foundations of software development and infrastructure deployments. With these new technologies, a new set of les…

JSConf Budapest

23 min

StrangerDanger: Finding Security Vulnerabilities Before They Find You!

Liran Tal

Open source modules on the NPM ecosystem are undoubtedly awesome. However, they also represent an undeniable and massive risk. You’re introducing someone else’s code into your system, often with litt…

DotNext

49 min

Deserialization vulns: past, present, and future

ΠœΠΈΡ…Π°ΠΈΠ» Π©Π΅Ρ€Π±Π°ΠΊΠΎΠ²

ЭкспСрт ΠΈΠ· ΠΌΠΈΡ€Π° security вновь расскаТСт, ΠΊΠ°ΠΊ Ρ‚Π°ΠΌ опасно ΠΈ Ρ‡Ρ‚ΠΎ с этим Π΄Π΅Π»Π°Ρ‚ΡŒ. Уязвимости Π² процСссС дСсСриализации Π½Π΅Π΄ΠΎΠ²Π΅Ρ€Π΅Π½Π½Ρ‹Ρ… Π΄Π°Π½Π½Ρ‹Ρ… извСстны Π±ΠΎΠ»Π΅Π΅ 10 Π»Π΅Ρ‚, Π²ΠΊΠ»ΡŽΡ‡Π΅Π½Ρ‹ Π² OWASP Top 10 ΠΈ Π·Π° послСдниС н…