Careers & People

8/17/2018
03:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

4th Annual Global Cybersecurity Forum, HackIT 4.0: Exploit Blockchain will be held October 8 11 in Kyiv, Ukraine

Annual Hacken Cup, one - day, onsite bug bounty marathon on October 8

The annual HackIT Cybersecurity Forum is coming up on October 8 – 11 in Kyiv, Ukraine.  HackIT is all about bringing white hat hackers and the blockchain community together.

The annual Hacken Cup – the onsite bug bounty marathon – happens on October 8, with 20 top white hat hackers finding critical vulnerabilities in your client’s or company’s web and mobile applications.   Developer teams can exchange experience with top security researchers, receive a day of offline bug bounty and cybersecurity consulting and one month of online bug bounty at the HackenProof platform: http://bit.ly/2vrEBX3.   Also includes a press conference with media and three tickets to the HackIT forum and VIP afterparty. 

HackIT - is an annual, practical information security related forum where all that’s virtual becomes real.  HackIT 2018 is a 2-day forum devoted to Defense and Attack themes; the main topic for 2018 is Blockchain technology.  Professionals present their latest research and discuss trends at the forum, hackers can win challenges and show their skills, amateurs can learn various disciplines at trainings, and the media can gather valuable material from primary sources.

The Venue facility at Parkovy, Park Road, 16 a, has 1,200 seats, includes one main stage, two secondary halls, an exhibition hall, coffee break lounge and an invite–only afterparty in the VIP lounge.

HackIT is not a boring vendors exhibition.  Meet leading industry experts, learn with practical lessons, develop strategic networking and experience effective insights while spending time with an awesome community.

Speaker Submissions Being Accepted Now

Last year’s (2017) speakers included: Philip R. Zimmerman, Ryan Lackey, Alex Brennen, Yasser Ali and Ebrahim Hegazy.

Speaker submission applications, topics and background are found here: http://bit.ly/2OLPtqM

HackIT 2018 Schedule

 October 8: Hacken Cup – Onsite bug bounty marathon.

October 8: Trainings – Intensive workshop from 10 AM – 6 PM.

October 9: Networking Day – Guided tour to, yes, the Chernobyl nuclear power plant.

October 10 & 11 – Attack Day and Defense Day:

4 Keynotes

32 Speakers in 2018 – no sales pitches or classic horror stories about evil hackers.   Only cutting – edge knowledge.

3 Tracks

Additional activities:

Onsite Capture the Flag,

4 Panel Discussions,

Roundtables and meaningful discussions.

HackIT 2018 provides an exceptional opportunity to meet all of these people in one place, including:

White hat hackers – highly skilled security researchers,

Leading cybersecurity companies – Industry leaders, including CEO’s, COO’s, CFO’s, CSIO’s and CIO’s,

Blockchain pioneers – Engineers, developers and enthusiasts,

Top tech bloggers – Prominent influencers,

Crypto company executives – CEO’s, CIO’S & CSIO’S,

Smart Contract Auditors – Industry leaders from top companies.

 

Registration and tickets are available here: http://bit.ly/2AKybYe

HackIT is powered by Hacken.io and supported by Fenbushi Digital.

 

# # #

About Hacken.io

Hacken, http://bit.ly/2AKybYe, is a decentralized custom-tailored platform that provides the entire scope of cybersecurity services. With headquarters in Estonia, Tallinn, it has more than 50 employees around the world and its R & D center located in Kyiv, Ukraine.  Hacken's mission is to improve the overall cybersecurity standards around the globe. With this in mind, the company represents a wide range of products in order to effectively meet customer demand. 

 

About Fenbushi Digital

Fenbushi Digital’s mission is to support the world’s smartest minds leveraging blockchain and decentralization technologies to reshape the future.  Led by a team of the earliest and most influential blockchain pioneers, Fenbushi Digital serves as an active, long term strategic partner to its portfolio projects.  

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard Technologies,  1/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.