Careers & People

8/17/2018
03:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

4th Annual Global Cybersecurity Forum, HackIT 4.0: Exploit Blockchain will be held October 8 11 in Kyiv, Ukraine

Annual Hacken Cup, one - day, onsite bug bounty marathon on October 8

The annual HackIT Cybersecurity Forum is coming up on October 8 – 11 in Kyiv, Ukraine.  HackIT is all about bringing white hat hackers and the blockchain community together.

The annual Hacken Cup – the onsite bug bounty marathon – happens on October 8, with 20 top white hat hackers finding critical vulnerabilities in your client’s or company’s web and mobile applications.   Developer teams can exchange experience with top security researchers, receive a day of offline bug bounty and cybersecurity consulting and one month of online bug bounty at the HackenProof platform: http://bit.ly/2vrEBX3.   Also includes a press conference with media and three tickets to the HackIT forum and VIP afterparty. 

HackIT - is an annual, practical information security related forum where all that’s virtual becomes real.  HackIT 2018 is a 2-day forum devoted to Defense and Attack themes; the main topic for 2018 is Blockchain technology.  Professionals present their latest research and discuss trends at the forum, hackers can win challenges and show their skills, amateurs can learn various disciplines at trainings, and the media can gather valuable material from primary sources.

The Venue facility at Parkovy, Park Road, 16 a, has 1,200 seats, includes one main stage, two secondary halls, an exhibition hall, coffee break lounge and an invite–only afterparty in the VIP lounge.

HackIT is not a boring vendors exhibition.  Meet leading industry experts, learn with practical lessons, develop strategic networking and experience effective insights while spending time with an awesome community.

Speaker Submissions Being Accepted Now

Last year’s (2017) speakers included: Philip R. Zimmerman, Ryan Lackey, Alex Brennen, Yasser Ali and Ebrahim Hegazy.

Speaker submission applications, topics and background are found here: http://bit.ly/2OLPtqM

HackIT 2018 Schedule

 October 8: Hacken Cup – Onsite bug bounty marathon.

October 8: Trainings – Intensive workshop from 10 AM – 6 PM.

October 9: Networking Day – Guided tour to, yes, the Chernobyl nuclear power plant.

October 10 & 11 – Attack Day and Defense Day:

4 Keynotes

32 Speakers in 2018 – no sales pitches or classic horror stories about evil hackers.   Only cutting – edge knowledge.

3 Tracks

Additional activities:

Onsite Capture the Flag,

4 Panel Discussions,

Roundtables and meaningful discussions.

HackIT 2018 provides an exceptional opportunity to meet all of these people in one place, including:

White hat hackers – highly skilled security researchers,

Leading cybersecurity companies – Industry leaders, including CEO’s, COO’s, CFO’s, CSIO’s and CIO’s,

Blockchain pioneers – Engineers, developers and enthusiasts,

Top tech bloggers – Prominent influencers,

Crypto company executives – CEO’s, CIO’S & CSIO’S,

Smart Contract Auditors – Industry leaders from top companies.

 

Registration and tickets are available here: http://bit.ly/2AKybYe

HackIT is powered by Hacken.io and supported by Fenbushi Digital.

 

# # #

About Hacken.io

Hacken, http://bit.ly/2AKybYe, is a decentralized custom-tailored platform that provides the entire scope of cybersecurity services. With headquarters in Estonia, Tallinn, it has more than 50 employees around the world and its R & D center located in Kyiv, Ukraine.  Hacken's mission is to improve the overall cybersecurity standards around the globe. With this in mind, the company represents a wide range of products in order to effectively meet customer demand. 

 

About Fenbushi Digital

Fenbushi Digital’s mission is to support the world’s smartest minds leveraging blockchain and decentralization technologies to reshape the future.  Led by a team of the earliest and most influential blockchain pioneers, Fenbushi Digital serves as an active, long term strategic partner to its portfolio projects.  

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/12/2019
Box Mistakes Leave Enterprise Data Exposed
Dark Reading Staff 3/12/2019
How the Best DevSecOps Teams Make Risk Visible to Developers
Ericka Chickowski, Contributing Writer, Dark Reading,  3/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: LOL  Hope this one wins
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.