Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

8/17/2018
03:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

4th Annual Global Cybersecurity Forum, HackIT 4.0: Exploit Blockchain will be held October 8 11 in Kyiv, Ukraine

Annual Hacken Cup, one - day, onsite bug bounty marathon on October 8

The annual HackIT Cybersecurity Forum is coming up on October 8 – 11 in Kyiv, Ukraine.  HackIT is all about bringing white hat hackers and the blockchain community together.

The annual Hacken Cup – the onsite bug bounty marathon – happens on October 8, with 20 top white hat hackers finding critical vulnerabilities in your client’s or company’s web and mobile applications.   Developer teams can exchange experience with top security researchers, receive a day of offline bug bounty and cybersecurity consulting and one month of online bug bounty at the HackenProof platform: http://bit.ly/2vrEBX3.   Also includes a press conference with media and three tickets to the HackIT forum and VIP afterparty. 

HackIT - is an annual, practical information security related forum where all that’s virtual becomes real.  HackIT 2018 is a 2-day forum devoted to Defense and Attack themes; the main topic for 2018 is Blockchain technology.  Professionals present their latest research and discuss trends at the forum, hackers can win challenges and show their skills, amateurs can learn various disciplines at trainings, and the media can gather valuable material from primary sources.

The Venue facility at Parkovy, Park Road, 16 a, has 1,200 seats, includes one main stage, two secondary halls, an exhibition hall, coffee break lounge and an invite–only afterparty in the VIP lounge.

HackIT is not a boring vendors exhibition.  Meet leading industry experts, learn with practical lessons, develop strategic networking and experience effective insights while spending time with an awesome community.

Speaker Submissions Being Accepted Now

Last year’s (2017) speakers included: Philip R. Zimmerman, Ryan Lackey, Alex Brennen, Yasser Ali and Ebrahim Hegazy.

Speaker submission applications, topics and background are found here: http://bit.ly/2OLPtqM

HackIT 2018 Schedule

 October 8: Hacken Cup – Onsite bug bounty marathon.

October 8: Trainings – Intensive workshop from 10 AM – 6 PM.

October 9: Networking Day – Guided tour to, yes, the Chernobyl nuclear power plant.

October 10 & 11 – Attack Day and Defense Day:

4 Keynotes

32 Speakers in 2018 – no sales pitches or classic horror stories about evil hackers.   Only cutting – edge knowledge.

3 Tracks

Additional activities:

Onsite Capture the Flag,

4 Panel Discussions,

Roundtables and meaningful discussions.

HackIT 2018 provides an exceptional opportunity to meet all of these people in one place, including:

White hat hackers – highly skilled security researchers,

Leading cybersecurity companies – Industry leaders, including CEO’s, COO’s, CFO’s, CSIO’s and CIO’s,

Blockchain pioneers – Engineers, developers and enthusiasts,

Top tech bloggers – Prominent influencers,

Crypto company executives – CEO’s, CIO’S & CSIO’S,

Smart Contract Auditors – Industry leaders from top companies.

 

Registration and tickets are available here: http://bit.ly/2AKybYe

HackIT is powered by Hacken.io and supported by Fenbushi Digital.

 

# # #

About Hacken.io

Hacken, http://bit.ly/2AKybYe, is a decentralized custom-tailored platform that provides the entire scope of cybersecurity services. With headquarters in Estonia, Tallinn, it has more than 50 employees around the world and its R & D center located in Kyiv, Ukraine.  Hacken's mission is to improve the overall cybersecurity standards around the globe. With this in mind, the company represents a wide range of products in order to effectively meet customer demand. 

 

About Fenbushi Digital

Fenbushi Digital’s mission is to support the world’s smartest minds leveraging blockchain and decentralization technologies to reshape the future.  Led by a team of the earliest and most influential blockchain pioneers, Fenbushi Digital serves as an active, long term strategic partner to its portfolio projects.  

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How Security Vendors Can Address the Cybersecurity Talent Shortage
Rob Rashotte, VP of Global Training and Technical Field Enablement at Fortinet,  5/24/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .