SlideShare a Scribd company logo
1 of 79
Download to read offline
HackingWordPress
… and countermeasures
Nestor Angulo (@pharar) - WordCamp Vienna 2020
#WCVIE Nestor Angulo (@pharar) - 2020 2
Who I am
–A curious guy
… sometimes even more than a cat
–Computer Science degree &Techonology Advisor
–2015
Ø Security Analyst @ Sucuri
–2017
Ø ATS & Managed SSL specialist @ GoDaddy
(Security Group)
–2019
Ø Interim Head of IT @ GoDaddy Spain
#WCVIE Nestor Angulo (@pharar) - 2020 3
About
– Sucuri: Anaconda !( Securi | Security )
– Website security
– Fully remote (people from > 25 countries)
– 2008: Founded
– 2017: GoDaddy family proud member
– Free scanners:
– Sitecheck
sitecheck.sucuri.net
– Performance
performance.sucuri.net
#WCVIE Nestor Angulo (@pharar) - 2020 4
DISCLAIMER
#WCVIE Nestor Angulo (@pharar) - 2020 5
Any sensitive information has been protected or
encoded to preserve privacy. Any similarity with the
reality is just a coincidence.
I’m responsible of what I say, not what you interpret.
This talk is intended to be DIDACTIC. I don’t promote
any hacking attempt with illegal intentions.
Always ask to an expert if you have questions.
#WCVIE Nestor Angulo (@pharar) - 2020 6
Es gibt zwei Arten von
Unternehmen:
diejenigen, die gehackt wurden,
und diejenigen, die noch nicht
wissen, dass sie gehackt
wurden.
#WCVIE Nestor Angulo (@pharar) - 2020 7
TheArt ofWar
#WCVIE Nestor Angulo (@pharar) - 2020 8
TheArt ofWar
– Chinese treatise about military
strategies and tactics, by SunTzu
(5th century)
– “If you know yourself and you
also know your enemy, you
won’t be defeated in any battle”
– “All warfare is based on
deception”
#WCVIE Nestor Angulo (@pharar) - 2020 9
About the
atackers
… AKA hated angels.
… AKA loved demons.
#WCVIE Nestor Angulo (@pharar) - 2020 10
Hacker VS
Cyberterrorist
#WCVIE Nestor Angulo (@pharar) - 2020 11
Hacker:
Curious person who loves
to go beyond limits or
conventions.
Cyberterrorist / Cracker:
Computer Hacker, aligned to enrich
himself in a zero-sum game situation.
The bad guy
#WCVIE Nestor Angulo (@pharar) - 2020 12
Hacker HatColours
ØBlack Hat
Cyberterrorist, thief
ØGrey Hat
White Hat one using
illegal procedures
ØWhite Hat
Security Analyst,
ethical hacker
How
Security
works
… I mean, in the DigitalWorld
#WCVIE Nestor Angulo (@pharar) - 2020 13
#WCVIE Nestor Angulo (@pharar) - 2020 14
Layer-basedSecurity simplified Model
Layer Protection
You, the weakest point Knowledge
Your device Antivirus
Your connection SSL
Your web site WAF
Your credentials Strong passwords, 2FA
Your site security monitor, plugins, updates
Your server security monitor, sysadmin, updates
Your database monitor, sysadmin
Maintenance tasks
Protect
yourCastle!
…Wait, do I actually own a
Castle?
#WCVIE Nestor Angulo (@pharar) - 2020 15
#WCVIE Nestor Angulo (@pharar) - 2020 16
YourCastle
#WCVIE Nestor Angulo (@pharar) - 2020
USERS DATABASE CONTENT
INFRASTRUCTURE BOT NET REPUTATION
17
Build a
greatWall!
…Well, what is ”great” for
you?
#WCVIE Nestor Angulo (@pharar) - 2020 18
YourWall
#WCVIE Nestor Angulo (@pharar) - 2020 19
Antivirus
SSL certificate
WAF
Passwords
Monitors & Scanners
Updates
Plugins &Themes
Every wall
has holes…
… AKA weak points
#WCVIE Nestor Angulo (@pharar) - 2020 20
The
Weaknesses
…some examples.
– You are your weakest point
– You can be scammed
– Passwords.
– Vulnerable to brute force attacks
– Leftovers
– Ex: Admin users, FTP users, db dumps, etc.
– Outdated/vulnerable software
– Enabled/Disabled not-in-use plugins/themes
– Non-secure connection (avoid public wifi)
– Vulnerable to Man-In-the-Middle attacks
#WCVIE Nestor Angulo (@pharar) - 2020 21
The tools
… AKA weapons
#WCVIE Nestor Angulo (@pharar) - 2020 22
Malware
Some types
Backdoors,
zero-day
Exploits
Troyans,
Fremium
plugins
Ransom-
ware,
Spyware
Adware,
Scareware
…
Software intentionally designed to
cause damage to a computer, client,
or computer network.
#WCVIE Nestor Angulo (@pharar) - 2020 23
Definitions
–Vulnerability
–Bug in the code or posibility of misuse
that can be used to perform
unauthorized actions within a
computer system.
–Exploit
–Software that leverages a vulnerability
–Backdoor
–Malware which allows remote
execution of code
#WCVIE Nestor Angulo (@pharar) - 2020 24
Some facts
… let’s blow your mind!
#WCVIE Nestor Angulo (@pharar) - 2020 25
Site hacking
almost never is
client-oriented
(98% of cases)
Almost always
happens due to a
deficient monitoring
/ maintenance
A SSL certificate
is not
an antihacking shield
Patches & security
updates appear
almost always after
hacking exploits
Errare Humanum Est
(Human being fails)
Security never is
(nor will be)
100% effective
#WCVIE Nestor Angulo (@pharar) - 2020 26
Then…
is WordPress secure?
#WCVIE Nestor Angulo (@pharar) - 2020 27
#WCVIE Nestor Angulo (@pharar) - 2020 28
Yes
At least, the most it can be.
#WCVIE Nestor Angulo (@pharar) - 2020 29
The problem is that…
… is extremely easy to create
an insecure site with WordPress
#WCVIE Nestor Angulo (@pharar) - 2020 30
The Hacking
How it happens.
#WCVIE Nestor Angulo (@pharar) - 2020 32
The Process
#WCVIE Nestor Angulo (@pharar) - 2020 33
Vulnerability Exploit Injection
Final Code Backdoor
Spam /
defacement
BotNode Code
#WCVIE Nestor Angulo (@pharar) - 2020 34
Searching the
vulnerability
#WCVIE Nestor Angulo (@pharar) - 2020 35
GoogleHacking
Database
exploit-db.com/
google-hacking-
database
#WCVIE Nestor Angulo (@pharar) - 2020 36
WPScan
Vulnerability
Database
wpvulndb.com
#WCVIE Nestor Angulo (@pharar) - 2020 37
Ex1:Using
Google
Hacking DB
38#WCVIE Nestor Angulo (@pharar) - 2020
Ex1:Using
Google
Hacking DB
39#WCVIE Nestor Angulo (@pharar) - 2020
Ex2:Using
WPVULNDB
40#WCVIE Nestor Angulo (@pharar) - 2020
Ex2:Using
WPVULNDB
41#WCVIE Nestor Angulo (@pharar) - 2020
Ex3:Using
WPVULNDB
42#WCVIE Nestor Angulo (@pharar) - 2020
Ex3:UsingWPVULNDB
ØThe WordPress REST API got
activated by default in 4.7.0 and
4.7.1 version.
ØBug: any visitor can modify any post
without permissions.
ØHundreds of thousands sites got
exploited using this vulnerability
because they didn’t updated.
43#WCVIE Nestor Angulo (@pharar) - 2020
Ex3:Using
WPVULNDB
44#WCVIE Nestor Angulo (@pharar) - 2020
What
happens
if…
#WCVIE Nestor Angulo (@pharar) - 2020 45
Defacements
#WCVIE Nestor Angulo (@pharar) - 2020 46
Defacements
#WCVIE Nestor Angulo (@pharar) - 2020 47
Example:
PhotographerGallery
#WCVIE Nestor Angulo (@pharar) - 2020 48
#WCVIE Nestor Angulo (@pharar) - 2020 49
#WCVIE Nestor Angulo (@pharar) - 2020 50
#WCVIE Nestor Angulo (@pharar) - 2020 51
#WCVIE Nestor Angulo (@pharar) - 2020 52
Black HatSEO
#WCVIE Nestor Angulo (@pharar) - 2020 53
#WCVIE Nestor Angulo (@pharar) - 2020 54
#WCVIE Nestor Angulo (@pharar) - 2020 55
#WCVIE Nestor Angulo (@pharar) - 2020 56
#WCVIE Nestor Angulo (@pharar) - 2020 57
DDoSAttacks /
BotNets
#WCVIE Nestor Angulo (@pharar) - 2020 58
Normal, tending to calm
#WCVIE Nestor Angulo (@pharar) - 2020 59
#WCVIE Nestor Angulo (@pharar) - 2020 60
#WCVIE Nestor Angulo (@pharar) - 2020 61
Countermeasures
Reactive vs Proactive
Characters in theStory
(if something happens)
#WCVIE Nestor Angulo (@pharar) - 2020 63
You
• Owner /
Admins
• Developer &
Designer
• Users/clients
Hosting
Provider
• Agent / C3
• Support &
Backups
Security
Expert
• Security
department
• External
services
Measures:
Reactive vs
Proactive
#WCVIE Nestor Angulo (@pharar) - 2020 64
Reactive:
When bad things have
already happened
Pain mitigation
Proactive:
Before anything bad
happens
Risk mitigation
Reactive
measures
#WCVIE Nestor Angulo (@pharar) - 2020 65
Scan your site:
Status:
sitecheck.sucuri.net
Blacklist: virustotal.com
CRC: Check, Remove and Change
Update
Restore a backup
66
#WCVIENestorAngulo(@pharar)-2020
Proactive
measures
#WCVIE Nestor Angulo (@pharar) - 2020 67
Reduce admins, plugins and themes
Backups
Updates
Invest in Hosting & Security
WAF
BACKUPS
#WCVIE Nestor Angulo (@pharar) - 2020 68
Have a backups strategy
NEVER store the backups in your
production server
A clean and FUNCTIONAL backup will be
your best friend a bad day
Updates
– PLUGINS
– THEMES
– CORE
– PHP
– APACHE / NGINX
– SERVER
– CPANEL / PLESK
– …
#WCVIE Nestor Angulo (@pharar) - 2020 69
Updates
#WCVIE Nestor Angulo (@pharar) - 2020 70
Source:
Web Professional
Security Survey 2019
sucuri.net
Remember to
invest in…
#WCVIE Nestor Angulo (@pharar) - 2020 71
SECURITY HOSTING
Hosting
#WCVIE Nestor Angulo (@pharar) - 2020 72
FIRST LAYER OF
YOUR SITE’S DEFENSE
BALANCE BETWEEN
PRICE AND FEATURES
THEY ARE IN CHARGE OF
THE SERVER’S SERVICES,
DATABASE AND
MAINTENANCE
Shared hosting vs dedicated
#WCVIENestorAngulo(@pharar)-2020
73
Source:
2019Sucuri
survey to
ecommerce
owners.
#WCVIE Nestor Angulo (@pharar) - 2020 74
WAF
Your guard dog
FILTERS ALLYOUR
WEBTRAFFIC
PROTECTS AGAINST
XSS, DDOS, …
PATCHSVIRTUALLY WIDELY
KNOWN SOFTWARE
VULNERABILITIES
IF IT INCLUDES CDN,
IMPROVESYOUR SITE’S
SPEED & PERFORMANCE
FORENSIC ANALISYS
TOOL
ALLOWS MANUAL
BLOCKING
#WCVIE Nestor Angulo (@pharar) - 2020 75
WAF
Your guard dog
FILTERS ALLYOUR
WEBTRAFFIC
PROTECTS AGAINST
XSS, DDOS, …
PATCHSVIRTUALLY WIDELY
KNOWN SOFTWARE
VULNERABILITIES
IF IT INCLUDES CDN,
IMPROVESYOUR SITE’S
SPEED & PERFORMANCE
FORENSIC ANALISYS
TOOL
ALLOWS MANUAL
BLOCKING
#WCVIE Nestor Angulo (@pharar) - 2020 76
#WCVIE Nestor Angulo (@pharar) - 2020 77
#WCVIE Nestor Angulo (@pharar) - 2020 78
Danke schön!
Fragen?
79
@pharar
Nestor Angulo de Ugarte

More Related Content

Similar to Hacking WordPress & countermeasures.

The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017Saumil Shah
 
2016: The Infosec Crossroads - Keynote at Intuit #Hacktober2015
2016: The Infosec Crossroads - Keynote at Intuit #Hacktober20152016: The Infosec Crossroads - Keynote at Intuit #Hacktober2015
2016: The Infosec Crossroads - Keynote at Intuit #Hacktober2015Saumil Shah
 
RSA 2019 - Palo Alto Networks - 99+ Security tools and yet you still got brea...
RSA 2019 - Palo Alto Networks - 99+ Security tools and yet you still got brea...RSA 2019 - Palo Alto Networks - 99+ Security tools and yet you still got brea...
RSA 2019 - Palo Alto Networks - 99+ Security tools and yet you still got brea...Sujeet Rane
 
How to hack. Cyprus meetup
How to hack. Cyprus meetupHow to hack. Cyprus meetup
How to hack. Cyprus meetupIvan Novikov
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)Caston Thomas
 
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Santhosh Tuppad
 
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent TrackingG. S. McNamara
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOVHcloud
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Gohsuke Takama
 
Security Theatre - Benelux
Security Theatre - BeneluxSecurity Theatre - Benelux
Security Theatre - Beneluxxsist10
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014viaForensics
 
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsSecurity workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsCynthia Calongne
 
Wireless mouse hacking 2600 thailand
Wireless mouse hacking 2600 thailandWireless mouse hacking 2600 thailand
Wireless mouse hacking 2600 thailandKeerati Torach
 
How to prevent cyber terrorism taragana
How to prevent cyber terrorism  taraganaHow to prevent cyber terrorism  taragana
How to prevent cyber terrorism taraganaGilles Sgro
 
The Seven Axioms Of Security
The Seven Axioms Of SecurityThe Seven Axioms Of Security
The Seven Axioms Of SecuritySaumil Shah
 
How to build Big Brother
How to build Big BrotherHow to build Big Brother
How to build Big BrotherPayment Village
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
The Infosec Crossroads - 44CON 2016
The Infosec Crossroads - 44CON 2016The Infosec Crossroads - 44CON 2016
The Infosec Crossroads - 44CON 2016Saumil Shah
 
Data transfer security for mobile apps
Data transfer security for mobile appsData transfer security for mobile apps
Data transfer security for mobile appsStanfy
 

Similar to Hacking WordPress & countermeasures. (20)

The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017
 
2016: The Infosec Crossroads - Keynote at Intuit #Hacktober2015
2016: The Infosec Crossroads - Keynote at Intuit #Hacktober20152016: The Infosec Crossroads - Keynote at Intuit #Hacktober2015
2016: The Infosec Crossroads - Keynote at Intuit #Hacktober2015
 
RSA 2019 - Palo Alto Networks - 99+ Security tools and yet you still got brea...
RSA 2019 - Palo Alto Networks - 99+ Security tools and yet you still got brea...RSA 2019 - Palo Alto Networks - 99+ Security tools and yet you still got brea...
RSA 2019 - Palo Alto Networks - 99+ Security tools and yet you still got brea...
 
How to hack. Cyprus meetup
How to hack. Cyprus meetupHow to hack. Cyprus meetup
How to hack. Cyprus meetup
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
 
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattack
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
I've been hacked! So, now, what!?
I've been hacked! So, now, what!?I've been hacked! So, now, what!?
I've been hacked! So, now, what!?
 
Security Theatre - Benelux
Security Theatre - BeneluxSecurity Theatre - Benelux
Security Theatre - Benelux
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
 
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsSecurity workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
 
Wireless mouse hacking 2600 thailand
Wireless mouse hacking 2600 thailandWireless mouse hacking 2600 thailand
Wireless mouse hacking 2600 thailand
 
How to prevent cyber terrorism taragana
How to prevent cyber terrorism  taraganaHow to prevent cyber terrorism  taragana
How to prevent cyber terrorism taragana
 
The Seven Axioms Of Security
The Seven Axioms Of SecurityThe Seven Axioms Of Security
The Seven Axioms Of Security
 
How to build Big Brother
How to build Big BrotherHow to build Big Brother
How to build Big Brother
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
The Infosec Crossroads - 44CON 2016
The Infosec Crossroads - 44CON 2016The Infosec Crossroads - 44CON 2016
The Infosec Crossroads - 44CON 2016
 
Data transfer security for mobile apps
Data transfer security for mobile appsData transfer security for mobile apps
Data transfer security for mobile apps
 

More from Nestor Angulo de Ugarte

More from Nestor Angulo de Ugarte (6)

¿Cuál es el coste real de un hackeo en web?
¿Cuál es el coste real de un hackeo en web?¿Cuál es el coste real de un hackeo en web?
¿Cuál es el coste real de un hackeo en web?
 
Limpiar Sitios Hackeados
Limpiar Sitios HackeadosLimpiar Sitios Hackeados
Limpiar Sitios Hackeados
 
Hacking WordPress. El Arte de La Guerra.
Hacking WordPress. El Arte de La Guerra.Hacking WordPress. El Arte de La Guerra.
Hacking WordPress. El Arte de La Guerra.
 
Me han Hackeado... ¿Y ahora qué?
Me han Hackeado... ¿Y ahora qué?Me han Hackeado... ¿Y ahora qué?
Me han Hackeado... ¿Y ahora qué?
 
WordCamp Madrid CSI: El caso de las Backdoors
WordCamp Madrid CSI: El caso de las BackdoorsWordCamp Madrid CSI: El caso de las Backdoors
WordCamp Madrid CSI: El caso de las Backdoors
 
Backdoor: El Bueno, El Feo y el Malo
Backdoor: El Bueno, El Feo y el MaloBackdoor: El Bueno, El Feo y el Malo
Backdoor: El Bueno, El Feo y el Malo
 

Recently uploaded

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Recently uploaded (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Hacking WordPress & countermeasures.