SlideShare a Scribd company logo
1 of 79
Download to read offline
I’VE BEEN HACKED!
SO, NOW WHAT!!
By Néstor Angulo de Ugarte
WordCamp Tokyo 2019 #WCTOKYO
2
こんにちわ!
WHO I AM
• Computer Science Engineer &
Technology consultant
• Photographer & Early
Adopter
• Truly curious guy
• 2015: SUCURI
Incident Response & Easy SSL
• 2019: GoDaddy Spain
Head of IT @ GoDaddy Spain
#WCTokyo 19 Néstor Angulo (@pharar) 3
ABOUT
• Sucuri: Anaconda
(No Securi / Security)
• Website security
• Fully remote (people from > 25 countries
around the world)
• 2008: Foundation
• 2017: Got part of the
GoDaddy family
• Free interesting scanners:
• Sitecheck (sitecheck.sucuri.net)
• Performance (performance.sucuri.net)
4
5
LET’S CONNECT THE DOTS
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA Horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
6
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA Horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
7
CONCEPTS & DISCLAIMER
Some things to be aware first
DISCLAIMER
9
Any sensitive information has been protected/encrypted to preserve privacy.
Any similiarity with real persons or real situations is a coincidence.
I’m responsible of what I say, not what you interpret.
Always ask to an expert.
#WCTokyo 19 Néstor Angulo (@pharar) 10
#WCTokyo 19 Néstor Angulo (@pharar) 11
ハッキングされた企業と、
ハッキングされたことをま
だ知らない企業の2種類があ
ります。
HACKER VS CYBERTERRORIST
12
Hacker:
• Curious person who loves to go
beyond limits or convetionalisms.
Cyberterrorist / Cracker:
• Computer Hacker, whom
intentions are always aligned to enrich
himself in a zero-sum game situation.
• The bad guy / the bad hacker
BAD HACKER VS SECURITY ANALYST
13
THE BAD HACKER:
CYBERCRIMINAL
THE GOOD HACKER:
CRIME SCENE INVESTIGATOR
(CSI) / POLICE
WEB SECURITY
• Cybersecurity:
Security in the digital world
• Web Security:
Field of Cybersecurity
• Covers what happens through
port 80 / 443
14
FACTS
15
Site hacking
almost never
is client-oriented
(98% of cases)
Almost always
happens due to a
deficient monitoring
/ maintenance
Security never is
(nor will be)
100% effective
A SSL certificate
is not
an antihacking shield
Patches & security
updates
appear almost always
after hacking exploits
Errare Humanum
Est
(Human being fails)
WORDPRESS TYPICAL OBJECTIVES
16
USERS INFO DATABASE WEBSITE CONTENT INFRAESTRUCTURE BOT NET REPUTATION
HOW TO HACK A WORDPRESS
Exploit /
vulnerability
Injection
Final code Backdoor
Spam /
defacement
BotNode Final code
17
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
18
AAAARGH!!
NOOOOO!
A.K.A.
The Horror Gallery
DEFACEMENTS
20
DEFACEMENTS
21
22
23
24
25
26
DEFACEMENTS
27
Partial / full replacement of website
frontend.
Very obvious
Easy detection:
Users (hear them!)
Scanners
Objective:
Awareness / social or political revindication
PHISHING
28
PHISHING
29
Login / checkout environment imitation
Sutile
Detection:
Scanners
Blacklists
Objective:
Steal credentials / sensitive information
30
31
32
33
34
BLACK SEO / SPAM
35
36
37
38
39
BLACK HAT SEO
/ SPAM
40
Spam/unwanted content in
your site
Detection:
Scanners (Easy)
Users (hear them!)
Search Engine warnings
Objective:
Affect your SEO
REDIRECTIONS
41
REDIRECTIONS
42
Open unwanted affiliate links to
suspicious websites
Detection:
Scanners (NOT Easy)
Users (hear them!)
Search Engine warnings
Objective:
Affect your SEO or the affiliate
ones
43
44
45
46
CC / LOGIN STEALERS
47
48
CC/LOGIN
STEALER
49
Sensitive information leak
Detection: File integrity
scanner
In EUROPE:
Must report to
Police
GDPR Compliance
DDOS ATTACKS / BOT NETS
50
Situación normal
51
52
53
BOTNETS,
CRYPTOMINERS,
DDOS
54
Affecting to your infraestructure
Detection:
Usually difficult
Strange use of resources
File Integrity Scanner
WAF recommended
Objective:
Your server’s resources or user’s
ones.
To make your site a zombie node
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
55
SO, NOW
WHAT!??
A.K.A.
reactive measures
HIERARCHY AND AGENTS
You
• Owner / Admins
• Developer &
Designer
• Users/clients
Hosting
Provider
• Agent / C3
• Support &
Backups
Security
Expert
• Security
department
• External
services
57
ACTIONS YOU CAN DO
YOURSELVES
58
SCAN
YOUR SITE
• Let’s try to figure out what
happened
• Free scanners:
• sitecheck.sucuri.net
• Blacklisting
• virustotal.com (blacklist)
59
60
CRC: CHECK, REMOVE AND CHANGE
61
Check and Remove
• Unneeded admin users
• Plugins and themes which are
strictly not in use
• Outdated backups
• DEV/TEST sites in your production
server
Change Passwords
• Connections (cPanel, FTP, SSH, …)
• Database (remember to update
your wp-config.php)
• Dashboard (wp-admin)
• Hosting provider
62
RESTORE A BACKUP
• Last option
• You can loose
information
• We not always know
when the infection
begun
63
RESTORE A BACKUP
Do you THINK you
have backups?
64
INDEX
1. Concepts / Disclaimer
2. Aaaargh!!
NOOOOOOOOO!
AKA horror gallery
3. So, now, what???
AKA reactive measures
4. Never ever again!!
AKA proactive measures
65
NEVER
EVER
AGAIN!!
A.K.A.
proactive measures
SECURITY IN LAYERS
You ( the weakest layer )
Your device ( Antivirus )
Your connection ( SSL )
Your website ( WAF )
Your credentials ( Strong Passwords / 2FA )
Your site security ( monitor / updates )
Your server security ( monitor / updates )
Your database ( monitor )
Maintenance tasks
67
MINIMUM
PRIVILEGE
PRINCIPLE
68
“To Caesar, what is
Caesar’s”.
Admin stuff with
admin account.The
rest, with a limited
account
The more
admins,
the more
risk
All user’s
passwords
MUST be
unique and
strong
(better with 2FA
when possible)
Applied to all
layers
(wp-admin, [S]FTP,
cPanel, dashboard,
db, …)
BACKUPS
• Have a backups strategy
• NEVER store the backups in your
production server
• A clean and FUNCTIONAL
backup will be your best friend a
bad day
69
BACKUPS
• Have a backups strategy
• NEVER store the backups in your
production server
• A clean and
backup will be your best friend a
bad day
70
UPDATES
• PLUGINS
• THEMES
• CORE
• PHP
• APACHE / NGINX
• SERVER
• CPANEL / PLESK
• …
71
UPDATE
...
ALWAYS!
REMEMBER TO INVEST IN
72
HOSTING SECURITY
HOSTING
FIRST LAYER OF
YOUR SITE’S DEFENSE
BALANCE BETWEEN
PRICE AND FEATURES
THEY ARE IN CHARGE OF THE
SERVER’S SERVICES, DATABASE
AND MAINTENANCE
73
SHARED HOSTING VS DEDICATED
#WCTokyo 19 Néstor Angulo (@pharar) 74
WAF
YOUR GUARD
DOG
75
Filters all your web traffic
Protects against XSS, DDoS, …
Patchs virtually well known software vulnerabilities
If it includes CDN, your site will improve its speed and
performance
Forensic analisys tool
Allows manual blocking
WAF
YOUR GUARD
DOG
76
Filters all your web traffic
Protects against XSS, DDoS, …
Patchs virtually well known software vulnerabilities
If it includes CDN, your site will improve its speed and
performance
Forensic analisys tool
Allows manual blocking
77
#WCTokyo 19 Néstor Angulo (@pharar) 78
ご質問は?
ありがとうございました!
@pharar #WCTOKYO

More Related Content

Similar to I've been hacked! So, now, what!?

Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.Nestor Angulo de Ugarte
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest Haydn Johnson
 
Software Security : From school to reality and back!
Software Security : From school to reality and back!Software Security : From school to reality and back!
Software Security : From school to reality and back!Peter Hlavaty
 
Building a Modern Security Engineering Organization. Zane Lackey
 Building a Modern Security Engineering Organization. Zane Lackey Building a Modern Security Engineering Organization. Zane Lackey
Building a Modern Security Engineering Organization. Zane LackeyYandex
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Nick Galbreath
 
Hacking - high school intro
Hacking - high school introHacking - high school intro
Hacking - high school introPeter Hlavaty
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoTouhami Kasbaoui
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...AgileNetwork
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Jim Manico
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Adrian Sanabria
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptricagip499
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdfCyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdfRoger Qiu
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Adrian Sanabria
 

Similar to I've been hacked! So, now, what!? (20)

Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.Hacking WordPress... and countermeasures.
Hacking WordPress... and countermeasures.
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Blue team reboot - HackFest
Blue team reboot - HackFest Blue team reboot - HackFest
Blue team reboot - HackFest
 
Super1
Super1Super1
Super1
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 
Software Security : From school to reality and back!
Software Security : From school to reality and back!Software Security : From school to reality and back!
Software Security : From school to reality and back!
 
Building a Modern Security Engineering Organization. Zane Lackey
 Building a Modern Security Engineering Organization. Zane Lackey Building a Modern Security Engineering Organization. Zane Lackey
Building a Modern Security Engineering Organization. Zane Lackey
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013
 
Hacking - high school intro
Hacking - high school introHacking - high school intro
Hacking - high school intro
 
So You Want to be a Hacker?
So You Want to be a Hacker?So You Want to be a Hacker?
So You Want to be a Hacker?
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Blockaudit Presentation
Blockaudit PresentationBlockaudit Presentation
Blockaudit Presentation
 
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdfCyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
CyberSecurity - Future Risks, Zero Trust and the Optus Data Leak.pdf
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
 
Hacking101 delhi 2013
Hacking101 delhi 2013Hacking101 delhi 2013
Hacking101 delhi 2013
 

More from Nestor Angulo de Ugarte

More from Nestor Angulo de Ugarte (7)

¿Cuál es el coste real de un hackeo en web?
¿Cuál es el coste real de un hackeo en web?¿Cuál es el coste real de un hackeo en web?
¿Cuál es el coste real de un hackeo en web?
 
Limpiar Sitios Hackeados
Limpiar Sitios HackeadosLimpiar Sitios Hackeados
Limpiar Sitios Hackeados
 
Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.Hacking WordPress & countermeasures.
Hacking WordPress & countermeasures.
 
Hacking WordPress. El Arte de La Guerra.
Hacking WordPress. El Arte de La Guerra.Hacking WordPress. El Arte de La Guerra.
Hacking WordPress. El Arte de La Guerra.
 
Me han Hackeado... ¿Y ahora qué?
Me han Hackeado... ¿Y ahora qué?Me han Hackeado... ¿Y ahora qué?
Me han Hackeado... ¿Y ahora qué?
 
WordCamp Madrid CSI: El caso de las Backdoors
WordCamp Madrid CSI: El caso de las BackdoorsWordCamp Madrid CSI: El caso de las Backdoors
WordCamp Madrid CSI: El caso de las Backdoors
 
Backdoor: El Bueno, El Feo y el Malo
Backdoor: El Bueno, El Feo y el MaloBackdoor: El Bueno, El Feo y el Malo
Backdoor: El Bueno, El Feo y el Malo
 

Recently uploaded

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

I've been hacked! So, now, what!?