Neurosoft
  • CYBER
  • TECHNOLOGY
  • FIELD
  • INVESTOR RELATIONS
  • CAREERS
  • NEWS
  • CONTACT
  • Menu Menu
  • LinkedIn
  • X
  • Facebook
  • Instagram
Events

A Hacker Wisdom Experience!

blackhat

Las Vegas was the place to be for hackers this past month. Thousands of hackers, penetration testers, cyber security professionals and of course security analysts from all over the world showed up for the annual Blackhat and Defcon (USA) Cyber Security Conferences. As Neurosoft always invests on its personnel to maintain the high level of expertise we offer to our clients, our Information Security Team was there and was in a unique position to be informed about the current state and the future of Cyber Security. Important knowledge, secrets, attacks, threats, defence mechanisms and new tools (hardware and software) are now an asset of our team that adds significant value to our services. We met interesting people and discussed new exploitation and attack detection techniques.

A few of the primary topics discussed included the growing Ransom-ware Threat, Internet of Things (IoT), Artificial Intelligence (AI), Machine Learning and Threat Intelligence.

Here are some takeaways from this year’s conference:

  • Machines can attack as well.
  • Threat of attacks in the VoIP and UC space.
  • USB attacks are back.
  • Browsers are all hack able.
  • Defence is going harder and harder.
  • Blue team is not enough. Go for a purple one!

Neurosoft left both conferences with an appreciation of the persistence of the good hackers, and, more importantly, the dedication and the hours spent of defenders in order to prevent vulnerabilities.

It’s one of the reasons that we, at Neurosoft, take security seriously and work hard to maintain the quality of our services at the highest possible level.

blackhat    blackhat

September 6, 2016
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail
https://neurosoft.gr/wp-content/uploads/2024/02/2LogoNeurosoft2024.png 0 0 neurouser https://neurosoft.gr/wp-content/uploads/2024/02/2LogoNeurosoft2024.png neurouser2016-09-06 08:01:572025-05-14 16:34:41A Hacker Wisdom Experience!

Recent News

  • cybersecurity
    Microsoft Advanced Specialization in Cybersecurity AchievedMay 28, 2025 - 1:55 pm
  • Technology_NewsIT
    Information & Communication Technology Sector: Last UpdatesMay 21, 2025 - 1:25 pm
  • cloud
    Westcon Awards 2025: Best Cloud PartnerMay 15, 2025 - 2:41 pm
  • Cybersecurity
    Corporate Cybersecurity: Top 3 Behavioral ObservationsMay 5, 2025 - 1:47 pm
  • SD-WAN
    SD-WAN, a Single-Player?April 22, 2025 - 12:43 pm
  • NIS2
    NIS2: Compliance at a GlanceApril 14, 2025 - 12:58 pm
  • AIM Congress
    Cybersecurity and Investments in AIM CongressApril 7, 2025 - 12:54 pm
  • SOC
    The SOC Landscape: One Size No Longer Fits It AllMarch 27, 2025 - 1:58 pm
  • Cyber Security Awards 2025
    Cyber Security Awards 2025: A Triple Celebration for NeurosoftMarch 27, 2025 - 1:38 pm
  • Moving Beyond Fragmented Cloud Security with Unified SASEMarch 26, 2025 - 1:35 pm

Corporate Responsibility.  Careers.  Certified Quality.  Privacy Policy.  Whistleblower Policy. 

© Copyright 2025 - Neurosoft S.A.
  • LinkedIn
  • X
  • Facebook
  • Instagram
Industrial Control Systems-A new target?New Website Launch!
Scroll to top
Cookies
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}