DiscoverMicrosoft Threat Intelligence PodcastBehind the Scenes at Blue Hat IL: Security Advancements and Challenges
Behind the Scenes at Blue Hat IL: Security Advancements and Challenges

Behind the Scenes at Blue Hat IL: Security Advancements and Challenges

Update: 2024-07-31
Share

Description

In this episode of the Microsoft Threat Intelligence Podcast host Sherrod DeGrippo is live from Blue Hat Israel in Tel Aviv. Igal Lytzki and Din Serussi discuss their presentation on advanced phishing and evasion techniques, highlighting the rise of QR phishing and custom-made captures, which involve interactive challenges to bypass security systems. Gal Niv and Jonathan Jacobi discuss their experience with the Web3 challenge they created, focusing on a smart contract vulnerability on the Ethereum blockchain. Ida Vass, the mastermind behind BlueHat IL, talks about the conference’s impact and her motivation, driven by the community's spirit and the desire to continually innovate and Wolf Goerlich the keynote speaker, discusses his approach to the keynote, focusing on positive advancements in cybersecurity rather than dwelling on the negative. 

 


In this episode you’ll learn:      

  


  • Practical advice for organizations to bolster their email security defenses 

  • The critical need to apply historical attack models to new technologies 

  • Progress in hardening OS and network security and the shift in threat actor tactics 

 


Some questions we ask:     

  


  • What emerging technologies or threats do you find most intriguing or concerning? 

  • How does the production level of BlueHat compare to other conferences? 

  • What do state-sponsored email threats look like right now? 



 


Resources:  

View Sherrod DeGrippo on LinkedIn  


 


Related Microsoft Podcasts:                   


 

Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

 

Get the latest threat intelligence insights and guidance at Microsoft Security Insider 

 

 

The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Behind the Scenes at Blue Hat IL: Security Advancements and Challenges

Behind the Scenes at Blue Hat IL: Security Advancements and Challenges

Microsoft