Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

8/17/2018
03:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

4th Annual Global Cybersecurity Forum, HackIT 4.0: Exploit Blockchain will be held October 8 11 in Kyiv, Ukraine

Annual Hacken Cup, one - day, onsite bug bounty marathon on October 8

The annual HackIT Cybersecurity Forum is coming up on October 8 – 11 in Kyiv, Ukraine.  HackIT is all about bringing white hat hackers and the blockchain community together.

The annual Hacken Cup – the onsite bug bounty marathon – happens on October 8, with 20 top white hat hackers finding critical vulnerabilities in your client’s or company’s web and mobile applications.   Developer teams can exchange experience with top security researchers, receive a day of offline bug bounty and cybersecurity consulting and one month of online bug bounty at the HackenProof platform: http://bit.ly/2vrEBX3.   Also includes a press conference with media and three tickets to the HackIT forum and VIP afterparty. 

HackIT - is an annual, practical information security related forum where all that’s virtual becomes real.  HackIT 2018 is a 2-day forum devoted to Defense and Attack themes; the main topic for 2018 is Blockchain technology.  Professionals present their latest research and discuss trends at the forum, hackers can win challenges and show their skills, amateurs can learn various disciplines at trainings, and the media can gather valuable material from primary sources.

The Venue facility at Parkovy, Park Road, 16 a, has 1,200 seats, includes one main stage, two secondary halls, an exhibition hall, coffee break lounge and an invite–only afterparty in the VIP lounge.

HackIT is not a boring vendors exhibition.  Meet leading industry experts, learn with practical lessons, develop strategic networking and experience effective insights while spending time with an awesome community.

Speaker Submissions Being Accepted Now

Last year’s (2017) speakers included: Philip R. Zimmerman, Ryan Lackey, Alex Brennen, Yasser Ali and Ebrahim Hegazy.

Speaker submission applications, topics and background are found here: http://bit.ly/2OLPtqM

HackIT 2018 Schedule

 October 8: Hacken Cup – Onsite bug bounty marathon.

October 8: Trainings – Intensive workshop from 10 AM – 6 PM.

October 9: Networking Day – Guided tour to, yes, the Chernobyl nuclear power plant.

October 10 & 11 – Attack Day and Defense Day:

4 Keynotes

32 Speakers in 2018 – no sales pitches or classic horror stories about evil hackers.   Only cutting – edge knowledge.

3 Tracks

Additional activities:

Onsite Capture the Flag,

4 Panel Discussions,

Roundtables and meaningful discussions.

HackIT 2018 provides an exceptional opportunity to meet all of these people in one place, including:

White hat hackers – highly skilled security researchers,

Leading cybersecurity companies – Industry leaders, including CEO’s, COO’s, CFO’s, CSIO’s and CIO’s,

Blockchain pioneers – Engineers, developers and enthusiasts,

Top tech bloggers – Prominent influencers,

Crypto company executives – CEO’s, CIO’S & CSIO’S,

Smart Contract Auditors – Industry leaders from top companies.

 

Registration and tickets are available here: http://bit.ly/2AKybYe

HackIT is powered by Hacken.io and supported by Fenbushi Digital.

 

# # #

About Hacken.io

Hacken, http://bit.ly/2AKybYe, is a decentralized custom-tailored platform that provides the entire scope of cybersecurity services. With headquarters in Estonia, Tallinn, it has more than 50 employees around the world and its R & D center located in Kyiv, Ukraine.  Hacken's mission is to improve the overall cybersecurity standards around the globe. With this in mind, the company represents a wide range of products in order to effectively meet customer demand. 

 

About Fenbushi Digital

Fenbushi Digital’s mission is to support the world’s smartest minds leveraging blockchain and decentralization technologies to reshape the future.  Led by a team of the earliest and most influential blockchain pioneers, Fenbushi Digital serves as an active, long term strategic partner to its portfolio projects.  

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17593
PUBLISHED: 2019-10-14
JIZHICMS 1.5.1 allows admin.php/Admin/adminadd.html CSRF to add an administrator.
CVE-2019-17594
PUBLISHED: 2019-10-14
There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
CVE-2019-17595
PUBLISHED: 2019-10-14
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
CVE-2019-14823
PUBLISHED: 2019-10-14
A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to...
CVE-2019-17592
PUBLISHED: 2019-10-14
The csv-parse module before 4.4.6 for Node.js is vulnerable to Regular Expression Denial of Service. The __isInt() function contains a malformed regular expression that processes large crafted input very slowly. This is triggered when using the cast option.