News about
#Ethical Hacking

Behind the Hack: the Unlocked Storage Container
A public dirt road led us straight to an unlocked storage container. Once inside, we plugged in a computer, scanned the network, found a PLC and rebooted it. This stopping a crane without any alerts. No passwords, no monitoring, no barriers.

Behind the Hack: How Audio Visual Equipment like ClickShare became a Hacker's Gateway
In a recent ethical hacking test, we gained full access to a company’s internal network... by simply plugging our laptop into their ClickShare assigned Ethernet port in one of their conference rooms. Your weakest link may be hiding behind your projector.

Behind the Hack: the Conference Room Laptop
This is the story of a public guest laptop in a conference room where they offered hands-on product demos. It became the gateway for a full-scale corporate breach by our ethical hackers. The servers were secured. Employees used strong passwords. The network had a firewall. Still, we hacked their internal network.
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
Events about
#Ethical Hacking

Live Hacking Show: Artifhacking Intelligence
For years, we've been told that people are the weakest link in cybersecurity. But does that still hold true now that companies are deploying countless AI bots? Can artificial human-like intelligence also fall victim to phishing, scams, and manipulation?
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
Explore by topic
- #3D
- #5G
- #Administration
- #Agentic AI
- #AI Act
- #AI Agents
- #AI in cybersecurity
- #AI in energy
- #AI in health
- #AI legislation
- #AI risks
- #Android Development
- #Artificial Intelligence
- #Backend Development
- #Big Data
- #Blockchain
- #Blue economy
- #Business innovation
- #Business Model Canvas
- #Business plans
- #Circular economy
- #Community Building
- #Computer Vision
- #CRA
- #Cryptography
- #Cybersecurity
- #CyFun
- #Decentralized Identity
- #DeFi
- #DevOps
- #Digital Europe
- #digital identity
- #Digital Product Passports
- #Digital transformation
- #Digital Trust
- #Digital Twins
- #DigitalHealth
- #DLT
- #DPP
- #drones
- #EBSI
- #EFRO
- #Encryption
- #Energy
- #Ethical Hacking
- #EU Business Wallets
- #EU Regulation
- #EUDI
- #Experience Labs
- #Finance
- #Flutter Development
- #Food
- #Generative AI
- #Go to market
- #Hackathon
- #Hyperledger
- #ICIL4
- #Immersive Tech
- #Interactive Installations
- #International project
- #Internship
- #IOS Development
- #IT infrastructure
- #IT Security
- #LF Decentralized Trust
- #LFDT
- #Linux
- #LLM RAGS
- #Maritime Cybersecurity
- #Masterclasses
- #Meetups
- #Metaverse
- #Nanopore sequencing
- #Networking Events
- #NFTs
- #NIS2
- #Open Source
- #OT Security
- #Pentesting
- #Project Management
- #Public sector
- #Quantum Computing
- #Ransomware
- #Regulation
- #Secure AI
- #Security Operations Center
- #Self Sovereign Identity
- #Smart City
- #SME
- #Software Engineering
- #Solid
- #Start-ups
- #Sustainability
- #System Engineer
- #Tokenisation
- #Unreal Engine
- #User group meetings
- #UX/UI
- #Virtual Reality
- #VLAIO
- #Web Development
- #Web3
- #Web3Finance
- #XR
- #yolo-v8