Swiss Cyber Hackathon 2019 / Zurich

Simulating Real World Cyber Scenarios – Educational Cyber Competition of Defending your Environment and Attacking your Opponents

Also this year SIGS (Security Interest Group Switzerland) is organizing the Swiss Cyber Hackathon.

On Thursday, September 26, teams will compete against each other in a CTF competition. Both attacking and defending at the same time!

The Hackathon is especially suitable for professionals who want to test and strengthen their cyber security skills. The target groups are SOC teams, software developers and other IT security experts.

 

Detailed information can be found on the SIGS website: https://www.sig-switzerland.ch/hackathon/


Take the opportunity to learn more about the CTF components and the conditions in  a WebEx session  on May 13 (incl. demo).


Attack & Defense

The Hackathon will take place in the Hacking-Lab. The online lab contains a variety of challenges that can be used to train and consolidate IT security skills. The platform is used for educational and training purposes in schools and universities, in companies also in the recruitment process. Various associations have set themselves the goal of promoting young cyber talents and motivating them for a professional career in IT security. They organize challenges based on the Hacking-Lab.

 

NEWS

Sicherheitsrisiken erkennen und reduzieren

Im «KMU Magazin» gibt Security Analyst Fabio Poloni Tipps, wie KMU sich gegen Cyberangriffe wappnen können.  Read more

Vulnerability in the Windows Task Scheduler

Sylvain Heiniger identified a vulnerability in the Windows Task Scheduler. Read more

Ransomware-Attacke: Datendiebe erpressen Schweizer Unternehmen

Die Schweizer Herstellerin von Schienenfahrzeugen Stadler Rail AG wurde Opfer einer Cyber Attacke. Das Vorgehen der Angreifer sei typisch, sagt... Read more

ARCHIVES

Compass Security Blog

Relaying NTLM authentication over RPC

Since a few years, we - as pentesters - (and probably bad guys as well) make use of NTLM relaying a lot for privilege escalation in Windows networks. In this article, we propose adding support for... mehr

Reversing a .NET Orcus dropper

In this blog post we will reverse engineer a sample which acts as downloader for malware (aka a “dropper”). It is not uncommon to find such a downloader during DFIR engagements so we decided to take a... mehr

ZUM BLOG