Congress  List -  2024  2021  2020  2019  2018  2017 

Date

Name

Category

Web

12.11.20

Google and Mozilla fixed issues exploited at 2020 Tianfu Cup hacking contestCongressSecurityaffairs

9.11.20

Tianfu Cup 2020 – 5 minutes to hack Windows 10, Ubuntu iOS, VMWare EXSi, and othersCongress

Securityaffairs

9.11.20

Bug Bounty Hunters Earn $1.2 Million at Chinese Hacking CompetitionCongress

Securityweek

9.11.20

Routers, NAS Devices, TVs Hacked at Pwn2Own Tokyo 2020CongressSecurityweek

9.11.20

Windows 10, iOS, Chrome, Firefox and Others Hacked at Tianfu Cup CompetitionCongressThehackernews

9.11.20

Pwn2Own Tokyo Day 3: Team Flashback crowned Master of PwnCongressSecurityaffairs

8.11.20

Pwn2Own Tokyo Day two: TP-Link router and Synology NAS hackedCongressSecurityaffairs

7.11.20

Pwn2Own Tokyo Day one: NETGEAR Router, WD NAS Device hacked

Congress

Securityaffairs

7.11.20

NETGEAR Router, WD NAS Device Hacked on First Day of Pwn2Own Tokyo 2020

Congress

Securityweek

30.10.20

HITBCyberWeek virtual trainings: Mobile hacking, secure coding, bug hunting

Congress

Net-security

26.10.20

HITBSecTrain: Cutting-edge virtual cyber security trainings on a monthly basis

Congress

Net-security

13.8.20

SecurityWeek to Host Virtual Cloud Security Summit on August 13, 2020

Congress

Securityweek
11.8.20DEF CON 2020 Wrap-Up: Hacking Phones, Cars and SatellitesCongressSecurityweek
10.8.20Black Hat Wrap-Up: IoT and Hardware Vulnerabilities Take the SpotlightCongressSecurityweek
10.8.20Researcher Demonstrates Several Zoom Vulnerabilities at DEF CON 28CongressThehackernews
7.8.20Black Hat 2020: Mercedes-Benz E-Series Rife with 19 BugsCongress

Threatpost

7.8.20Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping HackCongress

Threatpost

7.8.20Black Hat 2020: Influence Campaigns Are a Cybersecurity ProblemCongress

Threatpost

7.8.20

Black Hat 2020: ‘Zero-Click’ MacOS Exploit Chain Uses Microsoft Office MacrosCongress

Threatpost

7.8.20Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big ProfitsCongress

Threatpost

6.8.20

Black Hat 2020: Open-Source AI to Spur Wave of ‘Synthetic Media’ AttacksCongress

Threatpost

6.8.20

Black Hat 2020: Scaling Mail-In Voting Spawns Broad ChallengesCongress

Threatpost

6.8.20

Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical HackersCongress

Threatpost

6.8.20

Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTsCongress

Threatpost

4.8.20

Black Hat USA 2020 Preview: Election Security, COVID Disinformation and MoreCongress

Threatpost

4.8.20

Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec HolesCongress

Threatpost

1.8.20

Black Hat USA 2020 Preview: Election Security, COVID Disinformation and More

Congress

Threatpost

29.7.20

ZDI Announces Rules, Prizes for Pwn2Own Tokyo 2020CongressSecurityweek

14.7.20

HITB Lockdown: Hands-on technical trainings coming next week!

Congress

Net-security

10.5.20Black Hat and DEF CON security conferences go virtual due to pandemicCongress

Bleepingcomputer

9.5.20Black Hat USA, DEF CON 28 Go VirtualCongress

Threatpost

27.4.20Kaspersky and SecurityWeek Present SAS@home Virtual Event — April 28-30CongressSecurityweek
25.4.20

SAS@home Virtual Summit Showcases New Threat Intel, Industry Changes

Congress

Threatpost

22.4.20

SAS, sweet SAS

Congress

Securelist

21.3.20

Defying Covid-19’s Pall: Pwn2Own Goes Virtual

Congress

Threatpost

20.3.20

Pwn2Own 2020 – Participants hacked Adobe Reader, Oracle VirtualBox, and WindowsCongressSecurityaffairs

20.3.20

Pwn2Own 2020 Day1 -researchers earned $180K for hacking Windows, Ubuntu, and macOSCongressSecurityaffairs

20.3.20

Oracle VirtualBox, Adobe Reader, Windows Hacked at Pwn2Own 2020CongressSecurityweek

19.3.20

Researchers Hack Windows, Ubuntu, macOS at Pwn2Own 2020

Congress

Securityweek

29.2.20

RSAC 2020: Ransomware a ‘National Crisis,’ CISA Says, Ramps ICS Focus

Congress

Threatpost

28.2.20

Photos: RSA Conference 2020, part 4

Congress

Net-security

28.2.20

RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity

Congress

Threatpost

28.2.20

Photos: RSA Conference 2020, part 3

Congress

Net-security

27.2.20

RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks

Congress

Threatpost

27.2.20

RSAC 2020: Smart Baby Monitor Vulnerable to Remote Hackers

Congress

Threatpost

27.2.20

RSA Conference 2020: Product Announcement Summary (Day 3)CongressSecurityweek

27.2.20

Photos: RSA Conference 2020, part 2

Congress

Net-security

26.2.20

RSAC 2020: Blockchain is ‘Garbage In’, Voting Needs Paper Ballots

Congress

Threatpost

26.2.20

RSAC 2020 Keynote: Changing the World’s False Perception of Cybersecurity

Congress

Threatpost

26.2.20

RSA Conference 2020: Product Announcement Summary (Day 2)CongressSecurityweek

26.2.20

Photos: RSA Conference 2020, part 1

Congress

Net-security

25.2.20

SECURITI.ai Wins RSA Conference 2020 Innovation Sandbox Contest

Congress

Securityweek

25.2.20

RSA Conference 2020: Product Announcement Summary (Day 1)

Congress

Securityweek

22.2.20

RSAC 2020: Editors’ Preview of Hottest Sessions, Speakers and Themes

Congress

Threatpost

21.2.20

10 hot industry newcomers to watch at RSA Conference 2020

Congress

Net-security

18.2.20

Sessions, events and seminars to check out at RSA Conference 2020

Congress

Net-security

30.1.20

Photos: Cybertech Global Tel Aviv 2020

Congress

Net-security

28.1.20DEF CON China Conference Postponed Amid Coronavirus OutbreakCongressSecurityweek
25.1.20Researchers Earn $280,000 for Hacking Industrial Systems at Pwn2Own MiamiCongressSecurityweek
23.1.20

Pwn2Own Miami Contestants Haul in $180K for Hacking ICS Equipment

Congress

Threatpost

11.1.20

Pwn2Own 2020: Researchers Again Invited to Hack TeslaCongressSecurityweek
6.1.20

RSA Conference 2020 USA: What you can expect at this year’s event

Congress

Net-security
5.1.20

KringleCon 2019

Congress

SANS