Hack Red Con 2024
-
The Hybrid Horizon: Unleashing the Power of Azure Hybrid Integrations
Chirag Savla & Raunak ParmarDone
-
Free Enterprise Defense: Mastering Detection with Sysmon, SIEM, and CTI
Peter DrybroughDone
-
Exploration of Cellular Based IoT Technology
Deral HeilandDone
-
Ransomware Orientation: How to Infect and Extort Companies
Andrew LemonDone
-
Your own personal C2. – Securing your RMM.
Jonathan RogersDone
-
Homeland CyberSecurity
Klint WalkerDone
-
Intro to Infrastructure Automation for Offensive Security
Alex MartirosyanDone
-
Where's the Money: Defeating ATM Disk Encryption
Matt BurchDone
-
Hacking the Human in 2024
Mark GaddyDone
-
Cyber Security on a budget, secure your network with minimum expense
Rich JacksonDone
Len Noe, a Technical Evangelist, White Hat Hacker, and Transhuman at CyberArk Software, is a dynamic and influential speaker on the international security circuit. With an impressive track record of delivering impactful presentations in over 50 countries and at renowned security conferences worldwide, Noe's expertise leaves a lasting impression. Notably, he has graced the stage at the prestigious World Conference in The Hague, C.E.R.T. EU, and has been invited to address multiple governments.
Len is the author of Human Hacked: My life and lessons as the worlds first augmented ethical hacker. With his first book Len exposes the subculture of Transhumans and the capabilities available to this new breed of human, along with the cyber security risks they pose.
Len is a co-host of the Cyber Cognition Podcast and a thought leader in the field of Transhumanism. With his upcoming book, he shares a captivating narrative of his personal evolution, solidifying his position as one of the world's foremost authorities in this transformative movement. As a futurist, Len's insights and expertise are highly sought after.
Len's passion for the Transhuman/Human+ movement is unparalleled, and he actively employs microchip implants to pioneer advancements in cyber security and enhance the human experience. His groundbreaking research has garnered global recognition, appearing in multiple global news outlets, while his regular appearances on top-tier security podcasts showcase his ongoing contributions to the field.
With a rich history as a Black/Grey Hat Hacker, Noe's extensive practical experience has shaped his skills. Over the course of 30 years, he has honed his expertise in web development, system engineering/administration, architecture, and coding. For the past ten years, Len has devoted his focus to information security from an attacker's perspective Actively engaging with the Texas information security communities and organizations like the Autism Society, Len continuously demonstrates his commitment to making a positive impact beyond the realm of technology.
Transhumans, individuals enhanced with technological augmentations, are no longer just a concept from science fiction—they exist and walk among us today. Historically, these individuals have been perceived either from a medical standpoint, with enhancements designed to aid those with disabilities, or as full cyborgs, a notion confined to the realms of speculative fiction. However, with the advent of Brain-Computer Interfaces (BCI), SMART technologies, and consumer products, the boundary between the physical and biological is rapidly disappearing, transforming the landscape of human capability and interaction.
Today's headlines increasingly reflect scenarios reminiscent of science fiction movies, highlighting the profound implications of these advancements for cybersecurity. Augmented humans, with their integrated technological enhancements, pose a significant cyber threat to modern security controls. These transhumans can perform sophisticated cyber attacks such as URL redirections, phishing, smishing, and even man-in-the-middle (MiTM) attacks, all executed from technology embedded beneath their skin. The integration of such advanced tech within the human body renders traditional security measures inadequate, necessitating a rethinking of our defensive strategies.
We are living in a future world today, and it is crucial to recognize and acknowledge this reality to ensure our security. The presence of transhumans necessitates a paradigm shift in our approach to cybersecurity, calling for the development of new strategies and technologies to defend against the unique and evolving threats they present. This presentation aims to illuminate with multiple demonstrations including implant initiated MiTM attacks, Phishing, Smishing, and full automated Linux attacks. The expanding landscape of cyber threats posed by transhumans is a real. The urgent need for complimentary and layered security solutions to safeguard our society in this new era of human evolution is already here.