על אודות
שירותים
מאמרים מאת Avi
פעילות
2K עוקבים
ניסיון חינוך
רישיונות והסמכות
-
CISSP
(ISC)^2
שהונפקו יפוג
פרסומים
-
SQL Smuggling
Comsec Research
ראו פרסוםSQL Smuggling AKA "The Attack That Wasn't There"
This paper presented a new class of attack, called SQL Smuggling. SQL Smuggling is a
sub-class of SQL Injection attacks that rely on differences between contextual interpretation
performed by the application platform and the database server.
כבוד ופרסים
-
Employee of the Year
Comsec
שפות
-
English
מיומנות שפת אם או דו-לשונית
-
Hebrew
מיומנות שפת אם או דו-לשונית
-
C#
מיומנות שפת אם או דו-לשונית
המלצות התקבל
12 אנשים המליצו Avi
הצטרפו עכשיו כדי נוףפרופילים דומים אחרים
-
Keren Elazari
Keren Elazari
Keren Elazari is a security researcher, a distinguished public speaker and industry analyst. Featured speaker at international events such as TED, RSA Conference, TEDMED, TEDx, DLD, DEFCON, NATO, WIRED and many more. Her op-ed essays and columns have appeared in Scientific American , Financial Times and WIRED (UK ). Keren's talks have been viewed by millions and translated to 30 languages. Keren writes about emerging cyber security issues and is a frequent commentator on national & international broadcast media and the press. <br>Keren’s TED talk has helped shape the global conversation about hackers and their growing role in our digital society. <br><br>Currently accepting advisory board positions, strategic advisory clients and speaking engagements on the topics of cyber security strategy, hacker culture and innovation. <br><br>Advisory focus: Strategy & leadership, new business development, partner programs & innovation.<br><br>Twitter: @K3r3n3<br><br>TED talk : <br>http://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system
-
Yaniv Miron
Yaniv Miron
Entrepreneur and founder.<br>Cyber Security specialist.<br>I'm an autodidact that can lean enormous amount of information in a short time.<br>Exploit Writing, Reversing, Patch Analysis, Pentesting, Cloud.<br><br>#Spoke at:<br>Tietoturvakatsaus 2025, Helsinki, Finland <br>Protect 2025, London, UK<br>Protect 2025, TN, USA<br>noBStlv 2025, Israel<br>OrangeCon 2025, The Netherlands <br>CloudCon 2025, Grand Rapids, USA<br>RSAC 2025, USA (On-Demand)<br>Protect 2024, Chicago, USA<br>Protect 2024, London, UK<br>HackFest 2023, Canada<br>CONFidence Legends 2021, Poland<br>ISDEF 2018, Tokyo, Japan<br>InfoSec 2016, Tel-Aviv, Israel<br>Cyber Security 7th Conference 2015, Tel-Aviv, Israel<br>HackFest 2014, Quebec, Canada<br>CONFidence 2014, Krakow, Poland<br>NSC 2013, Reykjavik, Iceland<br>Shakacon 2013, Honolulu, Hawaii, USA<br>EAST FCS ATM 2013, The Hague, The Netherlands<br>CONFidence 2013, Krakow, Poland<br>Hack Miami 2013, Miami, Florida, USA<br>Power Of Community 2012, Seoul, South Korea<br>Ben Gurion University, Computer Science Seminar 2012, Beer-Sheva, Israel<br>Norman SCADA 2012, Copenhagen, Denmark<br>Norman SCADA 2012, Aarhus, Denmark<br>Dansk IT - DIT 2012, Copenhagen, Denmark<br>Power Of Community 2011, Seoul, South Korea<br>Hacker Halted 2011, Miami, Florida, USA<br>Hacktivity 2011, Budapest, Hungary<br>BlackHat 2011, Gangsterware — Stealth Shield of the Malware<br>SyScan 2010, Ho Chi Minh City, Vietnam<br>ISACA 2010, Tel-Aviv, Israel<br>CONFidence 2010, Krakow, Poland<br>Hacker Halted 2009, Miami, Florida, USA<br>IL Hack 2009, Tel-Aviv, Israel<br>Israeli Police, Department of Cyber Crime Investigations Conference 2009, Tel-Aviv, Israel<br>OWASP Israel 2008 Conference, Herzliya, Israel<br><br>#Advisories & Research <br>http://www.ilhack.org/lament/advisories.html<br>http://www.ilhack.org/lament/research.html<br>https://www.exploit-db.com/?author=2234<br>https://github.com/yanivmiron<br>https://www.rapid7.com/db/modules/exploit/windows/fileformat/ms11_006_createsizeddibsection/<br>https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/fileformat/ms11_006_createsizeddibsection.rb<br><br>#My BIDs @ SecurityFocus:<br>http://www.securityfocus.com/bid/<br>29112, 38441, 38456, 38480,<br>38483, 38612, 38634, 38852,<br>38879, 38880, 38896, No more free bugs ;)<br><br># My credit @ Microsoft MS11-006<br>www.microsoft.com/technet/security/bulletin/ms11-006.mspx<br># My credit @ Oracle CPU Oct 2010<br>www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html<br>#Israel Hacking Convention 2009:<br>http://www.ilhack.org/2009<br>#RapidShare vulnerability<br>http://labs.m86security.com/2011/02/rapidshare-com-the-phishing-begins%E2%80%A6/
-
Yuval Malachi
Yuval Malachi
Entrepreneur , Technology and business innovator .<br><br>Cyber security industry leader with decades of experience in innovating and developing cutting edge technologies.<br>Vast experience in Cyber Security, expertise in software development, deep knowledge of security architecture, and the implementation know-how required to build successful products and GTM strategies<br><br>• Tech innovation and visionary <br>• Specialize In early stage startups , from ideation stage to production .<br>• 20+ Years Experience In R&D , Product And Cyber Security ,hands on and executive roles <br>• Vast business and tech experience both In corporates & startups<br>• Linux & Open source expert <br>• IoT/OT/SCADA cyber security expert<br>• Issued several Patents In Cyber Security
-
Yosi Shavit MBA, CISO, CISM, CDPSE, CC, MCSE, MCT, CNE
Yosi Shavit MBA, CISO, CISM, CDPSE, CC, MCSE, MCT, CNE
Ministry of Environmental Protection
הוסף כישורים חדשים עם קורסים אלה
-
1 שע’ 1 דק’
Agentic AI Human-Agent Collaboration Design Patterns
-
13 דקות
A Standalone Project: Build a Program to Encrypt and Decrypt Text Messages Using an Encryption Algorithm to Protect Data from Unauthorized Access
-
2 שע’ 19 דק’
AI Product Security: Secure Architecture, Deployment, and Infrastructure