Skip to content

Details

Running since June 2013, every month we have 1-2 talks focused on Security or Technology - followed by socialising with like minded people

  • You can find out exactly what to expect about the night and the venue on the What We're About section of our Meetup page. Past talk details can be found the "Past Events" section.
  • All people with any sort of an interest or level of knowledge in Security, Hacking and Emerging Technology are more than welcome to attend and feel free to bring like minded colleagues and friends.

CorkSec is made possible through generous sponsorship from our Platinum Sponsor Trend Micro, Gold Sponsor CyberSkills , as well as our Silver and Bronze Sponsors featured prominently on the night.

Our talks come from our community so if you have an idea for a topic (anything for 10-60 minutes) please email us at **DefconCork@gmail.com** . Whether you are an experienced presenter, or presenting for your first time - CorkSec is a great venue for it - and we are happy to help you prepare and mentor you.

Doors open at 19:00 with talks starting at 19:15. Talks below

TALK 1: TBC

TALK 2: From voice to influence - How IMS and Telecom Signalling Enable Nation State Disinformation - by Mark O'Sullivan
Disinformation is usually discussed as a "Layer 7" problem—Facebook bots, deepfake videos, and Twitter trolls. But what happens when the attack surface is the network itself?
In this session, we go under the hood of global telecommunications to explore how IMS (IP Multimedia Subsystem) and legacy signaling protocols like SS7 and Diameter are being repurposed as delivery mechanisms for state-sponsored cognitive warfare. While the industry has long focused on tracking and intercept, the new frontier is insertion.
We will break down the mechanics of how nation-states can bypass traditional "Big Tech" content moderation by going directly to the handset. We’ll discuss:
* The Signaling Sandbox: How protocol flaws allow for high-trust impersonation of official entities.
* The IMS Pivot: How the transition to VoLTE/5G introduces new headers that can be spoofed to manipulate the "user experience" of a phone call or text.
* Case Studies in Chaos: Real-world examples where telecom signaling was used to sow civil unrest and bypass the open internet.
By understanding the plumbing of the mobile network, we can better appreciate how the next generation of disinformation won't just be seen on a feed—it will be delivered via the core of the network itself.

Related topics

Events in Cork City, IE
Cybersecurity
New Technology
Ethical Hacking
White Hat Hacking
Technology

You may also like