İçeriğe atla

OWASP

OWASP ile ilgilenen, sizinle aynı bölgede yaşayan diğer kullanıcılarla tanışın. Deneyimlerinizi paylaşın, birbirinize ilham verin ve teşvik edin! Bir OWASP grubuna katılın.
pin icon
0
üye
people1 icon
0
gruplar

Sıkça Sorulan Sorular

Evet! Bugün gerçekleşen owasp etkinliklerine buradan göz atın. Bunlar, diğer meraklılarla tanışabileceğiniz ve hemen katılabileceğiniz yüz yüze buluşmalardır.

Bu hafta gerçekleşen tüm owasp etkinliklerini buradan keşfedin. Önceden plan yapın ve hafta boyunca heyecan verici buluşmalara katılın.

Kesinlikle! Bulunduğunuz yere yakın owasp etkinliklerini buradan bulun. Yerel topluluğunuzla bağlantı kurun ve bölgenizdeki etkinlikleri keşfedin.

OWASP Etkinlikleri Yakınınızda

Yerel OWASP topluluğunuzla bağlantı kurun

TBD
TBD
**Important time note:** Please plan on arriving between 5:30 and 6:00 as the elevators lock after 6 and you'll need to message us and we'll need to come get you. The building address is 4450 Bridge Park The entrance is 6620 Mooney St, Suite 400 You will need to scan your ID at the door to get a visitor badge. **Abstract** TBD **YouTube Link** TBD
Columbus Arduino Raspberry Pi Enthusiasts (CARPE) (Check Location)
Columbus Arduino Raspberry Pi Enthusiasts (CARPE) (Check Location)
Bring your Raspberry Pi, Arduino, microcontroller, or any other electronic project and join fellow electronics makers for a night of creativity and collaboration! This session is open forum to share your current projects—whether complete or in progress, it’s all interesting! Whether you’re deep into embedded systems, exploring new ideas, or just getting started, you’ll find a welcoming space to collaborate, share, and get inspired. **New to electronics or curious about tinkering?** You’re absolutely welcome. If you’re a beginner and want to experiment, I’ll have a couple of starter kits available so you can try things out—whether that’s blinking your first LED, putting something on a display, or experimenting with simple sensors. No pressure and no experience required—just an interest in learning and building. While we continue to pursue a more permanent venue for this Meetup, we’ll be using public library facilities based on availability. This session will be at the Worthington Park Library in the Olentangy Meeting Room.
Building Scalable Customer Identity Resolution Pipelines on AWS Using AI
Building Scalable Customer Identity Resolution Pipelines on AWS Using AI
Customer identity resolution becomes increasingly complex as organizations scale across multiple systems, regions, and data formats. Traditional rule-based approaches often fail to keep up with data variability, require constant manual tuning, and struggle with real-time processing needs. This session presents a practical approach to building a scalable identity resolution pipeline using AWS services and modern AI techniques. The architecture combines data ingestion through Amazon S3 and AWS Glue, transformation pipelines using Spark on EMR, and machine learning models deployed via SageMaker for entity matching and standardization. Graph-based relationship modeling is implemented using Amazon Neptune to improve resolution accuracy by incorporating household and shared attribute context. We will walk through how machine learning models can be used for name and address normalization, how intelligent blocking strategies improve matching efficiency, and how feedback loops can be introduced to continuously improve accuracy. The session also highlights how serverless components such as AWS Lambda can be used for orchestration and real-time processing. **SPEAKER BIO** Mosaic Syed is a Senior Data Engineering and Cloud Solutions Architect with over 20 years of experience designing and delivering scalable, secure, and high-performance data solutions across global enterprise environments. https://www.linkedin.com/in/mosaic-basha-syed-92300856 **CALL FOR SPEAKERS** Learn more: [https://www.awscolumbus.com/get-involved/](https://www.awscolumbus.com/get-involved/) **THANK YOU** *VEEAM* for hosting our meetup! To learn more about *Veeam*, please visit their website: [https://www.veeam.com/](https://www.veeam.com/) **DIRECTIONS** 8800 Lyra Dr #450 · Columbus, OH go to 4th floor. **Want to sponsor the pizza and/or bar tab?** Please contact me if you would like to sponsor this meetup's pizza and/or bar tab: angelo@mandato.com
Inside the Modern Threat Landscape: How Attackers Weaponize Trust
Inside the Modern Threat Landscape: How Attackers Weaponize Trust
What does a trojan look like when it has over 900k+ combined installs and a Forbes write-up? Exactly like a legitimate Chrome extension. This session presents a technical dissection of two Chrome extensions, each with over one million active installations — that functioned as trojans in production environments, evading detection while operating through entirely legitimate browser APIs. These were not obscure tools. They were widely trusted, actively recommended, and covered by mainstream press before their malicious behavior was fully understood. We will walk through the actual source code of both extensions, showing precisely how the malicious functionality was constructed, concealed, and executed at scale. This analysis anchors a broader examination of how modern compromises actually succeed. Drawing on aggregated real-world incident data, we identify the technique categories currently delivering the highest adversary return, and why they keep working. Spoiler: it's rarely a zero-day. It's trust. The Chrome extension deep-dive will cover: * Line-by-line source analysis of how malicious functionality was embedded within working, useful software * Which browser permission scopes were abused, and why a million users — and their IT teams — didn't see it coming * The behavioral and structural indicators that distinguish a trojan extension from a legitimate one, and how to operationalize detection around them This session closes with a practical defensive prioritization framework built around observed attacker behavior: which mitigations are measurably reducing risk in production environments, which are consuming budget without impact, and a scoring methodology your team and leadership can apply immediately. **Source material:** Primary analysis of extension source code, corroborated by reporting from Forbes and other established outlets. **What this is not:** A vendor pitch, a speculative threat narrative, or a surface-level breach retrospective. **Who should attend:** Security architects, AppSec and cloud security practitioners, blue team leads, threat hunters, browser security practitioners, and security leaders responsible for prioritizing risk and investment decisions.
DoJo (Informal Python Meeting)
DoJo (Informal Python Meeting)
**Latest Dojo Location!** **Knotty Pine Brewing** 1765 W 3rd Ave, Columbus, OH 43212 We're going to try a new dojo location for a few weeks and see how it works Dojos are informal Python group study sessions where everyone interested in Python gathers to learn about Python, help others with Python, or just hang out. Everyone is welcome from Python beginners to experts. Bringing a laptop is encouraged (we'll have extension cords and power strips). If there's something you want to learn leave a comment on this invite so we can plan ahead. We're looking for speakers for our Monthly Meetups! Fill out the form if you are interested in presenting to the Python Community. https://forms.gle/ehSfUAC2WgR34Crq9
NSCoder Night
NSCoder Night
Bring your work or your hobby, hang out, and code with us. Follow @buckeyecocoa for more information.
Building Agents with Microsoft Agent Framework
Building Agents with Microsoft Agent Framework
We will show how to build custom agents with Microsoft Agent Framework. Attendees will learn how to build and custom host agents when Microsoft Foundry is not a viable option.