Generated by GPT-5-mini| Hack In The Box | |
|---|---|
| Name | Hack In The Box |
| Type | Private |
| Founded | 2003 |
| Founder | Kris Kaspersky |
| Headquarters | Kuala Lumpur, Malaysia |
| Industry | Information security |
| Products | Conferences, publications, training |
Hack In The Box
Hack In The Box is an information security organization known for producing conferences, publications, and training focused on computer security, network security, and cybersecurity research communities. Originating in the early 2000s, it has collaborated with security researchers, vendors, and institutions to present technical talks, capture-the-flag competitions, and workshops. The organization has hosted events across Asia, Europe, and North America, drawing speakers and attendees associated with DEF CON, Black Hat, RSA Conference, CanSecWest, and Chaos Communication Congress.
Founded in the early 2000s amid rising interest in ethical hacking and digital forensics, the organization emerged alongside groups such as Cult of the Dead Cow, L0pht Heavy Industries, and hacker conferences from regions like Europe and Southeast Asia. Early iterations overlapped with movements around open source projects and initiatives linked to researchers from MIT, University of Cambridge, and ETH Zurich. Over time it engaged with entities including Microsoft, Google, Cisco Systems, Juniper Networks, and academic labs at Stanford University and Carnegie Mellon University. The historical arc reflects interactions with regulatory frameworks shaped by laws such as the Computer Fraud and Abuse Act, dialogues involving INTERPOL, and responses to incidents like the Stuxnet operation, the Sony Pictures hack, and the Equifax data breach.
The organization’s flagship events featured multi-track programs where speakers from Google Project Zero, Microsoft Security Response Center, Kaspersky Lab, Symantec, and research groups at Princeton University and University of California, Berkeley presented on topics from browser security to industrial control systems. Events often included workshops led by practitioners affiliated with SANS Institute, Offensive Security, InfoSec Institute, and guides from labs at Bell Labs and NASA. Programming paralleled formats used by DEF CON, Black Hat USA, ShmooCon, BlueHat, and Troopers, with contest elements akin to CTFs organized by teams such as pwn.college, Plaid Parliament of Pwning, and Team Shellphish. Venues ranged from conference centers in Kuala Lumpur to auditoriums in Amsterdam, Berlin, and Las Vegas.
The organization produced proceedings, white papers, and magazines featuring contributors from institutions like Harvard University, Yale University, Oxford University, University of Tokyo, and corporate research groups at IBM Research. Its media output included video archives, presentation slides, and interviews with figures associated with Kevin Mitnick, Bruce Schneier, Mikko Hyppönen, Eugene Kaspersky, and Charlie Miller. Coverage in technology press paralleled reporting by outlets such as The Register, Wired, ZDNet, and Ars Technica, while academic citations connected to journals published by IEEE, ACM, and conferences like Usenix Security Symposium and NDSS. The organization also curated blog posts and newsletters linking to advisories from CERT Coordination Center, US-CERT, and vendor security bulletins from Apple, Oracle, and Adobe Systems.
Training programs were offered in collaboration with instructors from SANS Institute, Offensive Security, EC-Council, and university continuing education departments at MIT Professional Education and Columbia University. Curricula covered exploit development studied in labs at Carnegie Mellon University, malware analysis methods used by teams at Kaspersky Lab and McAfee, and secure coding practices advocated by organizations such as OWASP, IETF, and W3C. Certification pathways referenced industry standards like those from ISC2, ISACA, and vendor-specific credentials from Cisco and Microsoft Certified Professionals. Hands-on training often mirrored practical exercises from competitions run by DEF CON CTF organizers and academic cyber ranges at University of Maryland and University of Texas.
The organization influenced regional security communities across Southeast Asia, Europe, and North America, fostering networks among practitioners from NATO cyber units, law enforcement cyber divisions linked to Europol, and private research teams at CrowdStrike, FireEye, and Palo Alto Networks. Alumni and speakers have moved on to roles in startups, academic appointments at institutions like Imperial College London and University College London, and leadership positions within foundations such as the Electronic Frontier Foundation and Transparency International. Its events helped surface research that informed incident response for breaches like Heartbleed and SHELLSHOCK and contributed to public discourse alongside panels at World Economic Forum and hearings in national legislatures. The legacy includes a catalog of talks and materials used as references by security trainers, researchers, and policy analysts across international forums such as ICANN and ITU.
Category:Computer security