2022-04-27 | CPU vulnerabilities, resist future attacks , new tech & future trends in IT Security DefCamp 2018 | 1:11:34 | 0 | |
|
2022-04-27 | The Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags DefCamp 2018 | 38:07 | 1 | Guide |
|
2022-04-27 | Intro to Reversing Malware DefCamp 2018 | 36:27 | 0 | |
|
2022-04-27 | The Charter of Trust DefCamp 2018 | 31:05 | 2 | |
|
2022-04-27 | CPU vulnerabilities where are we now DefCamp 2018 | 38:39 | 0 | |
|
2022-04-27 | Internet Balkanization Why Are We Raising Borders Online DefCamp 2018 | 42:52 | 2 | |
|
2022-04-27 | The challenge of building a secure and safe digital environment in healthcare DefCamp 2018 | 39:37 | 0 | |
|
2022-04-27 | Catch Me If You Can Finding APTs in your network DefCamp 2018 | 45:48 | 5 | |
|
2022-04-27 | Burp ing through your cryptography shield DefCamp 2018 | 20:40 | 2 | |
|
2022-04-27 | In search of unique behaviour DefCamp 2018 | 46:19 | 0 | |
|
2022-04-27 | Tailored, Machine Learning driven Password Guessing Attacks and Mitigation DefCamp 2018 | 50:19 | 1 | |
|
2022-04-27 | Implementation of INFOSEC techniques on android based Kiosk ATM remittance machines DefCamp 2018 | 21:36 | 1 | |
|
2022-04-27 | Building application security with 0 money down DefCamp 2018 | 51:51 | 0 | |
|
2022-04-27 | Bridging the gap between CyberSecurity R&D and UX DefCamp 2018 | 32:10 | 0 | |
|
2022-04-27 | How to Fuzz like a Hacker DefCamp 2018 | 34:14 | 0 | Guide |
|
2022-04-27 | Stealing Traffic Analyzing a Mobile Fraud DefCamp 2018 | 47:36 | 0 | |
|
2022-04-27 | Security pitfalls in script able infrastructure pipelines DefCamp 2018 | 6:30 | 0 | |
|
2022-04-27 | CAN BIT Stomping attack Prevention DefCamp 2019 | 29:16 | 0 | |
|
2022-04-27 | HID Human Interface Danger DefCamp 2019 | 42:34 | 0 | |
|
2022-04-27 | Opening speech with EMMANUEL CHAUTARD DefCamp 2019 | 19:44 | 0 | |
|
2022-04-27 | Simjacker billion dollar mobile security vs one tiny piece of plastic DefCamp 2019 | 27:24 | 12 | |
|
2022-04-27 | Breaking Smart Hacking health, wearable and smart apps to prevent leaking DefCamp 2019 | 37:10 | 1 | |
|
2022-04-27 | Windows Based Exploit Chains and Their Detection Mechanism DefCamp 2019 | 19:50 | 0 | |
|
2022-04-27 | Hacking The Hacker The Story DefCamp 2019 | 32:43 | 1 | |
|
2022-04-27 | Next Gen IoT Botnets 3 Moar ownage DefCamp 2019 | 42:52 | 0 | |
|
2022-04-27 | Why usual pentests suck DefCamp 2019 | 19:58 | 1 | |
|
2022-04-27 | Hacking ICS devices for Fun DefCamp 2019 | 36:43 | 4 | |
|
2022-04-27 | A Secure Distributed e Health System for the Management of Personal Health Metrics Data DefCamp 10 | 49:52 | 1 | |
|
2022-04-27 | Under Pressure Real world damage with TPMS spoofing DefCamp 2019 | 49:16 | 1 | |
|
2022-04-27 | More Tales from the Crypt Analyst DefCamp 2019 | 1:05:56 | 0 | |
|
2022-04-27 | 5G Need of a comprehensive Cyber Security Framework DefCamp 2019 | 24:09 | 1 | |
|
2022-04-27 | Messaging Layer Security Towards a New Era of Secure Group Messaging DefCamp 2019 | 51:57 | 9 | |
|
2022-04-27 | Threat Intelligence Common Mistakes & Stories Form The Field DefCamp 2019 | 47:29 | 1 | |
|
2022-04-27 | Spouseware and Stalkerware Where Do We Go from Here DefCamp 2019 | 44:49 | 19 | |
|
2022-04-27 | Machine Learning and Advanced Analytics in Today's Cyber Security DefCamp 2019 | 36:34 | 1 | |
|
2022-04-27 | Fuzzing the Stack for Fun and Profit DefCamp 2019 | 22:35 | 1 | |
|
2022-04-27 | Security& Compliance in the Cloud DefCamp 2019 | 54:53 | 0 | |
|
2022-04-27 | Live smart, live longer On modern intelligent cyberweapon DefCamp 2019 | 39:09 | 0 | |
|
2022-04-27 | Emulating Packed Linux Malware Using the Unicorn Emulator Framework DefCamp 2019 | 29:42 | 9 | |
|
2022-04-27 | DefCamp 2019 Official Overview DefCamp 2019 | 2:35 | 0 | |
|
2022-04-27 | Intelligent Threat Intel 'LEAD' Framework DefCamp 2019 | 41:24 | 2 | |
|
2022-04-27 | Rotten to the core Android worms in the wild DefCamp 2019 | 33:00 | 1 | |
|
2022-04-27 | In the Midst of Fire Lessons Learned from Serious Incidents DefCamp 2019 | 36:27 | 0 | |
|
2022-04-27 | Red Team Engagements and The Forgotten Risk of Mobile Devices DefCamp 2019 | 50:27 | 2 | |
|
2022-04-27 | Implementing Continuous Offense, to Measure and Monitor Cybersecurity Defenses DefCamp 2019 | 34:25 | 0 | |
|
2022-04-27 | Raise Ya False Flags A history about pirates and APTs DefCamp 2019 | 48:03 | 0 | |
|
2022-04-27 | I PWN thee, I PWN thee not DefCamp 2019 | 52:56 | 0 | |
|
2022-04-27 | The U S Election System, Can we fix it YES WE CAN DefCamp 2019 | 33:16 | 0 | |
|
2022-04-27 | Project SCOUT Deep Learning for malicious code detection DefCamp 2019 | 37:25 | 0 | |
|
2022-04-27 | The Road to Hell is Paved with Bad Passwords DefCamp 2019 | 40:19 | 0 | |
|
2022-04-27 | Privacy in the healthcare The good, the bad and the ugly DefCamp 2019 | 39:57 | 0 | |
|
2022-04-27 | How to implement a quantum key distribution protocol on IBM's quantum computer DefCamp 2019 | 55:10 | 0 | Guide |
|
2022-04-27 | Challenges in creating challenges DefCamp 2019 | 37:12 | 0 | |
|
2022-04-27 | The Decalogueish of Contractual Security Sins DefCamp 2019 | 47:12 | 0 | Vlog |
|
2022-04-27 | Post quantum digital signature with OQRNG optical quantum random number generator DefCamp 2019 | 39:22 | 4 | |
|
2022-04-27 | How to exploit Cloud adoption for making your IT more secure&convenient for end users at DefCamp 10 | 51:07 | 0 | Guide |
|
2022-04-27 | Pentesting on Steroids How to perform faster and better pentest engagements DefCamp 2019 | 36:52 | 0 | Guide |
|
2022-04-27 | How come we have not solved security by now DefCamp 2019 | 30:51 | 0 | |
|
2022-04-27 | The Advanced Threats Evolution Researchers Arm Race DefCamp 2019 | 56:41 | 1 | |
|
2022-04-27 | Can Your Cloud Keep a Secret DefCamp 2019 | 56:10 | 2 | |
|
2022-04-27 | Story of the new Android banking Trojan Cerberus DefCamp 2019 | 25:33 | 6 | |
|
2022-04-27 | Penetration Testing of Vehicle ComponentsECU and FMS DefCamp 2019 | 33:36 | 1 | |
|
2022-04-26 | Security meets the world of gaming DefCamp 2019 | 31:39 | 3 | |
|
2022-04-26 | LIONS AT THE WATERING HOLE ONE YEAR AFTER DefCamp 2019 | 50:22 | 0 | |
|
2022-04-26 | Securing DevOps Common misconceptions DefCamp 2019 | 46:11 | 4 | |
|
2022-04-26 | Investigating Windows Graphics Vulnerabilities A Reverse Engineering & Fuzzing Story DefCamp 2019 | 38:14 | 8 | |
|
2022-04-26 | Secure them all From Silicon to the Cloud DefCamp 2019 | 57:01 | 2 | |
|
2022-04-26 | Friederike von Franqué Machtpolitik im Informationsraum Strategie, Taktik und Verteidigung Defe | 1:04:14 | 9 | Guide |
|
2022-04-26 | Dennis Kenji Kipker Hackback in Deutschland Wer, was, wie und warum DefensiveCon v02 Germa | 59:53 | 4 | |
|
2022-04-26 | David Fuhr Assume Trauma Resilienz und Coping Mechanismen bei kritischen Infrastrukturen Defen | 58:07 | 8 | |
|
2022-04-26 | Closing Event der DefensiveCon mit Lindworm und Ijon DefensiveCon v02 German | 7:22 | 0 | |
|
2022-04-26 | Ann Cathrin Riedel, LOAD e V Warum Angriff nicht die beste Verteidigung ist DefensiveCon v02 | 43:05 | 17 | |
|
2022-04-26 | Alexander Sander Public Money, Public Code Wie Freie Software für mehr Sicherheit sorgt Defe | 40:15 | 0 | |
|
2022-04-26 | Sven Herpig Strategieunfähig Deutschland braucht eine Resilienzstrategie 2020 DefensiveCon v02 | 50:13 | 12 | |
|
2022-04-26 | Panel IT Sicherheitsgesetz 2 DefensiveCon v02 German | 1:30:56 | 0 | |
|
2022-04-26 | Michael Dwucet Vorfallsunterstützung durch das BSI DefensiveCon v02 German | 56:33 | 2 | |
|
2022-04-26 | Michael Bartsch Erfahrungen eines Cyberkrisenmanagers DefensiveCon v02 German | 46:05 | 5 | |
|
2022-04-26 | Matthias Schulze Von Glashäusern und Steinewerfen DefensiveCon v02 German | 1:01:00 | 0 | |
|
2022-04-26 | Marina Krotofil Race to the Bottom DefensiveCon v02 German | 1:00:30 | 7 | |
|
2022-04-26 | Manuel Atug Keynote der Defensivecon v02 DefensiveCon v02 German | 23:00 | 4 | |
|
2022-04-26 | Johannes Rundfeldt CyberHilfsWerk Konzeption für eine Cyberwehr 2 0 DefensiveCon v02 Germa | 1:02:03 | 5 | |
|
2022-04-26 | Janine Schmoldt Hacking Back aus völkerrechtlicher Perspektive DefensiveCon v02 German | 53:47 | 5 | |
|
2022-04-26 | derbycon d2t2t10 jack daniel surviving a teleporter accident it could happen to you | 26:33 | 1 | |
|
2022-04-26 | derbycon d2t3t1 georgia weidman throw it in the river towards real live actual smartphone security | 47:31 | 4 | |
|
2022-04-26 | derbycon d2t1t4 paul asadoorian john strand offensive countermeasures still trying to bring sexy bac | 44:59 | 2 | |
|
2022-04-26 | derbycon d3t3t6 joshua drake jduck exploiting java memory corruption vulnerabilities | 43:04 | 1 | |
|
2022-04-26 | derbycon d2t2t9 rick farina free floating hostility | 45:35 | 1 | |
|
2022-04-26 | derbycon d3t3t5 thomas dotreppe mister x openwips ng | 39:50 | 11 | |
|
2022-04-26 | derbycon d3t1t6 kevin johnson and tom eston desktop betrayal exploiting clients through the features | 50:29 | 1 | |
|
2022-04-26 | derbycon d2t1t3 carlos perez darkoperator tactical post exploitation | 58:36 | 5 | |
|
2022-04-26 | derbycon d2t2t8 evan booth hide yo kids hide yo wife residential security and monitoring the bottom | 41:16 | 2 | |
|
2022-04-26 | derbycon d2t1t2 michael arpaia beat to 1337 creating a successful university cyber defense organizat | 35:03 | 0 | |
|
2022-04-26 | derbycon d3t1t2 peter van eeckhoutte and elliot cutright win32 exploit development with mona and the | 58:06 | 7 | |
|
2022-04-26 | derbycon d2t2t4 matthew becker 73o7ki survival hacking your way out of armageddon | 34:09 | 7 | |
|
2022-04-26 | derbycon d3t1t1 charlie miller battery firmware hacking | 53:47 | 4 | |
|
2022-04-26 | derbycon d2t2t3 thomas hoffecker exploiting pki for fun and profit or the next yellow padlock icon | 44:53 | 0 | |
|
2022-04-26 | derbycon d2t3t11 brent huston realize your hacker heritage do the needful | 30:22 | 0 | |
|
2022-04-26 | derbycon d2t2t2 joe schorr rule 1 cardio and 9 other rules to keep intruders out | 52:35 | 0 | |
|
2022-04-26 | derbycon d2t3t8 mccorkle and rios 100 bugs in 100 days an analysis of ics scada software | 40:46 | 2 | |
|
2022-04-26 | derbycon d2t2t1 brian baskin walking the green mile how to get fired after a security incident | 51:59 | 0 | Guide |
|