2024-02-22 | Hugo Teso Going Deeper on Aviation Security | 1:09:22 | 26 | |
|
2024-02-22 | José Pico & David Perez Attacking 3G | 51:25 | 13 | |
|
2024-02-22 | Jaime Sánchez & Pablo San Emeterio WhatsApp Lies and VideoTapes | 38:54 | 45 | |
|
2024-02-22 | Juan Vázquez & Julian Vilas Kicking with my SCADA | 1:04:33 | 4 | |
|
2024-02-22 | Jeremy Brown & David Seidman Microsoft Vulnerability Research | 35:51 | 7 | |
|
2024-02-22 | Manu Quintans & Frank Ruiz 50 shades of crimeware | 55:16 | 9 | |
|
2024-02-22 | Joaquín Moreno Low level forensics on Mac OS X | 54:39 | 17 | |
|
2024-02-22 | Miguel Tarasco Native WiFi Analysis under Windows | 23:00 | 10 | |
|
2024-02-22 | Jorge Bermudez Hackers are from Mars, Judges are from Venus | 1:04:06 | 10 | |
|
2024-02-22 | Borja Berástegui Handware Hacking If no input no danger | 38:13 | 62 | |
|
2024-02-22 | Pablo Gonzalez & Juan Antonio Calles Cyberwar Looking for touchdown | 55:59 | 0 | |
|
2024-02-22 | Jorge Ramió RSA turns 36 years and its youth card has expired | 44:16 | 0 | |
|
2024-02-22 | Pau Oliva Bypassing Wifi pay walls with Android | 16:56 | 1 | |
|
2024-02-22 | Raul Siles iOS Back to the Future | 55:20 | 0 | |
|
2024-02-22 | Aladdin Gurbanov Magnetic Road | 45:36 | 0 | |
|
2024-02-22 | Roberto Baratta Security Monetization more with less to more with nothing | 53:20 | 2 | |
|
2024-02-22 | Alberto Cita Skype An analysis of security and privacy | 29:48 | 1 | |
|
2024-02-22 | Alfonso Muñoz Hiding communications in natural language | 32:38 | 1 | |
|
2024-02-22 | Andrés Tarasco Targeted attacks with Wi Fi APTs | 30:08 | 0 | |
|
2024-02-22 | Antonio Ramos Agility The road to security | 53:30 | 0 | |
|
2024-02-22 | Jorge Bermúdez Los hackers son de Marte, los jueces son de Venus | 1:04:06 | 1 | |
|
2024-02-22 | RootedPanel Ciberarmas | 1:18:49 | 1 | |
|
2024-02-22 | Jorge Ramió RSA cumple 36 años y se le ha caducado el carné joven | 44:16 | 1 | |
|
2024-02-22 | Jose Luis Verdeguer & Víctor Seva Secure Communications System | 53:41 | 0 | |
|
2024-02-22 | José Luis Quintero & Felix Estrada De Juegos de Guerra a La Jungla 4 | 54:20 | 1 | |
|
2024-02-22 | Aladdin Gurbanov Magnetic Road | 45:36 | 0 | |
|
2024-02-22 | José Pico & David Pérez Atacando 3G | 51:25 | 1 | |
|
2024-02-22 | Alberto Cita Skype sin Levita Un análisis de seguridad y privacidad | 29:48 | 0 | |
|
2024-02-22 | Juan Vazquez & Julián Vilas A patadas con mi SCADA | 1:04:33 | 0 | |
|
2024-02-22 | Alfonso Muñoz Ocultación de comunicaciones en lenguaje natural | 32:38 | 0 | |
|
2024-02-22 | Andrés Tarasco Ataques dirigidos con APTs Wi Fi | 30:08 | 1 | |
|
2024-02-22 | Manu Quintans & Frank Ruiz 50 shades of crimeware | 55:16 | 0 | |
|
2024-02-22 | Antonio Ramos Agilidad La vía a la seguridad | 53:30 | 0 | |
|
2024-02-22 | Miguel Tarasco Análisis WiFi de forma nativa en Windows | 23:00 | 0 | |
|
2024-02-22 | Pablo González Juan Antonio Calles Cyberwar Looking for touchdown | 55:59 | 0 | |
|
2024-02-22 | Borja Berástegui Handware hacking Si hay un input , hay peligro | 38:13 | 0 | |
|
2024-02-22 | Cesar Lorenzana & Javier Rodríguez Por qué lo llaman APT´s | 45:44 | 0 | |
|
2024-02-22 | Pablo San Emeterio & Jaime S ánchez WhatsApp, mentiras y cintas de video | 38:54 | 1 | |
|
2024-02-22 | Pau Oliva Bypassing wifi pay walls with Android | 16:56 | 0 | |
|
2024-02-22 | Raj Shah The Kill Chain A day in the life of an APT | 43:37 | 1 | |
|
2024-02-22 | Raúl Siles iOS Regreso al futuro | 55:20 | 0 | |
|
2024-02-22 | Francisco J Gómez & Carlos J Diaz Sinfonier | 21:23 | 0 | |
|
2024-02-22 | RootedPanel Estado de las TI en la Comunidad Valenciana | 1:44:05 | 0 | |
|
2024-02-22 | Cesar Lorenzana PICOLETOS EN RootedLand WTF | 41:43 | 0 | |
|
2024-02-22 | David Pérez y José Picó I wanna jam it wid you | 1:08:05 | 0 | |
|
2024-02-22 | José Selvi Adaptando exploits para evitar la frustración | 48:08 | 0 | |
|
2024-02-22 | Leonardo Nve Explotando cambio de servidores DNS | 52:33 | 0 | |
|
2024-02-22 | Lorenzo Martinez Cooking an APT in the paranoid way | 1:00:03 | 1 | |
|
2024-02-22 | Organización Rooted Charla Inaugural KEYNOTE | 7:40 | 0 | |
|
2024-02-22 | Eduardo Arriols Physical Penetration Testing | 57:22 | 1 | |
|
2024-02-22 | Ricardo J Rodriguez & José Vila On Relaying NFC Payment Transactions | 49:58 | 0 | |
|
2024-02-22 | Eduardo Cruz Integrated Circuits Reverse Engineering | 56:22 | 0 | |
|
2024-02-22 | RootedPANEL Does someone have to give a hacker license | 1:51:30 | 0 | |
|
2024-02-22 | Hugo Teso And last but not least important | 1:09:24 | 0 | |
|
2024-02-22 | Sebastian Guerrero Demystifying Apple Pay | 44:07 | 1 | |
|
2024-02-22 | Jorge Bermúdez LECr elviervice Pack 2 Criminal Procedure Act | 1:29:20 | 0 | |
|
2024-02-22 | Yaiza Rubio & Felix Brezo How I met your eWallet | 25:07 | 0 | |
|
2024-02-22 | Miguel Tarasco Bend the developers to your will | 42:36 | 0 | |
|
2024-02-22 | Raúl Siles Android Back to the Future Too or Two | 1:04:19 | 0 | |
|
2024-02-22 | José Selvi El tiempo en MIS manos | 1:00:13 | 0 | |
|
2024-02-22 | Julian Vilas Deep inside the Java framework Apache Struts | 29:06 | 0 | |
|
2024-02-22 | Abel Valero WEBEX Analysing raw data | 33:12 | 0 | |
|
2024-02-22 | Adrian Villa Bypassing DRM Protections at Content Delivery Networks | 32:58 | 1 | |
|
2024-02-22 | Alejandro Ramos Red and Blue two teams with two flavors | 49:58 | 0 | |
|
2024-02-22 | Alfonso Muñoz Finding stegomalware in an ocean of apps | 52:20 | 0 | |
|
2024-02-22 | Andrzej Dereszowski Turla Development & Operations | 52:48 | 1 | |
|
2024-02-22 | Carmen Torrano Investigating web application firewalls | 35:41 | 0 | |
|
2024-02-22 | David Barroso Infection in BIOS, UEFI and derivatives | 58:13 | 3 | |
|
2024-02-22 | David Perez & José Picó Expanding the arsenal for Wi Fi attacks | 1:00:25 | 4 | |
|
2024-02-20 | Cyber Security Threats to Telecom Networks by Hardik Mehta | 31:40 | 8 | |
|
2024-02-20 | Data Privacy and Security Accountability and Assurance in the Digital Age by Raymund Liboro | 30:17 | 0 | |
|
2024-02-20 | Defending cloud Infrastructures with Cloud Security Suite by Shivankar Ma | 16:41 | 0 | |
|
2024-02-20 | ExplIoT Hacking IoT like a boss by Aseem Jakhar | 38:07 | 1 | |
|
2024-02-20 | Exploiting ActionScript3 Interpreter by Boris Larin | 21:22 | 0 | |
|
2024-02-20 | Fire & Ice Making and Breaking macOS firewalls by Patrick Wardle | 49:01 | 4 | |
|
2024-02-20 | How to not Fail at Hardware by Craig Smith | 39:21 | 1 | Guide |
|
2024-02-20 | IoT and JTAG Primer by Michel Chamberland | 40:17 | 0 | |
|
2024-02-20 | Not So Crab Mentality A True RasS Story by Christopher Elisan | 30:32 | 0 | |
|
2024-02-20 | Panel Discussion Philippine National ID System | 43:45 | 0 | Discussion |
|
2024-02-20 | pi$$ing off an APT by Ed Williams | 28:43 | 1 | |
|
2024-02-20 | SAP Incident Response, How To Attack and Defend by Jordan Santarsieri | 37:53 | 1 | Guide |
|
2024-02-20 | Apple Health by Vladimir Katalov | 42:03 | 1 | |
|
2024-02-20 | Bug Bounty Hunting on Steroids by Anshuman Bhartiya | 27:17 | 1 | |
|
2024-02-20 | Car Infotainment Hacking Methodology and Attack Surface Scenarios by Jay Turla | 34:01 | 6 | Vlog |
|
2024-02-20 | z3r0 to h3r0 Targeting Crown Jewels over the Internet | 59:27 | 0 | |
|
2024-02-20 | Anomaly Detection System | 38:04 | 0 | |
|
2024-02-20 | APAD An EDR Grade for WiFi APs | 43:40 | 0 | |
|
2024-02-20 | Behind LockerGoga A Walk Through a Ransomware Attack Worth 40M | 30:21 | 2 | Walkthrough |
|
2024-02-20 | Dissecting APT Malware Against Taiwan in 2019 | 53:55 | 1 | |
|
2024-02-20 | Farewell WAF Exploiting SQL Injection from Mutation to Polymorphism | 38:08 | 0 | |
|
2024-02-20 | Hacking ICS Devices PLCs for FUN | 35:02 | 0 | |
|
2024-02-20 | Hunting Threats with Wireshark Plugins | 32:23 | 0 | |
|
2024-02-20 | Identity Crisis War Stories from Authentication Failures | 45:20 | 0 | |
|
2024-02-20 | Navigating the Shift from Opportunistic to Targeted Ransomware Attacks | 25:14 | 1 | |
|
2024-02-20 | Pilot Study on Semi Automated Patch Diffing by Applying Machine Learning Techniques | 37:56 | 0 | |
|
2024-02-20 | The Man In The Middle Attack Against a Certain Password Manager | 31:37 | 0 | |
|
2024-02-20 | The Role of Hackers in Securing the Country's Cyberspace | 9:33 | 0 | |
|
2024-02-20 | Red Team Village AMSI FAILs by Melvin Langvik | 18:26 | 1 | |
|
2024-02-20 | Red Team Village Data Enrichment and Intel to automate operational intel by Haran Kumar | 21:54 | 1 | |
|
2024-02-20 | Automating Threat Hunting on the Dark Web by Apurv Singh Gautam @ASG Sc0rpi0n | 32:56 | 0 | |
|