2022-03-22 | Disclose io Vulnerability Disclosure and Hacker Safeharbor in 2020 Casey Ellis ComfyCon AU 2020 | 26:32 | 0 | |
|
2022-03-22 | Why you should go get it… Adam McCarthy ComfyCon AU 2020 ComfyCon AU 2020 Winter | 22:44 | 0 | |
|
2022-03-22 | Vulnerability research as a lifestyle Faraz ComfyCon AU 2020 Winter | 31:12 | 3 | |
|
2022-03-22 | Digging Deeper with Velociraptor DFIR Beast Mode… Mike Cohen ComfyCon AU 2020 Winter | 35:48 | 11 | |
|
2022-03-22 | Using Interlace for organising tests, and multithreading over targets @codingo ComfyCon AU 2020 | 15:46 | 6 | |
|
2022-03-22 | Dependencies Barely Managing Sh3r4 ComfyCon AU 2020 Winter | 15:41 | 0 | |
|
2022-03-22 | Things to do with a Faraday Cage Silvio Cesare ComfyCon AU 2020 Winter | 17:48 | 0 | |
|
2022-03-22 | CV Workshop Ricki Burke ComfyCon AU 2020 Winter | 41:07 | 1 | |
|
2022-03-22 | The CIA Triad Staying Sane in Crazy Times Gyle ComfyCon AU 2020 Winter | 25:29 | 3 | |
|
2022-03-22 | Security at the speed of DevOps Uday Korlimarla ComfyCon AU 2020 Winter | 26:16 | 3 | |
|
2022-03-22 | Pwnagotchi your new digital pet George Coldham ComfyCon AU 2020 Winter | 27:03 | 234 | |
|
2022-03-22 | Overcoming Cyber Performance Anxiety The Continuous Cyber Maturity Model Andrew Scully ComfyCon | 32:17 | 0 | |
|
2022-03-22 | ComfyCon AU Summer 2020 FAQ with the Founders ComfyCon AU 2020 Winter | 41:07 | 8 | |
|
2022-03-22 | OSINT, A learning journey Benzies ComfyCon AU 2020 Winter | 40:37 | 4 | |
|
2022-03-22 | Code that gets you pwns'd Louis ComfyCon AU 2020 Winter | 27:01 | 0 | |
|
2022-03-22 | Meditation for Crisis Professionals Garth ComfyCon AU 2020 Winter | 28:35 | 0 | |
|
2022-03-22 | Careers Panel Fabio, Helen, Kav & Shanna ComfyCon AU 2020 Winter | 28:53 | 0 | |
|
2022-03-22 | Lies, Deception and Fantasy Sam Crowther and Nick Rienets ComfyCon AU 2020 Winter | 35:08 | 0 | |
|
2022-03-22 | Automating the Boring Renee ComfyCon AU 2020 Winter | 20:01 | 3 | |
|
2022-03-22 | Introduction to Lockpicking Marshmallow, Jailbreak, M&M and BigDaddy ComfyCon AU 2020 Winter | 20:12 | 1 | |
|
2022-03-22 | An Introduction to Drone Security Mike Monnik ComfyCon AU 2020 Winter | 42:53 | 1 | |
|
2022-03-22 | How to sort your sabotage plans Kirk Nicholls ComfyCon AU 2020 Winter | 17:29 | 0 | Guide |
|
2022-03-22 | Access your social media archives Caitelatte ComfyCon AU 2020 Winter | 9:16 | 1 | |
|
2022-03-22 | ComfyCon AU 2020 Summer FAQ with the Founders | 41:07 | 1 | |
|
2022-03-22 | CircleCityCon 2020 What the CISO is really looking for Mitchell Parker | 51:18 | 2 | |
|
2022-03-22 | CircleCityCon 2020 Stop buying blinkey boxes Anthony Coggins | 21:55 | 0 | |
|
2022-03-22 | CircleCityCon 2020 Working Remote Is Isolating Notifications are Overwhelming What Is Going On Suz | 34:15 | 1 | |
|
2022-03-22 | CircleCityCon 2020 When a Plan Comes Together Building a SOC A Team Mark Orlando | 57:49 | 0 | |
|
2022-03-21 | vortrag mp6 og 2013 07 05 17 aufbau freier netze yanosz nomaster 5100 | 45:24 | 5 | |
|
2022-03-21 | 35C3 ChaosWest Stack Buffer Overflow Exploits | 40:47 | 3 | |
|
2022-03-21 | 35C3 ChaosWest Toll of personal privacy in 2018 | 45:47 | 0 | |
|
2022-03-21 | 35C3 ChaosWest Track me, if you … oh | 51:38 | 2 | |
|
2022-03-21 | vortrag mp6 og 2013 07 05 19 q a with nadim on cryptocat 5089 | 1:12:09 | 0 | |
|
2022-03-21 | CircleCityCon 2018 Backdooring with Metadata Itzik Kotler | 44:06 | 0 | |
|
2022-03-21 | vortrag mp6 og 2013 07 06 19 lightning talks day 2 5090 | 51:03 | 0 | |
|
2022-03-21 | CircleCityCon 2018 Patching Its Complicated Cheryl Biswas | 42:37 | 0 | |
|
2022-03-21 | CircleCityCon 2020 Nightmares of Information & Cyber Security Officers in a Research Organization Em | 43:30 | 2 | Guide |
|
2022-03-21 | CircleCityCon 2020 Marketing and Branding for Security Building a Security First Culture Megan Kac | 59:10 | 2 | |
|
2022-03-21 | CircleCityCon 2020 Lies Deception and Manipulation Lets talk about Deepfakes Erich Kron | 51:07 | 2 | Discussion |
|
2022-03-21 | CircleCityCon 2020 So You Are Comparing RASP and WAF David Lindner | 55:28 | 0 | |
|
2022-03-21 | CircleCityCon 2020 Panic At the Buttons Hacking Panic Button Systems Hannah Robbins and Amanda Bro | 46:15 | 10 | |
|
2022-03-21 | CircleCityCon 2020 Harvesting Botnets for Unusual Data Alex Holden | 45:10 | 11 | |
|
2022-03-21 | CircleCityCon 2020 Harry Potter and the InfoSec Apprentice @ zammers and @krypton3 | 24:21 | 12 | |
|
2022-03-21 | CircleCityCon 2020 Hacking While Blind Joe B | 47:29 | 4 | |
|
2022-03-21 | CircleCityCon 2020 Its the end of Critical Infrastructure and I don't feel fine Steven Briggs | 1:01:28 | 0 | |
|
2022-03-21 | CircleCityCon 2020 Intel for Threat Intel JJ Josing and Matthew Hoerger | 38:03 | 1 | |
|
2022-03-21 | CircleCityCon 2020 I Want My EIP Buffer Overflow 101 Mike Saunders | 44:13 | 2 | |
|
2022-03-21 | CircleCityCon 2020 Dumpster Fires 6 things about IR I learned by being a firefighter Catherine Ull | 46:34 | 1 | |
|
2022-03-21 | CircleCityCon 2020 Doing ‘Simple’ at scale Micah Brown | 49:35 | 1 | |
|
2022-03-21 | CircleCityCon 2020 Demystifying RFCs Practical Applications for Security and the Apocalypse Chris | 48:49 | 0 | |
|
2022-03-21 | CircleCityCon 2020 DDoS Mitigation Fundamentals Krassimir Tzvetanov | 53:01 | 1 | |
|
2022-03-21 | CircleCityCon 2020 CyberSafari Underexamined threat actors from the global threat landscape Yoshi | 48:04 | 1 | |
|
2022-03-21 | CircleCityCon 2020 Cyber Harassment Things I wish I knew when sh1t went sideways Laura Johnson | 25:19 | 0 | |
|
2022-03-21 | CircleCityCon 2020 CTF Wrapup Starring Lintile | 48:03 | 1 | |
|
2022-03-21 | CircleCityCon 2020 Creating APT targeted threat feeds for your industry Keith Chapman | 22:07 | 0 | |
|
2022-03-21 | CircleCityCon 2020 Compare DevOps to Harry Potter, so that Anyone Can Understand Mary Waddick | 27:03 | 5 | |
|
2022-03-21 | CircleCityCon 2020 Closing Ceremonies Circle City staff | 34:06 | 2 | |
|
2022-03-21 | CircleCityCon 2020 Break crypto like a pro Alexei Kojenov | 54:31 | 1 | |
|
2022-03-21 | CircleCityCon 2020 Between a SOC and a Hard Place Shawn Thomas | 41:43 | 6 | |
|
2022-03-21 | CircleCityCon 2020 Bad Browser Hunting for Malicious Chrome Extensions Colin Cowie | 39:19 | 10 | |
|
2022-03-21 | CircleCityCon 2020 Insecure deserialization, and how not to do it Alexei Kojenov | 51:16 | 9 | |
|
2022-03-21 | CircleCityCon 2020 Flex Seal your CICD Pipeline Ochaun Marshall | 44:27 | 1 | |
|
2022-03-21 | CircleCityCon 2020 A Pitmasters Guide To Security Design Alyssa Miller | 51:35 | 4 | Guide |
|
2022-03-21 | CircleCityCon 2020 Every Breath You Take A CTI Review of Stalkerware @Ch33r10 | 52:31 | 1 | Review |
|
2022-03-21 | CircleCityCon 2020 0Day to HeroDay Bringing a company from scorched earth to a modern security organ | 41:23 | 0 | |
|
2022-03-21 | CircleCityCon 2018 Operator The Well Rounded Hacker Matthew Curtin | 1:01:28 | 3 | |
|
2022-03-21 | CircleCityCon 2018 Opening Ceremonies Circle City Con Staff | 27:48 | 0 | |
|
2022-03-21 | CircleCityCon 2018 IoT 4n6 The Growing Impact of the Internet of Things on Digital Forensics Jes | 42:06 | 0 | |
|
2022-03-21 | CircleCityCon 2018 How to Lie with Statistics Information Security Edition Tony Martin Vegue | 45:48 | 0 | Guide |
|
2022-03-21 | CircleCityCon 2018 global00 GreatSCT Gotta Catch Em AWL Chris Spehn | 46:27 | 6 | |
|
2022-03-21 | CircleCityCon 2018 Stealing Cycles Mining Coin An introduction to Malicious Cryptomining Edmund | 47:57 | 2 | |
|
2022-03-21 | CircleCityCon 2018 Shaver Phone | 1:12 | 2 | |
|
2022-03-21 | CircleCityCon 2018 Espionage In The Modern Age of Information Warfare Scot Terban | 59:52 | 6 | Guide |
|
2022-03-21 | CircleCityCon 2018 Security Beyond the Security Team Getting Everyone Involved Luka Trbojevic | 43:07 | 4 | |
|
2022-03-21 | CircleCityCon 2018 Enterprise Vulnerability Management Assessing Implementing and Maintaining De | 49:34 | 0 | |
|
2022-03-21 | CircleCityCon 2018 Securing without Slowing DevOps Wolfgang Goerlich | 52:04 | 1 | |
|
2022-03-21 | CircleCityCon 2018 Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso | 36:28 | 1 | |
|
2022-03-21 | CircleCityCon 2018 ReThinking Cyber Security Given the Spectre of a Meltdown Someone Hold My Bee | 48:25 | 8 | |
|
2022-03-21 | CircleCityCon 2018 Dear Blue Team Proactive Steps to Supercharge your IR Joe Gray | 51:43 | 0 | |
|
2022-03-21 | CircleCityCon 2018 Ransomware Robbed with a Toy Gun Brian Baskin | 53:55 | 3 | |
|
2022-03-21 | CircleCityCon 2018 CTF Tips and Tricks Aaron Lintile | 45:40 | 1 | |
|
2022-03-21 | CircleCityCon 2018 Quick Retooling in Net for Red Teams Dimitry Snezhkov | 47:13 | 1 | |
|
2022-03-21 | CircleCityCon 2018 Closing | 39:08 | 0 | |
|
2022-03-21 | CircleCityCon 2018 The Never Ending Hack Mental Health in InfoSec Community Danny Akacki | 47:21 | 0 | |
|
2022-03-21 | CircleCityCon 2018 The Network Night Watch Eric Rand Lesley Carhart | 47:44 | 2 | |
|
2022-03-21 | CircleCityCon 2018 Classic Cons in Cryptocurrency Wolfgang Goerlich Zachary Sarakun | 53:58 | 0 | |
|
2022-03-21 | CircleCityCon 2018 Automahack Automate going from zero to domain admin with 2 tools Dan McInerne | 46:31 | 1 | |
|
2022-03-21 | CircleCityCon 2018 Carrot vs Stick Motivation Metrics and Awareness Magen Wu | 48:11 | 1 | |
|
2022-03-21 | CircleCityCon 2018 Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke | 34:14 | 0 | |
|
2022-03-21 | CircleCityCon 2018 The FaaS and the Curious AWS Lambda Threat Modeling Bryan McAninch | 58:56 | 0 | |
|
2022-03-21 | CircleCityCon 2018 Playing Russian Troll Whack a Mole Courtney Falk | 45:01 | 4 | |
|
2022-03-21 | CircleCityCon 2018 Abuse Case Testing in DevOps Stephen Deck | 56:56 | 0 | |
|
2022-03-21 | CircleCityCon 2018 The consequences of lack of security in the Healthcare and how to handle it J | 52:47 | 0 | Guide |
|
2022-03-21 | CircleCityCon 2018 A Very Particular Set of Skills Geolocation Techniques For OSINT and Investig | 33:36 | 18 | |
|
2022-03-21 | CircleCityCon 2017 See beyond the veil Automating malicious javascript deobfuscation Chad Robertson | 33:37 | 7 | |
|
2022-03-21 | CircleCityCon 2017 Security Training Making Your Weakest Link The Strongest Aaron Hnatiw | 50:13 | 0 | |
|
2022-03-21 | CircleCityCon 2017 Phing Phishers JAe | 48:03 | 2 | |
|
2022-03-21 | CircleCityCon 2017 Everything is Not Awesome How to Overcome Barriers to Proper Network Segmentation | 53:16 | 0 | Guide |
|
2022-03-21 | CircleCityCon 2017 Peakaboo I own you Owning hundreds of thousands of devices with a broken HTTP pac | 39:16 | 0 | |
|
2022-03-21 | CircleCityCon 2017 Why is the Internet still working James Troutman | 56:11 | 2 | |
|