2022-01-28 | Kyle O’Meara | 33:17 | 5 | |
|
2022-01-28 | William Young | 42:39 | 0 | |
|
2022-01-28 | Erin Kelly | 47:25 | 2 | |
|
2022-01-28 | Tanya Janca | 52:38 | 3 | |
|
2022-01-28 | Saumil Shah | 34:45 | 1 | |
|
2022-01-28 | Costin Raiu | 42:21 | 5 | |
|
2022-01-28 | Ryan Kazanciyan IOCs are Dead Long Live IOCs | 52:15 | 3 | |
|
2022-01-28 | Kevin Stear Trending the Crimeware Ecosystem | 50:09 | 7 | |
|
2022-01-28 | Kelly Shortridge The Red Pill of Resilience | 49:45 | 18 | |
|
2022-01-28 | Jonathan Pulsifer Infrastructure Security 2 0 | 45:59 | 3 | |
|
2022-01-28 | John Pavelich IoT Internet of Things Security | 38:08 | 2 | |
|
2022-01-28 | John O'Brien & Steve Garon Introducing CSE’s Open Source AssemblyLine | 39:28 | 17 | |
|
2022-01-28 | Frode Hommedal The Cyber Threat Intelligence Matrix | 59:41 | 17 | |
|
2022-01-28 | Cloud Security Panel | 53:38 | 1 | |
|
2022-01-28 | Olivier Bilodeau Lessons Learned Hunting IoT Malware | 47:52 | 2 | |
|
2022-01-28 | Randy Purse Patching Human Vulnerabilities in Cyber Security | 46:29 | 4 | |
|
2022-01-28 | Peter Goodman Trail of Bits Cyberdyne Automatic Bug Finding At Scale | 38:34 | 7 | |
|
2022-01-28 | Paul Davis Phantom Measuring the Ability to Respond to the Unexpected | 35:19 | 1 | |
|
2022-01-28 | Katie Moussouris Security Eat, Pray, Love | 50:34 | 7 | |
|
2022-01-28 | Chris Eng, Veracode Counterproductive Security Behaviors That Must End | 51:38 | 1 | |
|
2022-01-28 | Tyler Shields Signal Sciences Changing How We Do Security To Match A Modern World | 37:16 | 2 | |
|
2022-01-27 | Does it take AI to break your AI Jakub Kaluzny | 51:42 | 2 | |
|
2022-01-27 | Detecting Man In The Browser banking malware in practice Adam Lange | 43:54 | 13 | |
|
2022-01-27 | Application Real time Monitoring to Hunt Malicious Injections Pedro Fortuna | 46:56 | 0 | |
|
2022-01-27 | Insecure HTTP Headers web application vulnerabilities Marcin Szydłowski | 22:41 | 6 | |
|
2022-01-27 | Modern Cyber Warfare Against Crypto Currency Exchanges Dani Goland, Ido Naor | 33:05 | 6 | |
|
2022-01-27 | Meet Me in the Middle Threat Indications & Warning to enable Joe Slowik | 40:36 | 2 | |
|
2022-01-27 | Playing in the Sandbox Adobe Flash Exploitation Tales Björn Ruytenberg | 36:07 | 1 | |
|
2022-01-27 | New Tales of Wireless Input Devices Matthias Deeg, Gerhard Klostermeier | 52:08 | 3 | |
|
2022-01-27 | Inside Cybercrime Groups Harvesting Active Directory for Fun Vitali Kremez | 34:38 | 35 | |
|
2022-01-27 | Vulnerabilities for Sale The Good, the Bad and the Ugly Udo Schneider | 38:57 | 1 | |
|
2022-01-27 | How Neurodiversity can be Leveraged for an Excellent ROI Megan Roddie | 39:24 | 3 | |
|
2022-01-27 | Gdy umiera framework… Studium przypadku CVE 2018 12533 Daniel Kalinowski | 46:27 | 11 | |
|
2022-01-27 | Day One | 0:34 | 0 | |
|
2022-01-27 | Let's play a game challenges Konrad Antonowicz, Bartosz Dzirba, Dom Storey | 44:30 | 2 | |
|
2022-01-27 | Cyber Policja co to i z czym to sie je lukasz Pietrzyk | 20:19 | 2 | |
|
2022-01-27 | Latest Android threats and their techniques Lukas Stefanko | 30:03 | 5 | |
|
2022-01-27 | Utilizing YARA to Find Evolving Malware Jay Rosenberg | 47:37 | 11 | |
|
2022-01-27 | Breaking Extreme Networks WingOS How to own millions of Josep Pi Rodriguez | 38:23 | 30 | Guide |
|
2022-01-27 | The magic of XSS not only in web applications Michal Bentkowski | 33:34 | 20 | |
|
2022-01-27 | the biggest IT security conference in CEE | 1:32 | 0 | |
|
2022-01-27 | Kradziez tozsamosci problemem spoleczenstwa informacyjnego XXI Jan Klima | 49:39 | 3 | |
|
2022-01-27 | A Monitoring Platform for Kubernetes Valentine Mairet, Vincent Ruijter | 36:44 | 11 | |
|
2022-01-27 | Security of the IVR systems and call centers Aleksandr Kolchanov | 43:18 | 17 | |
|
2022-01-27 | Sneaking Past Device Guard Philip Tsukerman | 47:30 | 0 | |
|
2022-01-27 | Is your browser secure Breaking cryptography in Michal Jarmolkowicz | 35:49 | 4 | |
|
2022-01-27 | Sandbox dla PowerShell'a zrob to sam Dawid Pachowski | 40:37 | 10 | |
|
2022-01-27 | Revenge of The Script Kiddies Current Day Uses Ophir Harpaz, Or Safran | 41:12 | 1 | |
|
2022-01-27 | Into the Fog The Return of ICEFOG APT Chi En Ashley Shen | 47:54 | 13 | |
|
2022-01-27 | SIEM wedlug potrzeb Elasticsearch, Energy Logserver, Wazuh, Bro | 40:25 | 10 | Vlog |
|
2022-01-27 | Vulnerabilities from a grave Forever dead or maybe alive Michal Sajdak | 42:00 | 0 | |
|
2022-01-27 | Powershell kung fu Pawel Maziarz | 44:45 | 28 | |
|
2022-01-27 | Inter application vulnerabilities hunting for bugs in Marcin Szydlowski | 38:47 | 0 | |
|
2022-01-27 | Detecting Phishing from pDNS Irena Damsky | 43:24 | 1 | |
|
2022-01-27 | Pentesting Voice Biometrics Solutions Jakub Kałużny | 44:23 | 11 | |
|
2022-01-27 | Darknet Piotr Bazydło | 35:34 | 2 | |
|
2022-01-27 | CREDS new distributed certificate management system Michal Jarmolkowicz | 23:00 | 1 | |
|
2022-01-27 | Network security monitoring on a massive scale Michał Purzyński | 41:46 | 2 | |
|
2022-01-27 | Conference Recap | 2:47 | 0 | |
|
2022-01-27 | Busting Advanced BotNet’s Senad Aruc | 30:28 | 14 | |
|
2022-01-27 | Myth Busters The DLP Edition Ido Naor, Dani Goland | 29:23 | 1 | |
|
2022-01-27 | Bezpieczeństwo przy tysiącach wdrożeń Wojciech Lesicki, Paweł Czubachowski | 30:07 | 1 | |
|
2022-01-27 | Military style tactics in the fight against Cybercrime TJ Campana | 14:56 | 8 | |
|
2022-01-27 | Attacking web servers via run time configuration Eldar Marcussen | 40:50 | 3 | |
|
2022-01-27 | Splunk bezpieczeństwo pracy użytkowników w Office 365 Jakub Goral | 23:29 | 1 | |
|
2022-01-27 | Linux Kernel Runtime Guard LKRG under the hood Adam pi3 Zabrocki | 56:13 | 45 | |
|
2022-01-27 | Spear phishing jak się bronić Case studies Borys Łącki | 32:48 | 2 | |
|
2022-01-27 | A 2018 practical guide to hacking RFID NFC Sławomir Jasek | 52:39 | 100 | Guide |
|
2022-01-27 | Jailbreak dylematy hazardzisty w pentestach aplikacji iOS Wojciech Reguła | 43:35 | 3 | |
|
2022-01-27 | Security Awareness for VIPs Piece of cake or a tough nut to crack Piotr Peszko | 45:01 | 4 | |
|
2022-01-27 | Hunting for the secrets in a cloud forest Paweł Rzepa | 44:47 | 3 | |
|
2022-01-27 | Remote detection of low and medium interaction honeypots Julio C Fort | 28:06 | 0 | |
|
2022-01-27 | Invoke DOSfuscation Daniel Bohannon | 44:04 | 3 | |
|
2022-01-27 | Hacking Robots Before Skynet Lucas Apa | 48:59 | 2 | |
|
2022-01-27 | Intel ME Security keys Genealogy, Obfuscation Dmitry Sklyarov, Maxim Goryachy | 43:32 | 10 | Vlog |
|
2022-01-27 | XSS is dead We just don't get it Mario Heiderich | 47:30 | 16 | |
|
2022-01-27 | XSS in Google's application and bypassing CSP Michał Bentkowski | 29:19 | 11 | |
|
2022-01-27 | Hacking REST APIs 20 cases Michał Sajdak | 39:47 | 4 | |
|
2022-01-27 | Practical intelligence driven defense Igor Ivanov, Daniil Yugoslavskiy | 38:36 | 3 | |
|
2022-01-27 | Who and why should fear hardware trojans Adam Kostrzewa | 44:05 | 10 | |
|
2022-01-27 | Everything’s Connected aka Threat Intelligence 102 Marcin Siedlarz | 38:01 | 3 | |
|
2022-01-27 | V4GR4 Cyber Crime, Enlarged Koby Kilimnik | 26:07 | 0 | |
|
2022-01-27 | The new era of Digital Investigations past, present and future Selene Giupponi | 23:21 | 5 | |
|
2022-01-26 | The new era of Digital Investigations past, present and future Selene Giupponi | 23:21 | 0 | |
|
2022-01-26 | Outsmarting smart contracts Damian Rusinek | 51:19 | 17 | |
|
2022-01-26 | Google's journey with CSP Lukas Weichselbaum, Michele Spagnuolo | 43:31 | 6 | |
|
2022-01-26 | Deploying Secure NFS in a Large Enterprise Moritz Willers | 26:41 | 5 | |
|
2022-01-26 | Stories from the SOC vol 2017 Gawel Mikolajczyk | 45:36 | 13 | |
|
2022-01-26 | Czlowiek w systemie bezpieczenstwa Paulina Piasecka, Krzysztof Liedel | 41:07 | 2 | |
|
2022-01-26 | SCADA and mobile in the IoT times Alexander Bolshev, Ivan Yushkievich | 44:45 | 1 | |
|
2022-01-26 | How governments push forward the security of cryptomarkets Pavol Luptak | 53:44 | 15 | |
|
2022-01-26 | Cyberprzestepczosc wyzwaniem w pracy Policji Jan Klima | 51:43 | 3 | |
|
2022-01-26 | Red teaming in Poland test cases Borys lacki | 47:34 | 1 | |
|
2022-01-26 | Cryptography used for jihadism, from Internet to software Julie Gommes | 24:52 | 2 | |
|
2022-01-26 | CONFidence 2017 recap | 1:45 | 0 | |
|
2022-01-26 | Escaping the sandbox Robert Swiecki | 43:24 | 5 | |
|
2022-01-26 | Hacking embedded with OpenWrt Vladimir 'vovcia' Mitiouchev | 40:32 | 48 | |
|
2022-01-26 | Hacker Inside Dude Pawel Maziarz, Karol Celinski | 35:54 | 3 | |
|
2022-01-26 | Post its, post its, post its everywhere Jos Weyers | 46:55 | 0 | |
|
2022-01-26 | Hacking Card Emulation Slawomir Jasek | 40:25 | 5 | |
|