2022-01-16 | Stealing a mobile using wormholes Markus Vervier | 30:38 | 5 | |
|
2022-01-15 | Security model bedfellows Noel Dunne & Paco Hope | 59:25 | 19 | |
|
2022-01-15 | Cyber necromancy resurrecting the dead Matthew Halchyshak Joseph Tartaro | 50:54 | 6 | |
|
2022-01-15 | Biting into the forbidden fruit Krzysztof Kotowicz | 1:00:36 | 0 | |
|
2022-01-15 | Investigating Powershell attacks Matt Hastings & Ryan Kazanciyan | 50:07 | 3 | |
|
2022-01-15 | Lightning Talks tunnelshade | 5:34 | 0 | |
|
2022-01-15 | Keynote Jennifer Minella | 52:56 | 3 | |
|
2022-01-15 | Lightning Talks Nikos Danopoulos | 5:01 | 2 | |
|
2022-01-15 | Lightning Talks Matt Erasmus | 4:40 | 1 | |
|
2022-01-15 | Using superpowers for hw reverse engineering Joe Grand | 57:18 | 5 | |
|
2022-01-15 | Hacking driverless vehicles Zoz | 15:42 | 4 | |
|
2022-01-15 | One packer to rule them all Arne Swinnen & Alaeddine Mesbahi | 58:19 | 41 | |
|
2022-01-15 | Keynote Adam Shostack | 1:03:43 | 6 | |
|
2022-01-15 | Thunderbolts and Lightning Snare | 42:54 | 2 | |
|
2022-01-15 | Lightning Talks Jan Kadijk | 4:15 | 0 | |
|
2022-01-15 | Lightning Talks Voting Stage | 6:16 | 0 | |
|
2022-01-15 | Lightning Talks Gavin Millard | 4:07 | 0 | |
|
2022-01-15 | Lightning Talks 404 @JQuePublic | 4:05 | 10 | |
|
2022-01-15 | Data transforming your sewage into signatures Adam Schoeman | 1:00:54 | 1 | |
|
2022-01-15 | Robert Graham Data plane networking | 51:58 | 5 | |
|
2022-01-15 | Dan Guido s Keynote | 1:03:11 | 18 | |
|
2022-01-15 | Devops Panel | 10:16 | 2 | |
|
2022-01-15 | Amelia Andersdotter s keynote | 1:08:31 | 11 | |
|
2022-01-15 | Lightning Talks Session #1 | 1:00:04 | 0 | |
|
2022-01-15 | Aloria NET The Framework, the Myth, the Legend | 36:15 | 22 | |
|
2022-01-15 | Devops Panel part 2 | 41:47 | 1 | |
|
2022-01-15 | Vaagn Toukharian HTTP Time Bandit | 46:04 | 1 | |
|
2022-01-15 | Jake Valletta CobraDroid | 58:44 | 1 | |
|
2022-01-15 | David Perez, Jose Pico Geolocation of GSM mobile devices | 1:13:50 | 3 | |
|
2022-01-15 | TB Henriques, T Martins, J Gouveia Realtime analysis and visualization of | 55:11 | 0 | |
|
2022-01-15 | Russ Gideon Paint by Numbers vs Monet | 45:26 | 1 | |
|
2022-01-15 | Erin Jacobs, Zack Fasel Taking the BDSM out of PCI DSS through open source solutions | 58:40 | 9 | |
|
2022-01-15 | David Mortman s Keynote | 58:39 | 2 | |
|
2022-01-15 | How I met your pointer Hijacking client software for fuzz and profit | 1:02:09 | 2 | |
|
2022-01-15 | Shotgun parsers in the cross hairs | 1:01:56 | 2 | |
|
2022-01-15 | Cyberwar Not What We Were Expecting | 1:03:26 | 4 | |
|
2022-01-15 | Keynote by Katie Moussouris | 16:56 | 5 | |
|
2022-01-15 | Recent Advances in IPv6 Security | 55:37 | 7 | |
|
2022-01-15 | Welcome | 3:56 | 0 | |
|
2022-01-15 | Aloria NET The Framework, the Myth, the Legend | 36:15 | 21 | |
|
2022-01-15 | pMap, the silent killer | 46:51 | 0 | |
|
2022-01-15 | HTML5 A Whole New Attack Vector | 40:38 | 0 | |
|
2022-01-15 | We have you by the gadgets | 54:49 | 0 | |
|
2022-01-15 | Uncovering SAP vulnerabilities dissecting and breaking the Diag protocol | 46:15 | 4 | |
|
2022-01-15 | Moar Anti Forensics for the Louise | 57:25 | 3 | |
|
2022-01-15 | Andreas Bogk | 58:53 | 5 | |
|
2022-01-15 | Dan Kaminski | 1:02:00 | 2 | |
|
2022-01-15 | Alex Hutton | 55:41 | 1 | |
|
2022-01-15 | Ian Amit | 48:48 | 0 | |
|
2022-01-15 | Andrey Belenko | 54:10 | 2 | |
|
2022-01-15 | Alluc | 52:20 | 5 | |
|
2022-01-15 | Chris Nickerson | 51:29 | 0 | |
|
2022-01-15 | Ian Amit | 1:00:30 | 1 | |
|
2022-01-15 | Stephan | 53:11 | 0 | |
|
2022-01-15 | Andy Moser, Olivier Thonnard The Wombat Project | 50:16 | 2 | |
|
2022-01-15 | Fkooman Verdult | 50:29 | 3 | |
|
2022-01-15 | Paul Asadoorian Hacking Embedded Systems | 55:12 | 26 | |
|
2022-01-15 | Fabian Van Den Broek GSM Security | 34:02 | 6 | |
|
2022-01-15 | Lightnig Talks | 49:56 | 0 | |
|
2022-01-15 | Lieven Desmet | 42:50 | 1 | |
|
2022-01-15 | Dale Pearson | 1:04:38 | 2 | |
|
2022-01-15 | Mikko Hypponen Memoirs of a Data Security Fighter | 1:00:52 | 83 | |
|
2022-01-15 | Joe McCray You Spent All That Money And You Still Got Owned | 55:16 | 6 | |
|
2022-01-15 | Craig Balding Project Skylab | 57:15 | 1 | |
|
2022-01-15 | Attacking backbone technologies Daniel Mende Roger Klose | 1:03:24 | 4 | Vlog |
|
2022-01-15 | Rage against the kiosk Paul James Craig | 53:47 | 2 | |
|
2022-01-15 | Transition to ipv6 on the internet threats and mitigation Eric Vyncke | 59:49 | 1 | |
|
2022-01-15 | Dispelling the myths and discussing the facts global cyber warfare Jaseon E Street | 59:10 | 0 | Discussion |
|
2022-01-15 | A new web attack vector script fragmentation Stephan Chenette | 53:13 | 3 | |
|
2022-01-15 | Social engineering for penetration testers Sharon Conheady | 59:10 | 19 | |
|
2022-01-15 | Botnets ransomware malware and stuff Julia Wolf | 44:42 | 11 | |
|
2022-01-15 | Open source information gathering Chris Gates | 35:35 | 1 | Guide |
|
2022-01-15 | Red and tiger team Chris Nickerson | 1:19:37 | 3 | |
|
2022-01-15 | Knowing me knowing you dangers of social networks Brian Honan ogg | 36:09 | 2 | |
|
2022-01-15 | Belgian beer lovers guide to cloud computing Craig Balding | 1:10:04 | 2 | Guide |
|
2022-01-15 | An overview of the Botnet Simulation Framework | 20:47 | 6 | |
|
2022-01-15 | A Proposed Civil Liability Framework for Disrupting Botnets, a particular focus on Smart Devices | 27:20 | 0 | |
|
2022-01-15 | Your aaS is on fire, or how threat actors abuse cloud providers | 29:54 | 0 | |
|
2022-01-15 | Tracking Unsafe Services that are Hosted by Bots using IP Reputation | 16:40 | 1 | |
|
2022-01-15 | Hunting the Quasar Family How to Hunt Malware Family | 23:37 | 4 | Guide |
|
2022-01-15 | A detailed look into the Mozi P2P IoT botnet | 17:36 | 14 | |
|
2022-01-15 | Hunting MageCart Skimmers | 17:08 | 12 | |
|
2022-01-15 | Fritzfrog A Story of a Unique P2P Botnet | 26:01 | 20 | |
|
2022-01-15 | The fall of Domino a preinstalled hostile downloader | 23:52 | 0 | |
|
2022-01-15 | xOSSig Leveraging OS Diversity to Automatically Extract Malware Code Signatures | 24:45 | 0 | |
|
2022-01-15 | APKatche Me If You Can Uncovering Obfuscation as a Service for Malicious Android Applications | 24:12 | 3 | |
|
2022-01-15 | Turla operations from a front row seat | 23:55 | 37 | |
|
2022-01-15 | Inline Detection of Copy Paste Botnet C&C | 24:46 | 2 | |
|
2022-01-15 | Fluxxy Dissection | 29:36 | 4 | |
|
2022-01-15 | Malpedia A Collaborative Effort to Inventorize the Malware Landscape Daniel Plohmann | 58:37 | 9 | |
|
2022-01-15 | RetDec An Open Source Machine Code Decompiler Jakub Kroustek, Peter Matula | 37:16 | 84 | |
|
2022-01-15 | Hunting Down Gooligan Elie Bursztein, Oren Koriat | 33:33 | 2 | |
|
2022-01-15 | Augmented Intelligence to Scale Humans Fighting Botnets Amir Asiaee | 30:14 | 2 | |
|
2022-01-15 | PWS, Common, Ugly but Effective Paul Jung | 26:42 | 2 | |
|
2022-01-15 | CAN Bus Basics With Hands On Fuzzing Ian Tabor | 35:42 | 6 | |
|
2022-01-14 | How to detect watering holes Félix Aimé | 26:14 | 16 | Guide |
|
2022-01-14 | Malware Uncertainty Principle Maria Jose Erquiaga | 14:24 | 8 | |
|
2022-01-14 | The makes me Wannacry Investigation Alan Neville | 26:38 | 3 | |
|
2022-01-14 | Hunting Attacker Activities Keisuke Muda Shusei Tomonaga | 28:14 | 2 | |
|
2022-01-14 | An Overview of the CMS Brute Forcing Malware Landscape Anna Shirokova | 29:45 | 7 | |
|