2022-01-11 | Apparel Futures | 1:11:42 | 0 | |
|
2022-01-11 | Open Bionics Blending Science Fiction and Reality | 28:49 | 7 | |
|
2022-01-11 | New Sensory Experiences | 38:31 | 1 | |
|
2022-01-11 | Desigining Implantable Tech for Everyone | 54:44 | 4 | |
|
2022-01-11 | Watch Me Disappear | 59:25 | 2 | |
|
2022-01-11 | BlueHat v18 Straight outta VMware | 45:45 | 5 | |
|
2022-01-11 | Ketamine Assisted Therapies in Medical Practice | 55:22 | 1 | |
|
2022-01-11 | DIY Cyborgia | 32:15 | 0 | |
|
2022-01-11 | Should we build a better human | 1:04:22 | 0 | |
|
2022-01-11 | Textile Sensing Platforms to support a Healthier Life Style | 56:32 | 0 | |
|
2022-01-11 | Panel Cyborg Pride & Identity | 39:32 | 4 | |
|
2022-01-11 | Hacking Consciousness for Peak Performance | 57:05 | 2 | |
|
2022-01-11 | BlueHat v18 Evolving chromes secuirty indicators | 28:15 | 1 | |
|
2022-01-11 | BlueHat v18 DEP for the app layer Time for app sec to grow up | 37:54 | 0 | |
|
2022-01-11 | BlueHat v18 software supply chain attacks in 2018 predictions vs reality | 32:36 | 1 | |
|
2022-01-11 | BlueHat v18 Cybersecurity for the defense of democracy | 50:50 | 1 | |
|
2022-01-11 | BlueHat v18 MSRC Listens | 43:26 | 0 | |
|
2022-01-11 | BlueHat v18 Shoot first, ask later strategies to defend the most phished country in the world | 56:26 | 0 | |
|
2022-01-11 | BlueHat v18 An Ice Cold boot to break bitlocker | 47:42 | 28 | |
|
2022-01-11 | BlueHat v18 Modern day entomology examining the inner workings of the bug bazaar | 55:24 | 1 | Vlog |
|
2022-01-11 | BlueHat v18 Securely handling data in marginalized communities | 44:03 | 1 | |
|
2022-01-11 | BlueHat v18 Mitigation Bypass The Past, Present, and Future | 29:21 | 0 | |
|
2022-01-11 | BlueHat v18 A turla gift popping calc exe by sending an email | 46:24 | 2 | |
|
2022-01-11 | BlueHat v18 Scaling Security Scanning | 30:29 | 3 | |
|
2022-01-11 | BlueHat v18 A mitigation for kernel toctou vulnerabilities | 30:42 | 2 | |
|
2022-01-11 | BlueHat v18 Memory Resident Implants Code injection is alive and well | 52:41 | 3 | |
|
2022-01-11 | BlueHat v18 Killsuit the equation group's swiss army knife for persistence | 43:21 | 5 | |
|
2022-01-11 | BlueHat v18 This is not fine Surviving Cynicism and Building Happy Security Teams | 51:26 | 1 | |
|
2022-01-11 | BlueHat v18 May I see your credentials, please | 34:14 | 0 | |
|
2022-01-11 | BlueHat v18 Malicious User profiling using deep neural networks | 22:17 | 0 | |
|
2022-01-11 | BlueHat v18 If we win, we lose | 53:38 | 0 | |
|
2022-01-11 | BlueHat v18 The matrix has you protecting linux using deception | 45:29 | 0 | |
|
2022-01-11 | BlueHat v18 Retpoline The Anti sectre type 2 mitigation in windows | 49:22 | 1 | |
|
2022-01-11 | BlueHat v18 Hardening hyper v through offensive security research | 53:05 | 14 | |
|
2022-01-11 | BlueHat v18 The law of unintended consequences | 47:34 | 1 | |
|
2022-01-11 | BlueHat v18 Go Build A Tool | 42:56 | 0 | |
|
2022-01-11 | BlueHat v18 Record Now, Decrypt Later Future Quantum Computers Are a Present Threat | 52:14 | 18 | |
|
2022-01-11 | BlueHat v18 The hitchhiker's guide to north korean malware | 52:39 | 3 | Guide |
|
2022-01-11 | BlueHat v18 First STRONTIUM UEFI Rootkit Unveiled | 52:17 | 23 | |
|
2022-01-11 | BlueHat Seattle 2019 Im in your cloud A year of hacking Azure AD | 44:32 | 5 | |
|
2022-01-11 | BlueHat Exploitation Chronomancy Temporal Return Addresses 2005 | 1:06:02 | 18 | |
|
2022-01-11 | BlueHat v17 Born Secure How to Design A Brand New Cloud Platform With A Strong Security Posture | 52:52 | 1 | Guide |
|
2022-01-11 | Microsoft BlueHat v17 Security Conference | 1:52 | 4 | |
|
2022-01-11 | BlueHat v17 Securing Windows Defender Application Guard | 53:26 | 1 | |
|
2022-01-11 | BlueHat v17 Scaling Incident Response 5 Keys to Successful Defense at Scale | 23:00 | 3 | |
|
2022-01-11 | BlueHat v17 Raising the Bar New Hardware Primitives for Exploit Mitigations | 45:23 | 2 | |
|
2022-01-11 | BlueHat v17 Mitigations for the Masses From EMET to Windows Defender Exploit Guard | 53:24 | 1 | |
|
2022-01-11 | BlueHat v17 Keynote Reinventing Trust in a World of Organized Chaos | 52:44 | 0 | |
|
2022-01-11 | BlueHat v17 Don't Let Your Virtualization Fabric Become the Attack Vector | 24:51 | 1 | |
|
2022-01-11 | BlueHat v17 KERNELFAULT R00ting the Unexploitable using Hardware Fault Injection | 52:30 | 1 | |
|
2022-01-11 | BlueHat v17 Extracting Secrets from Silicon – A New Generation of Bug Hunting | 1:03:22 | 0 | |
|
2022-01-11 | BlueHat v17 A Lustrum of Malware Network Communication Evolution and Insights | 34:19 | 2 | |
|
2022-01-11 | BlueHat v17 Betraying the BIOS Where the Guardians of the BIOS are Failing | 54:28 | 2 | |
|
2022-01-11 | BlueHat v17 Dangerous Contents Securing Net Deserialization | 23:01 | 1 | |
|
2022-01-11 | BlueHat v10 Browser Hacks, Design Flaws, & Opt In Security | 35:47 | 0 | |
|
2022-01-11 | BlueHat v10 Behind the Curtain of Second Tuesdays Challenges in Software Security Response | 25:24 | 0 | |
|
2022-01-11 | BlueHat v10 Nine Trends Affecting the Future of Exploitation | 22:18 | 0 | |
|
2022-01-11 | BlueHat v10 Everybody Be Cool This Is a ROPpery | 52:58 | 0 | |
|
2022-01-11 | BlueHat v10 Enhanced Mitigation Experience Toolkit 2 0 | 44:20 | 2 | |
|
2022-01-11 | BlueHat v10 Cyber Crime War Connecting the Dots | 46:49 | 0 | |
|
2022-01-11 | BlueHat v9 RIA Security Real World Lessons from Flash and Silverlight | 47:26 | 1 | |
|
2022-01-11 | BlueHat v9 iPhone SMS Hacking with a Touch About Payloads | 49:36 | 4 | |
|
2022-01-11 | BlueHat v9 Office Security Engineering | 45:58 | 0 | |
|
2022-01-11 | BlueHat v9 Cloudifornication Indiscriminate Information Intercourse Internet Infrastructure | 58:37 | 0 | Guide |
|
2022-01-11 | BlueHat Seattle 2019 Modern Binary Analysis with ILs | 42:21 | 0 | |
|
2022-01-11 | BlueHat Seattle 2019 Keynote, Alex Stamos | 48:30 | 15 | |
|
2022-01-11 | BlueHat Seattle 2019 Kubernetes Practical Attack and Defense | 46:00 | 21 | |
|
2022-01-11 | GRAPH FOR SECURITY WORKSHOP Opening Remarks & Keynote, Ram Shankar Siva Kumar & Sarah Fender | 27:15 | 16 | |
|
2022-01-11 | GRAPH FOR SECURITY WORKSHOP Intrusion Detection with Graphs, Matt Swann | 21:12 | 14 | |
|
2022-01-11 | BlueHat Seattle 2019 Closing Remarks, Kymberlee Price | 4:26 | 9 | |
|
2022-01-11 | GRAPH FOR SECURITY WORKSHOP Grapl a Graph platform for detection response, Colin OBrien | 32:04 | 17 | |
|
2022-01-11 | GRAPH FOR SECURITY WORKSHOP Graphs in Security, Ian Hellen | 30:35 | 4 | |
|
2022-01-11 | BlueHat Seattle 2019 Building Secure Machine Learning Pipelines Security Patterns and Challenges | 32:24 | 1 | |
|
2022-01-11 | BlueHat Seattle 2019 Autopsies of Recent DFIR Investigations | 24:40 | 0 | |
|
2022-01-11 | GRAPH FOR SECURITY WORKSHOP Graphical Analysis for Security, Gabe Bassett | 39:35 | 4 | |
|
2022-01-11 | BlueHat Seattle 2019 Are We There Yet Why Does Application Security Take So Long | 25:34 | 1 | |
|
2022-01-11 | GRAPH FOR SECURITY WORKSHOP Finding your blast radius your peers, Sridhar Periyasamy | 20:29 | 17 | |
|
2022-01-11 | BlueHat Seattle 2019 The good, the bad & the ugly of ML based approaches for ransomware detection | 34:55 | 0 | |
|
2022-01-11 | BlueHat Seattle 2019 Guarding Against Physical Attacks The Xbox One Story | 45:32 | 34 | |
|
2022-01-11 | GRAPH FOR SECURITY WORKSHOP Statistics Graphs Finding Bad Guys, Joshua Neil | 47:05 | 2 | |
|
2022-01-11 | BlueHat Seattle 2019 The cake is a lie Secret world of malware cheats in video games | 21:29 | 1 | |
|
2022-01-11 | GRAPH FOR SECURITY WORKSHOP Scaling Graphical Analysis, Leo Meyerovich | 44:40 | 9 | |
|
2022-01-11 | BlueHat Seattle 2019 Dont forget to SUBSCRIBE | 38:13 | 0 | |
|
2022-01-11 | BlueHat Seattle 2019 Day 2 Opening Remarks, David Weston | 10:26 | 8 | |
|
2022-01-11 | GRAPH FOR SECURITY WORKSHOP Opinions were shared Mistakes were made, Jon Hawes | 39:30 | 1 | |
|
2022-01-11 | BlueHat Seattle 2019 Open Source Security, vulnerabilities never come alone | 46:15 | 1 | |
|
2022-01-11 | BlueHat Seattle 2019 Day 1 Opening Remarks, Eric Doerr & Bharat Shah | 19:50 | 4 | |
|
2022-01-10 | BlueHat IL 2020 Maddie Stone Where's Waldo 's Brothers and Sisters Variant Analysis on | 43:12 | 2 | |
|
2022-01-10 | BlueHat IL 2020 David Weston Keeping Windows Secure | 45:16 | 19 | |
|
2022-01-10 | BlueHat IL 2020 Amy Burnett Forget the Sandbox Escape Abusing Browsers from Code Execution | 45:40 | 21 | |
|
2022-01-10 | BlueHat IL 2020 Netanel Ben Simon & Yoav Alon Bugs on the Windshield Fuzzing the Windows Kernel | 38:45 | 6 | |
|
2022-01-10 | BlueHat IL 2020 Nate Warfield We Can't Stop Here! This is Bot Country! | 30:25 | 1 | |
|
2022-01-10 | BlueHat IL 2020 Zuzana Hromcova ATTOR Spy Platform with Curious GSM Fingerprinting | 25:14 | 1 | |
|
2022-01-10 | BlueHat IL 2020 Boris Larin Retrospective on the Latest Zero days Found in the Wild | 26:46 | 4 | |
|
2022-01-10 | BlueHat IL 2020 The Wover &Ruben Boonen Staying # & Bringing Covert Injection Tradecraft to NET | 39:06 | 1 | |
|
2022-01-10 | BlueHat IL 2020 Ben Seri & Yuval Sarel CDPwn Taking Over Millions of Enterprise Things | 40:22 | 6 | |
|
2022-01-10 | BlueHat IL 2020 Robert Lipovsky Tactics, Techniques, and Procedures of the World's Most | 34:48 | 6 | |
|
2022-01-10 | BlueHat IL 2020 Luca Todesco The One Weird Trick SecureROM Hates | 40:12 | 37 | |
|
2022-01-10 | BlueHat IL 2020 Andy Nguyen Trinity PSP Emulator Escape | 35:20 | 19 | |
|
2022-01-10 | BlueHat IL 2020 Dmitry Vyukov syzkaller Adventures in Continuous Coverage guided Kernel Fuzzing | 46:17 | 20 | Guide |
|