2022-01-09 | Breaking Brains, Solving Problems: Lessons Learned from Two Years for InfoSec Professionals | 41:02 | 2 | |
|
2022-01-09 | Emulating Samsung's Baseband for Security Testing | 39:23 | 16 | Guide |
|
2022-01-09 | Hunting Invisible Salamanders: Cryptographic (in)Security with Attacker-Controlled Keys | 30:30 | 29 | |
|
2022-01-09 | Mind Games Using Data to Solve for the Human Element | 36:04 | 1 | |
|
2022-01-09 | Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot | 36:37 | 35 | |
|
2022-01-09 | I calc'd Calc - Exploiting Excel Online | 41:04 | 2 | |
|
2022-01-09 | Engineering Empathy: Adapting Software Engineering Principles and Process to Security | 40:06 | 2 | |
|
2022-01-09 | Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets | 40:06 | 74 | |
|
2022-01-09 | Breaking VSM by Attacking SecureKernel | 40:55 | 8 | |
|
2022-01-09 | Escaping Virtualized Containers | 42:31 | 26 | |
|
2022-01-09 | Experimenting with Real Time Event Feeds | 27:54 | 3 | |
|
2022-01-09 | My Cloud is APT's Cloud Investigating and Defending Office 365 | 40:43 | 2 | |
|
2022-01-09 | Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers | 39:29 | 10 | |
|
2022-01-09 | EtherOops: Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks | 42:53 | 14 | |
|
2022-01-09 | Exploiting Kernel Races through Taming Thread Interleaving | 38:49 | 7 | |
|
2022-01-09 | Needing the DoH: The Ongoing Encryption and Centralization of DNS | 39:50 | 4 | |
|
2022-01-09 | Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa | 35:06 | 5 | |
|
2022-01-09 | FASTCash and INJX Pure How Threat Actors Use Public Standards for Financial Fraud | 38:12 | 53 | |
|
2022-01-09 | CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms | 40:11 | 7 | |
|
2022-01-09 | NoJITsu: Locking Down JavaScript Engines | 31:38 | 7 | |
|
2022-01-09 | Carrying our Insecurities with Us The Risks of Implanted Medical Devices in Secure Spaces | 39:45 | 7 | |
|
2022-01-09 | Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares | 38:12 | 11 | |
|
2022-01-09 | Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities | 40:36 | 29 | |
|
2022-01-09 | Office Drama on macOS | 42:44 | 11 | |
|
2022-01-09 | Fooling Windows through Superfetch | 40:41 | 8 | |
|
2022-01-09 | A Decade After Stuxnet's Printer Vulnerability Printing is Still the Stairway to Heaven | 40:03 | 3 | |
|
2022-01-09 | Decade of the RATs Custom Chinese Linux Rootkits for Everyone | 35:35 | 11 | |
|
2022-01-09 | Hacking Public Opinion | 51:29 | 2 | |
|
2022-01-09 | IMP4GT IMPersonation Attacks in 4G NeTworks | 42:06 | 12 | |
|
2022-01-09 | A Framework for Evaluating and Patching the Human Factor in Cybersecurity | 21:03 | 0 | |
|
2022-01-09 | Demigod The Art of Emulating Kernel Rootkits | 1:08:57 | 4 | |
|
2022-01-09 | A Hacker's Guide to Reducing Side Channel Attack Surfaces Using Deep Learning | 46:49 | 4 | Guide |
|
2022-01-09 | Improving Mental Models of End to End Encrypted Communication | 38:25 | 3 | |
|
2022-01-09 | Hacking the Supply Chain The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices | 40:11 | 12 | |
|
2022-01-09 | Industrial Protocol Gateways Under Analysis | 39:53 | 7 | |
|
2022-01-09 | A Little Less Speculation, a Little More Action Deep Dive into Fuchsia's Mitigations for CPU Side | 39:39 | 4 | |
|
2022-01-09 | Demystifying Modern Windows Rootkits | 31:23 | 19 | |
|
2022-01-09 | Hacking the Voter Lessons from a Decade of Russian Military Operations | 41:48 | 0 | |
|
2022-01-09 | Detecting Access Token Manipulation | 38:59 | 2 | |
|
2022-01-09 | About Directed Fuzzing and Use After Free How to Find Complex & Silent Bugs | 30:48 | 4 | Guide |
|
2022-01-09 | iOS Kernel PAC, One Year Later | 40:48 | 2 | |
|
2022-01-09 | Healthscare An Insider's Biopsy of Healthcare Application Security | 42:01 | 0 | |
|
2022-01-09 | Lessons From Two Years of Crypto Audits | 45:50 | 14 | |
|
2022-01-09 | PicoDMA DMA Attacks at Your Fingertips | 49:46 | 10 | |
|
2022-01-09 | Rough and Ready Frameworks to Measure Persistent Engagement and Deterrence | 46:54 | 0 | |
|
2022-01-09 | WebAuthn 101 Demystifying WebAuthn | 26:28 | 24 | |
|
2022-01-09 | Look, No Hands The Remote, Interaction less Attack Surface of the iPhone | 42:12 | 4 | |
|
2022-01-09 | Playing Offense and Defense with Deepfakes | 50:48 | 1 | |
|
2022-01-09 | Woke Hiring Won't Save Us An Actionable Approach to Diversity Hiring and Retention | 22:16 | 9 | |
|
2022-01-09 | Securing Apps in the Open By Default Cloud | 43:26 | 0 | |
|
2022-01-09 | Making Big Things Better The Dead Cow Way | 51:52 | 2 | |
|
2022-01-09 | Women in Security Building a Female InfoSec Community in Korea, Japan, and Taiwan | 43:21 | 2 | |
|
2022-01-09 | Securing the System A Deep Dive into Reversing Android Pre Installed Apps | 47:49 | 4 | |
|
2022-01-09 | Preventing Authentication Bypass A Tale of Two Researchers | 37:27 | 2 | |
|
2022-01-09 | Process Injection Techniques Gotta Catch Them All | 48:31 | 3 | |
|
2022-01-09 | Worm Charming Harvesting Malware Lures for Fun and Profit | 46:50 | 0 | |
|
2022-01-09 | Selling 0 Days to Governments and Offensive Security Companies | 50:23 | 3 | |
|
2022-01-09 | Managing for Success Maintaining a Healthy Bug Bounty Program Long Term | 37:45 | 3 | |
|
2022-01-09 | Project Zero Five Years of 'Make 0Day Hard' | 52:49 | 0 | |
|
2022-01-09 | Zombie Ant Farming Practical Tips for Playing Hide and Seek with Linux EDRs | 46:49 | 0 | |
|
2022-01-09 | Sensor and Process Fingerprinting in Industrial Control Systems | 50:03 | 1 | |
|
2022-01-09 | Messaging Layer Security Towards a New Era of Secure Group Messaging | 51:09 | 6 | |
|
2022-01-09 | MINimum Failure Stealing Bitcoins with Electromagnetic Fault Injection | 24:35 | 4 | |
|
2022-01-09 | The Most Secure Browser Pwning Chrome from 2016 to 2019 | 42:47 | 3 | |
|
2022-01-09 | Breaking Encrypted Databases Generic Attacks on Range Queries | 44:04 | 3 | |
|
2022-01-09 | MITRE ATT&CK The Play at Home Edition | 47:53 | 7 | |
|
2022-01-09 | Shifting Knowledge Left Keeping up with Modern Application Security | 50:51 | 4 | |
|
2022-01-09 | The Path Less Traveled Abusing Kubernetes Defaults | 48:06 | 4 | |
|
2022-01-09 | Bypassing the Maginot Line Remotely Exploit the Hardware Decoder on Smartphone | 23:28 | 0 | |
|
2022-01-09 | Chip Fail Glitching the Silicon of the Connected World | 45:56 | 0 | |
|
2022-01-09 | SSO Wars The Token Menace | 22:13 | 0 | |
|
2022-01-09 | Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime | 33:30 | 3 | |
|
2022-01-09 | Mobile Interconnect Threats How Next Gen Products May be Already Outdated | 26:08 | 0 | |
|
2022-01-09 | Testing Your Organization's Social Media Awareness | 25:20 | 3 | |
|
2022-01-09 | Transparency in the Software Supply Chain Making SBOM a Reality | 29:46 | 8 | |
|
2022-01-09 | Monsters in the Middleboxes Building Tools for Detecting HTTPS Interception | 26:58 | 2 | |
|
2022-01-09 | The Discovery of a Government Malware and an Unexpected Spy Scandal | 45:27 | 4 | |
|
2022-01-09 | ClickOnce and You're in When Appref ms Abuse is Operating as Intended | 25:00 | 7 | |
|
2022-01-09 | Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites | 48:13 | 6 | |
|
2022-01-09 | Infiltrating Corporate Intranet Like NSA Pre auth RCE on Leading SSL VPNs | 45:57 | 17 | |
|
2022-01-09 | The Enemy Within Modern Supply Chain Attacks | 50:48 | 1 | |
|
2022-01-09 | New Vulnerabilities in 5G Networks | 43:36 | 24 | |
|
2022-01-09 | Inside the Apple T2 | 45:14 | 2 | |
|
2022-01-09 | The Future of ATO | 51:07 | 3 | |
|
2022-01-09 | Integration of Cyber Insurance Into A Risk Management Program | 54:09 | 1 | |
|
2022-01-09 | On Trust Stories from the Front Lines | 21:16 | 1 | |
|
2022-01-09 | The Future of Securing Intelligent Electronic Devices Using the IEC 62351 7 Standard for Monitoring | 25:39 | 20 | |
|
2022-01-09 | Operational Templates for State Level Attack and Collective Defense of Countries | 50:26 | 1 | |
|
2022-01-09 | Internet Scale Analysis of AWS Cognito Security | 45:22 | 28 | |
|
2022-01-09 | Paging All Windows Geeks Finding Evil in Windows 10 Compressed Memory | 48:55 | 9 | |
|
2022-01-09 | Legal GNSS Spoofing and its Effects on Autonomous Vehicles | 25:45 | 1 | |
|
2022-01-09 | Reverse Engineering WhatsApp Encryption for Chat Manipulation and More | 22:34 | 136 | |
|
2022-01-09 | Lessons and Lulz The 5th Annual Black Hat USA NOC Report | 53:39 | 3 | |
|
2022-01-09 | Rogue7 Rogue Engineering Station Attacks on S7 Simatic PLCs | 43:47 | 5 | |
|
2022-01-09 | PeriScope An Effective Probing and Fuzzing Framework for the Hardware OS Boundary | 27:01 | 1 | |
|
2022-01-08 | Attacking iPhone XS Max | 34:38 | 2 | |
|
2022-01-08 | Come Join the CAFSA - Continuous Automated Firmware Security Analysis | 44:00 | 4 | |
|
2022-01-08 | Defense Against Rapidly Morphing DDOS | 36:17 | 11 | |
|
2022-01-08 | Automation Techniques in C++ Reverse Engineering | 50:47 | 48 | |
|
2022-01-08 | He Said, She Said – Poisoned RDP Offense and Defense | 49:22 | 3 | |
|