2022-01-04 | Building Trust & Enabling Innovation for Voice Enabled IoT | 35:24 | 0 | |
|
2022-01-04 | An Inconvenient Trust User Attitudes Toward Security and Usability Tradeoffs | 28:19 | 1 | |
|
2022-01-04 | Call Me Gathering Threat Intelligence on Telephony Scams to Detect Fraud | 52:42 | 1 | |
|
2022-01-04 | Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic | 55:14 | 4 | |
|
2022-01-04 | Abusing Bleeding Edge Web Standards for Appsec Glory | 43:08 | 1 | |
|
2022-01-04 | Drone Attacks on Industrial Wireless A New Front in Cyber Security | 42:56 | 19 | |
|
2022-01-04 | Behind the Scenes of iOS Security | 51:32 | 7 | |
|
2022-01-04 | Crippling HTTPs With Unholy PAC | 43:46 | 0 | |
|
2022-01-04 | A Retrospective on the Use of Export Cryptography | 50:47 | 0 | |
|
2022-01-04 | BadWPAD | 24:50 | 0 | |
|
2022-01-04 | Certificate Bypass Hiding and Executing Malware from a Digitally Signed Executable | 25:49 | 6 | |
|
2022-01-04 | DPTrace Dual Purpose Trace for Exploitability Analysis of Program Crashes | 47:44 | 0 | |
|
2022-01-04 | BadTunnel How Do I Get Big Brother Power | 24:41 | 4 | |
|
2022-01-04 | A Lightbulb Worm | 25:54 | 0 | |
|
2022-01-04 | Does Dropping USB Drives in Parking Lots and Other Places Really Work | 34:00 | 9 | |
|
2022-01-04 | Capturing 0Day Exploits With Perfectly Placed Hardware Traps | 48:09 | 5 | |
|
2022-01-04 | Bad for Enterprise Attacking BYOD Enterprise Mobile Security Solutions | 38:31 | 3 | |
|
2022-01-04 | A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land | 48:18 | 4 | |
|
2022-01-04 | Captain Hook Pirating AVS to Bypass Exploit Mitigations | 38:11 | 15 | |
|
2022-01-04 | AVLeak Fingerprinting Antivirus Emulators for Advanced Malware Evasion | 27:59 | 22 | |
|
2022-01-04 | Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf | 41:38 | 0 | |
|
2022-01-04 | 1000 Ways to Die in Mobile Oauth | 47:19 | 5 | |
|
2022-01-04 | Design Approaches for Security Automation | 37:57 | 0 | |
|
2022-01-04 | Canspy A Platform for Auditing Can Devices | 42:24 | 0 | |
|
2022-01-04 | Augmenting Static Analysis Using Pintool Ablation | 42:42 | 1 | |
|
2022-01-04 | Attacking SDN Infrastructure Are We Ready for the Next Gen Networking | 21:50 | 3 | |
|
2022-01-04 | Analysis of the Attack Surface of Windows 10 Virtualization Based Security | 51:13 | 7 | |
|
2022-01-04 | Can You Trust Me Now An Exploration Into the Mobile Threat Landscape | 43:58 | 1 | |
|
2022-01-04 | Demystifying the Secure Enclave Processor | 47:39 | 11 | |
|
2022-01-04 | Applied Machine Learning for Data Exfil and Other Fun Topics | 43:39 | 2 | |
|
2022-01-04 | An Insider's Guide to Cyber Insurance and Security Guarantees | 50:51 | 2 | Guide |
|
2022-01-04 | Hell on Earth From Browser to System Compromise | 49:09 | 2 | |
|
2022-01-04 | Brute Forcing Lockdown Harddrive Pin Codes | 25:38 | 3 | |
|
2022-01-04 | When IoT Attacks Hacking A Linux Powered Rifle | 37:34 | 4 | |
|
2022-01-04 | SMBv2 Sharing More Than Just Your Files | 43:23 | 1 | |
|
2022-01-04 | The Little Pump Gauge That Could Attacks Against Gas Pump Monitoring Systems | 53:34 | 10 | |
|
2022-01-04 | Server Side Template Injection RCE For The Modern Web App | 44:42 | 3 | |
|
2022-01-04 | Web Timing Attacks Made Practical | 43:29 | 9 | |
|
2022-01-04 | The Kali Linux Dojo Workshop #2 Kali USB Setups With Persistent Stores & LUKS N | 49:18 | 15 | |
|
2022-01-04 | Securing Your Big Data Environment | 41:44 | 0 | |
|
2022-01-04 | ZigBee Exploited The Good, The Bad, And The Ugly | 42:24 | 21 | |
|
2022-01-04 | ROPInjector Using Return Oriented Programming For Polymorphism & Antivirus Evas | 22:31 | 6 | |
|
2022-01-04 | The Lifecycle Of A Revolution | 1:10:53 | 0 | |
|
2022-01-04 | The Kali Linux Dojo Workshop #1 Rolling Your Own Generating Custom Kali Linux 2 | 52:28 | 17 | |
|
2022-01-04 | WSUSpect Compromising The Windows Enterprise Via Windows Update | 46:11 | 2 | Vlog |
|
2022-01-04 | Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware | 47:31 | 52 | |
|
2022-01-04 | The Battle For Free Speech On The Internet | 53:48 | 2 | |
|
2022-01-04 | Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion | 47:47 | 0 | |
|
2022-01-04 | Understanding The Attack Surface & Attack Resilience Of Project Spartan | 39:59 | 0 | |
|
2022-01-04 | The Applications Of Deep Learning On Traffic Identification | 25:56 | 0 | |
|
2022-01-04 | Review And Exploit Neglected Attack Surfaces In IOS 8 | 50:30 | 1 | |
|
2022-01-04 | Writing Bad @$$ Malware For OS X | 51:39 | 6 | |
|
2022-01-04 | Unicorn Next Generation CPU Emulator Framework | 52:06 | 51 | |
|
2022-01-04 | Taxonomic Modeling Of Security Threats In Software Defined Networking | 27:03 | 0 | |
|
2022-01-04 | Return To Where You Can t Exploit What You Can t Find | 39:17 | 0 | |
|
2022-01-04 | Mobile Point Of Scam Attacking The Square Reader | 22:20 | 3 | |
|
2022-01-04 | Understanding And Managing Entropy Usage | 55:33 | 2 | |
|
2022-01-04 | Remote Physical Damage 101 Bread And Butter Attacks | 23:49 | 0 | |
|
2022-01-04 | TrustKit Code Injection On IOS 8 For The Greater Good | 25:35 | 2 | |
|
2022-01-04 | Targeted Takedowns Minimizing Collateral Damage Using Passive DNS | 47:52 | 0 | |
|
2022-01-04 | ThunderStrike 2 Sith Strike | 42:44 | 2 | |
|
2022-01-04 | Taking Event Correlation With You | 48:33 | 5 | |
|
2022-01-04 | Remote Exploitation Of An Unaltered Passenger Vehicle | 51:35 | 2 | |
|
2022-01-04 | THIS IS DeepERENT Tracking App Behaviors With Nothing Changed Phone | 28:16 | 0 | |
|
2022-01-04 | Take A Hacker To Work Day How Federal Prosecutors Use The CFAA | 1:08:47 | 3 | |
|
2022-01-04 | Red Vs Blue Modern Active Directory Attacks, Detection, And Protection | 49:00 | 1 | |
|
2022-01-04 | These re Not Your Grand Daddy s CPU Performance Counters CPU Hardware Performa | 52:24 | 5 | |
|
2022-01-04 | Subverting Satellite Receivers For Botnet And Profit | 24:50 | 6 | |
|
2022-01-04 | PWNIE AWARDS | 52:42 | 7 | |
|
2022-01-04 | The Tactical Application Security Program Getting Stuff Done | 54:20 | 2 | |
|
2022-01-04 | Stranger Danger What Is The Risk From 3rd Party Libraries | 49:01 | 1 | |
|
2022-01-04 | Staying Persistent In Software Defined Networks | 45:21 | 1 | |
|
2022-01-04 | Pen Testing A City | 50:06 | 1 | |
|
2022-01-04 | The NSA Playset A Year Of Toys And Tools | 50:26 | 16 | |
|
2022-01-04 | Stagefright Scary Code In The Heart Of Android | 56:05 | 3 | |
|
2022-01-04 | The Node js Highway Attacks Are At Full Throttle | 27:54 | 2 | |
|
2022-01-04 | Spread Spectrum Satcom Hacking Attacking The Globalstar Simplex Data Service | 46:02 | 23 | |
|
2022-01-04 | Panel How The Wassenaar Arrangement s Export Control Of Intrusion Soft Affect | 51:13 | 20 | |
|
2022-01-04 | Winning The Online Banking War | 49:16 | 2 | |
|
2022-01-04 | Optimized Fuzzing IOKit In IOS | 33:44 | 16 | |
|
2022-01-04 | The Memory Sinkhole Unleashing An X86 Design Flaw Allowing Universal Privilege | 46:34 | 1 | |
|
2022-01-04 | My Bro The ELK Obtaining Context From Security Events | 19:18 | 1 | |
|
2022-01-04 | Why Security Data Science Matters & How It's Different Pitfalls And Promises | 51:44 | 2 | |
|
2022-01-04 | Social Engineering The Windows Kernel Finding & Exploiting Token Handling Vulnerabilities | 43:18 | 1 | |
|
2022-01-04 | Most Ransomware Isn t As Complex As You Might Think | 23:19 | 1 | |
|
2022-01-03 | Switches Get Stitches | 49:28 | 1 | |
|
2022-01-03 | Repurposing OnionDuke A Single Case Study Around Reusing Nation State Malware | 32:54 | 4 | |
|
2022-01-03 | Assessing And Exploiting BigNum Vulnerabilities | 49:01 | 5 | |
|
2022-01-03 | Bypass Control Flow Guard Comprehensively | 34:00 | 17 | |
|
2022-01-03 | Dom Flow Untangling The DOM For More Easy Juicy Bugs | 1:00:10 | 2 | |
|
2022-01-03 | How Vulnerable Are We To Scams | 28:57 | 0 | |
|
2022-01-03 | Bypass Surgery Abusing Content Delivery Networks With Ser Side Request Forgery | 46:25 | 2 | |
|
2022-01-03 | Information Access And Information Sharing Where We Are And Where We Are Going | 47:47 | 1 | Guide |
|
2022-01-03 | Attacking ECMAScript Engines With Redefinition | 25:08 | 1 | |
|
2022-01-03 | Certifi gate Front Door Access To Pwning Millions Of Androids | 34:09 | 1 | |
|
2022-01-03 | Emanate Like A Boss Generalized Covert Data Exfiltration With Funtenna | 54:53 | 19 | |
|
2022-01-03 | Attacking Hypervisors Using Firmware And Hardware | 51:28 | 25 | |
|
2022-01-03 | Cloning 3G4G SIM Cards With A PC And An Oscilloscope Lessons Learned | 29:42 | 67 | |
|
2022-01-03 | Internet Facing PLCs A New Back Orifice | 52:26 | 24 | |
|
2022-01-03 | Exploiting Out of Order Execution For Covert Cross VM Communication | 26:05 | 2 | |
|