2022-01-03 | Commercial Mobile Spyware Detecting The Undetectable | 25:07 | 2 | |
|
2022-01-03 | Internet Plumbing Gor Security Professionals The State Of BGP Security | 46:58 | 1 | |
|
2022-01-03 | Automated Human Vulnerability Scanning With AVA | 48:56 | 2 | |
|
2022-01-03 | Exploiting The DRAM Rowhammer Bug To Gain Kernel Privileges | 49:18 | 4 | |
|
2022-01-03 | CrackLord Maximizing Password Cracking Boxes | 23:47 | 12 | |
|
2022-01-03 | Internet Scale File Analysis | 46:29 | 2 | |
|
2022-01-03 | BGP Stream | 52:41 | 26 | |
|
2022-01-03 | Back Doors And Front Doors Breaking The Unbreakable System | 51:21 | 0 | |
|
2022-01-03 | Exploiting XXE Vulnerabilities In File Parsing Functionality | 22:11 | 16 | |
|
2022-01-03 | Is The NSA Still Listening To Your Calls A Surveillance Debate | 51:44 | 4 | |
|
2022-01-03 | Faux Disk Encryption Realities Of Secure Storage On Mobile Devices | 44:20 | 2 | |
|
2022-01-03 | Battle Of The SKM And IUM How Windows 10 Rewrites OS Architecture | 51:30 | 14 | |
|
2022-01-03 | Big Game Hunting The Peculiarities Of Nation State Malware Research | 50:29 | 6 | |
|
2022-01-03 | FileCry The New Age Of XXE | 33:27 | 1 | |
|
2022-01-03 | Forging The USB Armory, An Open Source Secure Flash Drive Sized Computer | 48:00 | 91 | |
|
2022-01-03 | Behind The Mask The Agenda, Tricks, & Tactics Of The Federal Trade Commission | 52:01 | 1 | |
|
2022-01-03 | Breaking Access Controls With BLEKey | 41:36 | 5 | |
|
2022-01-03 | Fingerprints On Mobile Devices Abusing And Leaking | 38:31 | 0 | |
|
2022-01-03 | From False Positives To Actionable Analysis Behavioral Intrusion Detection | 45:05 | 5 | |
|
2022-01-03 | Abusing Silent Mitigations Understanding Weaknesses Within Internet Explorer | 47:11 | 0 | |
|
2022-01-03 | Breaking Honeypots For Fun And Profit | 51:00 | 2 | |
|
2022-01-03 | Crash & Pay How To Own And Clone Contactless Payment Devices | 39:14 | 2 | Guide |
|
2022-01-03 | GameOver Zeus Badguys And Backends | 50:12 | 8 | |
|
2022-01-03 | Abusing Windows Management Instrumentation WMI To Build A Persistent, Asyn | 50:01 | 5 | |
|
2022-01-03 | Breaking HTTPS With BGP Hijacking | 38:27 | 2 | |
|
2022-01-03 | Dance Like Nobodys Watching Encrypt Like Everyone Is A Peek Inside The BlackHat | 58:03 | 0 | |
|
2022-01-03 | Graphic Content Ahead Towards Auto Scalable Analysis Of Graphical Images Emb | 25:27 | 1 | |
|
2022-01-03 | Breaking Payloads With Runtime Code Stripping And Image Freezing | 50:50 | 0 | |
|
2022-01-03 | Abusing XSLT For Practical Attacks | 43:55 | 1 | |
|
2022-01-03 | Data Driven Threat Intelligence Metrics On Indicator Dissemination And Sharing | 48:11 | 3 | |
|
2022-01-03 | Harnessing Intelligence From Malware Repositories | 55:21 | 0 | |
|
2022-01-03 | Bring Back The Honeypots | 53:45 | 2 | |
|
2022-01-03 | Advanced IC Reverse Engineering Tech In Depth Analysis Of A Modern Smart Cards | 51:11 | 1 | |
|
2022-01-03 | Deep Learning On Disassembly | 41:08 | 3 | |
|
2022-01-03 | HI THIS IS URGENT PLZ FIX ASAP Critical Vulnerabilities And Bug Bounty Programs | 48:45 | 6 | |
|
2022-01-03 | Defeating Machine Learning What Your Security Vendor Is Not Telling You | 50:58 | 0 | |
|
2022-01-03 | Bringing A Cannon To A Knife Fight | 51:33 | 0 | |
|
2022-01-03 | Adventures In Femtoland 350 Yuan For Invaluable Fun | 48:15 | 1 | |
|
2022-01-03 | Hidden Risks Of Biometric Identifiers And How To Avoid Them | 54:27 | 4 | Guide |
|
2022-01-03 | Broadcasting Your Attack Security Testing DAB Radio In Cars | 52:23 | 1 | |
|
2022-01-03 | Ah Universal Android Rooting Is Back | 41:32 | 1 | |
|
2022-01-03 | Defeating Pass the Hash Separation Of Powers | 48:20 | 1 | |
|
2022-01-03 | How To Hack Government Technologists As Policy Makers | 52:55 | 1 | Guide |
|
2022-01-03 | Android Security State Of The Union | 48:32 | 8 | |
|
2022-01-03 | Distributing The Reconstruction Of High Level Intermediate Representation | 44:59 | 0 | |
|
2022-01-03 | How To Implement IT Security After A Cyber Meltdown | 51:02 | 0 | Guide |
|
2022-01-03 | API Deobfuscator Resolving Obfuscated API Functions In Modern Packers | 41:30 | 2 | |
|
2022-01-03 | Time Trial Racing Towards Practical Timing Attacks | 49:54 | 0 | |
|
2022-01-03 | Point of Sale System Architecture and Security | 23:16 | 4 | |
|
2022-01-03 | Windows Kernel Graphics Driver Attack Surface | 56:26 | 0 | |
|
2022-01-03 | The Beast is in Your Memory | 55:03 | 0 | |
|
2022-01-03 | Why You Need to Detect More Than PtH | 29:17 | 1 | |
|
2022-01-03 | Threat Intelligence Library A New Revolutionary Technology to Enhance the SOC Battle Rhythm | 36:48 | 0 | Vlog |
|
2022-01-03 | Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android | 16:58 | 6 | |
|
2022-01-03 | Poacher Turned Gamekeeper Lessons Learned from Eight Years of Breaking Hypervisors | 53:55 | 2 | |
|
2022-01-03 | Pivoting in Amazon Clouds | 56:11 | 1 | |
|
2022-01-03 | ICSCorsair How I Will PWN Your ERP Through 4 20 mA Current Loop | 44:29 | 7 | |
|
2022-01-03 | The BEAST Wins Again Why TLS Keeps Failing to Protect HTTP | 53:16 | 4 | |
|
2022-01-03 | Understanding IMSI Privacy | 47:13 | 4 | |
|
2022-01-03 | Write Once, Pwn Anywhere | 49:46 | 1 | |
|
2022-01-03 | Internet Scanning Current State and Lessons Learned | 25:54 | 2 | |
|
2022-01-03 | The Big Chill Legal Landmines that Stifle Security Research and How to Disarm Them | 49:56 | 1 | Guide |
|
2022-01-03 | Investigating PowerShell Attacks | 25:23 | 13 | |
|
2022-01-03 | Understanding TOCTTOU in the Windows Kernel Font Scaler Engine | 53:00 | 0 | |
|
2022-01-03 | Unveiling the Open Source Visualization Engine for Busy Hackers | 59:36 | 6 | |
|
2022-01-03 | It Just Networks The Truth About iOS 7 s Multipeer Connectivity Framework | 29:50 | 8 | |
|
2022-01-03 | Prevalent Characteristics in Modern Malware | 47:02 | 0 | |
|
2022-01-03 | The Devil Does Not Exist The Role of Deception in Cyber | 44:49 | 2 | |
|
2022-01-03 | Learn How to Control Every Room at a Luxury Hotel Remotely | 21:14 | 2 | Guide |
|
2022-01-03 | Unwrapping the Truth Analysis of Mobile Application Wrapping Solutions | 53:50 | 4 | |
|
2022-01-03 | Leviathan Command and Control Communications on Planet Earth | 38:42 | 0 | |
|
2022-01-03 | Saving Cyberspace by Jason Healey | 50:48 | 2 | |
|
2022-01-03 | The Library of Sparta | 51:31 | 1 | |
|
2022-01-03 | Oracle Data Redaction is Broken by David Litchfield | 46:16 | 4 | |
|
2022-01-03 | VoIP Wars Attack of the Cisco Phones | 1:02:04 | 7 | |
|
2022-01-03 | SecSi Product Development | 31:54 | 18 | |
|
2022-01-03 | The New Page of Injections Book Memcached Injections | 48:54 | 1 | |
|
2022-01-03 | Secure Because Math A Deep Dive on Machine Learning Based Monitoring | 59:17 | 1 | |
|
2022-01-03 | The New Scourge of Ransomware A Study of CryptoLocker and Its Friends | 51:23 | 3 | |
|
2022-01-03 | What Goes Around Comes Back Around Exploiting Fundamental Weaknesses in Botnet C&C Panels | 27:15 | 6 | |
|
2022-01-03 | When the Lights Go Out Hacking Cisco EnergyWise | 1:01:53 | 0 | |
|
2022-01-03 | The State of Incident Response by Bruce Schneier | 54:30 | 24 | |
|
2022-01-03 | Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs | 16:31 | 2 | |
|
2022-01-03 | Smart Nest Thermostat A Smart Spy in Your Home | 50:09 | 8 | |
|
2022-01-03 | Thinking Outside the Sandbox Violating Trust Boundaries in Uncommon Ways | 40:42 | 2 | |
|
2022-01-03 | Why Control System Cyber Security Sucks | 57:35 | 5 | |
|
2022-01-02 | The Networked Security State Estimation Toolkit | 22:18 | 1 | |
|
2022-01-02 | Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014 | 54:35 | 13 | |
|
2022-01-02 | BadUSB On Accessories that Turn Evil by Karsten Nohl Jakob Lell | 44:31 | 8 | |
|
2022-01-02 | Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces | 54:50 | 2 | |
|
2022-01-02 | Data Only Pwning Microsoft Windows Kernel | 25:01 | 5 | |
|
2022-01-02 | 48 Dirty Little Secrets Cryptographers Don't Want You To Know | 50:58 | 15 | |
|
2022-01-02 | Defeating the Transparency Feature of DBI | 23:53 | 2 | |
|
2022-01-02 | Fingerprinting Web Application Platforms by Variations in PNG Implementations | 18:03 | 0 | |
|
2022-01-02 | 802 1x and Beyond | 31:46 | 2 | |
|
2022-01-02 | From Attacks to Action Building a Usable Threat Model to Drive Defensive Choices | 27:09 | 0 | |
|
2022-01-02 | Bitcoin Transaction Malleability Theory in Practice | 48:02 | 3 | |
|
2022-01-02 | A Journey to Protect Points of Sale | 59:10 | 0 | |
|
2022-01-02 | Extreme Privilege Escalation on Windows 8 UEFI Systems | 57:01 | 3 | |
|
2022-01-02 | Babar ians at the Gate Data Protection at Massive Scale | 50:19 | 0 | |
|