2021-12-22 | Precursor Towards Evidence Based Trust in Hardware | 43:37 | 3 | |
|
2021-12-22 | From Zero to Sixty The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower | 37:51 | 18 | |
|
2021-12-22 | It's not FINished The Evolving Maturity in Ransomware Operations | 36:18 | 8 | |
|
2021-12-22 | Quantum Security and Cryptography You Are Probably Doing it Wrong | 36:28 | 66 | |
|
2021-12-21 | Far Sides of Java Remote Protocols Black Hat - Europe - 2019 | 45:26 | 3 | |
|
2021-12-21 | Breaking Bootloaders on the Cheap | 24:36 | 3 | |
|
2021-12-21 | Broken Links Emergence and Future of Software Supply Chain Compromises | 29:30 | 1 | |
|
2021-12-21 | I Block You Because I Love You Social Account Identification Attack Against a Website Visitor | 39:42 | 7 | |
|
2021-12-21 | Cloud Native Sandboxes for Microservices Understanding New Threats and Attacks | 24:52 | 1 | |
|
2021-12-21 | Real Time Detection of Attacks Leveraging Domain Administrator Privilege | 24:51 | 2 | |
|
2021-12-21 | The Mummy 2018 Microsoft Accidentally Summons Back Ugly Attacks from the Past | 23:32 | 1 | |
|
2021-12-21 | Container Attack Surface Reduction Beyond Name Space Isolation | 49:41 | 6 | |
|
2021-12-21 | In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild | 26:19 | 7 | |
|
2021-12-21 | RustZone Writing Trusted Applications in Rust | 48:18 | 1 | |
|
2021-12-21 | The Undeniable Truth | 50:17 | 1 | |
|
2021-12-21 | Keeping Secrets Emerging Practice in Database Encryption | 41:16 | 0 | |
|
2021-12-21 | Cutting Edge Microsoft Browser Security From People Who Owned It | 44:09 | 2 | |
|
2021-12-21 | Thermanator and the Thermal Residue Attack | 24:32 | 3 | |
|
2021-12-21 | SDL at Scale Growing Security Champions | 53:48 | 2 | |
|
2021-12-21 | Level Up Your Security Mindset | 48:06 | 3 | |
|
2021-12-21 | Under the SEA A Look at the Syrian Electronic Army's Mobile Tooling | 26:15 | 9 | |
|
2021-12-21 | Decisions and Revisions The Ever Evolving Face of the Black Hat NOC | 45:09 | 2 | |
|
2021-12-21 | Video Killed the Text Star OSINT Approach | 38:06 | 20 | |
|
2021-12-21 | Deep Impact Recognizing Unknown Malicious Activities from Zero Knowledge | 50:03 | 1 | |
|
2021-12-21 | A Measured Response to a Grain of Rice | 50:40 | 4 | Guide |
|
2021-12-21 | Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses | 51:23 | 2 | |
|
2021-12-21 | When Everyone's Dog is Named Fluffy Black Hat - Europe - 2018 | 23:08 | 2 | |
|
2021-12-21 | DeepPhish Simulating Malicious AI Black Hat - Europe - 2018 | 50:54 | 3 | |
|
2021-12-21 | Locknote Conclusions and Key Takeaways from Black Hat Europe 2018 | 48:22 | 0 | |
|
2021-12-21 | When Machines Can't Talk Black Hat - Europe - 2018 | 44:44 | 5 | |
|
2021-12-21 | Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces | 50:33 | 2 | |
|
2021-12-21 | AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace | 30:06 | 5 | |
|
2021-12-21 | Where 2 Worlds Collide Bringing Mimikatz et al to UNIX | 43:41 | 0 | |
|
2021-12-21 | Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild | 49:57 | 60 | |
|
2021-12-21 | Attacking and Defending Blockchains From Horror Stories to Secure Wallets | 48:42 | 2 | |
|
2021-12-21 | Straight Outta VMware Modern Exploitation of the SVGA Device for Guest to Host Escapes | 47:42 | 4 | |
|
2021-12-21 | Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM | 50:29 | 7 | Vlog |
|
2021-12-21 | Attacking Hardware Systems Using Resonance and the Laws of Physics | 46:12 | 3 | |
|
2021-12-21 | The Last Line of Defense Understanding and Attacking Apple File System on iOS | 24:59 | 2 | |
|
2021-12-21 | Eternal War in XNU Kernel Objects Black Hat - Europe - 2018 | 37:06 | 15 | |
|
2021-12-21 | Evolving Security Experts Among Teenagers Black Hat - Europe - 2018 | 48:23 | 7 | Guide |
|
2021-12-21 | No Free Charge Theorem 2 0 How to Steal Private Information from a Mobile Device Using a Powerbank | 39:09 | 5 | Guide |
|
2021-12-21 | Off Path Attacks Against PKI Black Hat - Europe - 2018 | 24:00 | 7 | |
|
2021-12-21 | How to Build Synthetic Persons in Cyberspace | 49:37 | 3 | Guide |
|
2021-12-21 | Perception Deception Physical Adversarial Attack Challenges | 54:33 | 11 | |
|
2021-12-21 | BLEEDINGBIT Your APs Belong to Us Black Hat - Europe - 2018 | 46:52 | 9 | |
|
2021-12-21 | Perfectly Deniable Steganographic Disk Encryption | 49:46 | 37 | |
|
2021-12-21 | DIFUZE Android Kernel Driver Fuzzing Black Hat - Europe - 2017 | 53:08 | 7 | |
|
2021-12-21 | Becoming You A Glimpse Into Credential Abuse | 28:52 | 2 | |
|
2021-12-21 | How to Rob a Bank over the Phone Lessons Learned from an Actual Social Engineering Engagement | 47:36 | 1 | Guide |
|
2021-12-21 | Wi Fi Direct To Hell Attacking Wi Fi Direct Protocol Implementations | 56:07 | 11 | |
|
2021-12-21 | Breaking Out HSTS and HPKP On Firefox, IE Edge and Possibly Chrome | 45:37 | 7 | |
|
2021-12-21 | Enraptured Minds Strategic Gaming of Cognitive Mindhacks | 55:18 | 0 | |
|
2021-12-21 | Zero Days, Thousands of Nights The Life & Times of Zero Day Vulns and Their Exploits | 56:26 | 1 | |
|
2021-12-21 | I Trust My Zombies A Trust Enabled Botnet | 30:46 | 4 | |
|
2021-12-21 | By Design Backdooring of Encryption System Can We Trust Foreign Encryption Algorithms | 50:17 | 5 | |
|
2021-12-21 | Inside Android's SafetyNet Attestation Black Hat - Europe - 2017 | 1:00:36 | 22 | |
|
2021-12-21 | Nation State Moneymule's Hunting Season APT Attacks Targeting Financial Institutions | 1:01:58 | 0 | |
|
2021-12-21 | GDPR and Third Party JS Can It Be Done | 29:40 | 2 | |
|
2021-12-21 | Heap Layout Optimisation for Exploitation | 36:45 | 3 | |
|
2021-12-21 | Intel ME Flash File System Explained | 53:15 | 14 | |
|
2021-12-21 | A Process is No One Hunting for Token Manipulation | 54:06 | 1 | |
|
2021-12-21 | Passive Fingerprinting of HTTP 2 Clients | 48:26 | 2 | |
|
2021-12-21 | CALDERA Automating Adversary Emulation | 52:13 | 9 | |
|
2021-12-21 | Lost in Transaction Process Doppelgänging | 48:51 | 9 | |
|
2021-12-21 | Red Team Techniques for Evading, Bypassing & Disabling MS | 57:55 | 7 | |
|
2021-12-21 | A Retrospective Case Study of VMware Guest to Host Escape Vulnerabilities | 56:26 | 7 | |
|
2021-12-21 | CLKscrew Exposing The Perils of Security Oblivious Energy Management | 54:28 | 2 | |
|
2021-12-21 | Hiding PIN's Artifacts to Defeat Evasive Malware | 55:12 | 1 | |
|
2021-12-21 | Rootten Apples Vulnerability Heaven in the iOS Sandbox | 50:13 | 3 | |
|
2021-12-21 | A Universal Controller to Take Over a Z Wave Network | 20:12 | 2 | |
|
2021-12-21 | Day 1 Keynote Diplomacy and Combating Evolving International Cyber Threats | 1:00:36 | 0 | |
|
2021-12-21 | Attacking NextGen Roaming Networks Black Hat - Europe - 2017 | 59:41 | 2 | |
|
2021-12-21 | How Samsung Secures Your Wallet and How To Break It | 1:02:17 | 1 | Guide |
|
2021-12-21 | The Spear to Break the Security Wall of S7Commplus | 29:10 | 6 | |
|
2021-12-21 | Attacks Against GSMA's M2M Remote Provisioning | 29:56 | 20 | |
|
2021-12-21 | How to Hack a Turned Off Computer, or Running Unsigned Code in Intel Management Engine | 46:58 | 10 | Guide |
|
2021-12-21 | Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing | 44:59 | 0 | |
|
2021-12-21 | A POS Breach Investigation Kevin Strickland YouTube | 50:19 | 2 | |
|
2021-12-21 | Black Box Mac OSX Forensics Brian Martin | 1:34:32 | 9 | |
|
2021-12-21 | New results in password hash reversal Mark Sanders | 58:42 | 1 | |
|
2021-12-21 | The Cox Fight and Beyond Kodi the Brave New World of Copyright Infringement and ISP Liability Al | 56:52 | 3 | |
|
2021-12-21 | Real World Examples of IT Risks Fred Reck | 48:07 | 2 | |
|
2021-12-21 | The first 48 All your data are belong to us Chad Gough Molody Haase Jared Sikorski | 44:54 | 3 | |
|
2021-12-21 | Road Ahead Ben Tice BloomCon - 2017 | 19:29 | 2 | |
|
2021-12-21 | Building a Scalable Vulnerability Management Program for Effective Risk Management Katie Perry | 49:14 | 8 | |
|
2021-12-21 | What Can my Logs Tell me Art Petrochenko | 1:00:31 | 1 | Vlog |
|
2021-12-21 | Deleted Evidence Fill in the Map to Luke Skywalker David Pany | 51:57 | 1 | |
|
2021-12-21 | Cryptography 0 to 128 in 50 Minutes Ben Tice YouTube | 58:19 | 3 | |
|
2021-12-21 | What is the size of a sparse file in NTFS John Riley | 55:32 | 5 | |
|
2021-12-21 | Honey I Stole Your C2 Server A dive into attacker infrastructure Andrew Rector | 31:24 | 6 | |
|
2021-12-21 | Deceptive Defence Daniel Negron | 46:44 | 0 | |
|
2021-12-21 | Lessons Learned from Pwning my University Aaron Thomas | 19:13 | 3 | |
|
2021-12-21 | Windows Event Logs Zero to Hero Nate Guagenti Adam Swan | 56:14 | 17 | Vlog |
|
2021-12-21 | Math and Cryptography Sam Gross | 1:01:08 | 7 | |
|
2021-12-21 | Abusing Google Dorking and Robotstxt Dave Comstock fixed by Frank Trezza | 17:37 | 2 | |
|
2021-12-21 | Abusing Google Dorking and Robotstxt Dave Comstock | 17:37 | 2 | |
|
2021-12-21 | APT What the heck is an APT Bill Barnes | 24:52 | 0 | |
|
2021-12-21 | Securely Deleting Data from SSDs Stephen Larson | 32:18 | 9 | |
|
2021-12-21 | Strange times we live in Alexander Muentz | 58:33 | 7 | |
|