2021-11-12 | VCAF Expanding the ATT&CK Framework to cover VERIS Threat Action Varieties ATT&CKcon 2018 | 26:19 | 3 | |
|
2021-11-12 | Analyzing Targeted Intrusions Through the Lens of the ATT&CK Framework | 31:57 | 1 | |
|
2021-11-12 | Vendor Panel Discussion ATT&CKcon 2018 | 47:00 | 3 | Discussion |
|
2021-11-12 | ATT&CK as a Teacher ATT&CKcon 2018 | 14:28 | 2 | |
|
2021-11-12 | Building an Atomic Testing Program ATT&CKcon 2018 | 13:27 | 0 | |
|
2021-11-12 | Decision Analysis Applications in Threat Analysis Frameworks ATT&CKcon 2018 | 13:30 | 3 | |
|
2021-11-12 | Detection Philosophy, Evolution & ATT&CK | 5:17 | 0 | |
|
2021-11-12 | End User Panel Discussion ATT&CKcon 2018 | 42:32 | 6 | Discussion |
|
2021-11-12 | From Red VS Blue to Red Loves Blue ATT&CKcon 2018 | 28:26 | 1 | |
|
2021-11-12 | From Technique to Detection ATT&CKcon 2018 | 6:55 | 0 | |
|
2021-11-12 | Helping Your Non Security Executives Understand ATT&CK in 10 Minutes or Less ATT&CKcon 2018 | 16:20 | 1 | |
|
2021-11-12 | How Did We Get Here ATT&CKcon 2018 | 30:57 | 0 | |
|
2021-11-12 | AtlSecCon 2019 Eldar Marcussen Lessons learned from bug hunting and disclosure | 50:45 | 8 | |
|
2021-11-12 | AtlSecCon 2019 Dave Lewis Zero Trust and the Flaming Sword of Justice | 40:02 | 0 | |
|
2021-11-12 | AtlSecCon 2019 Opening Keynote Cliff Stoll | 1:14:26 | 82 | |
|
2021-11-12 | AtlSecCon 2019 Closing Keynote Cory Doctorow | 53:20 | 17 | |
|
2021-11-12 | AtlSecCon 2019 Opening Keynote Jean Michel Blais | 53:35 | 4 | |
|
2021-11-12 | AtlSecCon 2019 Cheryl Biswas Don't Bring Me Down Weaponized Botnets | 45:55 | 3 | |
|
2021-11-12 | AtlSecCon 2019 Anna Manley Legal Implications of Vulnerability Exposure | 52:43 | 1 | |
|
2021-11-12 | AtlSecCon 2019 Closing Keynote Tanya Janca | 44:39 | 4 | |
|
2021-11-12 | AtlSecCon 2019 Jeff Man What Are We Doing Here Rethinking Security | 45:26 | 6 | |
|
2021-11-12 | AtlSecCon 2019 Colin O'Flynn MINimum Failure Breaking a Bitcoin Wallet | 27:20 | 2 | |
|
2021-11-12 | AtlSecCon 2019 Eric Conrad Build it Once, Build it Right Architecting for Detection | 41:45 | 12 | |
|
2021-11-12 | AtlSecCon 2018 Opening Remarks & Keynote Ted Demopoulos | 1:12:52 | 3 | |
|
2021-11-12 | AtlSecCon 2018 Matias Katz Medical Records on the Black Market | 32:54 | 2 | |
|
2021-11-12 | AtlSecCon 2018 Mark Nunnikhoven The Paradox of CyberSecurity in Operational Technologies | 41:24 | 1 | Vlog |
|
2021-11-12 | AtlSecCon 2018 Geoffrey Vaughan Try Harder | 31:57 | 0 | |
|
2021-11-12 | AtlSecCon 2018 Tanya Janca Are you Ready for the Worst Application Security Incident Response | 49:10 | 4 | |
|
2021-11-12 | AtlSecCon 2018 Victoria McIntosh You're Going to Need a Bigger Privacy Plan Here Comes the GDPR | 43:22 | 0 | |
|
2021-11-12 | AtlSecCon 2018 Dave Lewis Data Breaches Barbarians in the Throne Room | 40:28 | 0 | |
|
2021-11-12 | AtlSecCon 2018 Tyler Parrott Introducing CSE Open Source AssemblyLine | 34:24 | 0 | |
|
2021-11-12 | AtlSecCon 2018 Anna Manley Terrorist Lunch Money The Law and Cryptocurrencies | 44:32 | 1 | |
|
2021-11-12 | AtlSecCon 2018 Cheryl Biswas Patching Show me Where it Hurts | 42:05 | 0 | |
|
2021-11-12 | AtlSecCon 2018 Justin Silbert Color Wars Examining Models for Blue and Red Team Collaboration | 29:03 | 0 | |
|
2021-11-12 | AtlSecCon 2018 Joe Gray DECEPTICON Deceptive Techniques to Derail OSINT Attempts | 36:15 | 6 | |
|
2021-11-12 | AthCon 2012 Venue into my work uncovering and exploiting zero days | 49:06 | 1 | |
|
2021-11-12 | AthCon 2012 Advances in BeEF RESTful API, WebSockets, XssRays enhancements | 45:50 | 2 | |
|
2021-11-12 | AthCon 2012 Preparing the CTF contest | 0:26 | 3 | |
|
2021-11-12 | AthCon 2012 CTF 1st day mp4 | 0:44 | 3 | |
|
2021-11-12 | AthCon 2012 Apple vs Google Client Platforms | 50:15 | 2 | |
|
2021-11-12 | AthCon 2012 Exploitation and State Machines | 42:28 | 4 | |
|
2021-11-12 | AthCon 2012 CTF Real Time Network Visual Effects | 0:54 | 4 | |
|
2021-11-12 | AthCon 2012 CTF Real Time Network Visual Effects 2 | 0:33 | 3 | |
|
2021-11-12 | AthCon 2011 Win32 Exploit Development with pvefindaddr Project Quebec | 1:19:54 | 6 | |
|
2021-11-12 | AthCon 2011 Enterprise Sharing Portal e g Microsoft Sharepoint, J2ee Liferay Portal | 42:53 | 4 | |
|
2021-11-12 | AthCon 2011 Exploiting Anti Reversing Techniques | 52:42 | 4 | |
|
2021-11-12 | AthCon 2011 Introducing The Parasite | 29:34 | 2 | |
|
2021-11-12 | AthCon 2011 When I Grow Up I Want to Be a Cyberterrorist | 49:21 | 1 | |
|
2021-11-12 | AthCon 2011 What You didn t know about Metasploit | 59:20 | 3 | |
|
2021-11-12 | AthCon 2011 Smartphone Malware Detection SMD | 26:43 | 1 | |
|
2021-11-12 | AthCon 2011 Pushing in dropping a load and pulling out quietly | 36:09 | 2 | |
|
2021-11-12 | AthCon 2011 Network Exploitation with Ncrack It s not about plain brute forcing anymore | 1:02:55 | 7 | |
|
2021-11-11 | AthCon 2010 Gone Rogue An Analysis of the Rogue Security Software Landscape | 29:04 | 6 | |
|
2021-11-11 | AthCon 2010 BNF Backus Naur Form Based Blackbox Fuzzing | 23:21 | 2 | |
|
2021-11-11 | AthCon 2010 Fuzzing The Past The Present And The Future | 30:56 | 0 | |
|
2021-11-11 | Athcon 2010 Authorization Attacks Using Session Hijacking | 19:33 | 1 | |
|
2021-11-11 | AthCon 2010 Alice Shares, Eve Reads Enumerating File Hosting Services | 21:10 | 6 | |
|
2021-11-11 | AthCon 2010 How to present a new release of a sql injection tool | 28:51 | 8 | Guide |
|
2021-11-11 | AthCon 2010 Extrusion Testing One Step Beyond | 19:36 | 2 | |
|
2021-11-11 | AthCon 2010 Got Database Access Own The Network | 35:47 | 1 | |
|
2021-11-11 | AthCon 2010 CyberWar Crime Connecting The Dots | 43:07 | 1 | |
|
2021-11-11 | AthCon 2010 Context Keyed Payload Encoding Fighting The Next Generation of IDS | 26:21 | 2 | |
|
2021-11-11 | Spagnuolo and Weichselbaum Defense In Depth Techniques For Modern Web Applications Area 41 2018 | 49:57 | 1 | |
|
2021-11-11 | Seongsu Park Anatomy Of Financial Attacks By The Lazarus Group Area 41 2018 | 51:49 | 13 | |
|
2021-11-11 | Pascal Junod Looking Into The White Box Area 41 2018 | 48:41 | 1 | |
|
2021-11-11 | Antoine Neuenschwander On The Security Of Dockless Bike Sharing Services Area 41 2018 | 40:54 | 14 | |
|
2021-11-11 | Pascal Gloor The Day You Got Hacked Area 41 2018 | 46:30 | 9 | |
|
2021-11-11 | Amit Dori Chrome & WebRTC eq Problems Area 41 2018 | 34:52 | 3 | |
|
2021-11-11 | Paolo Di Prodi The Future Of Threat Intelligence Platforms Area 41 2018 | 46:27 | 0 | |
|
2021-11-11 | Amanda Berlin Recovering From Years Of Security Debt Area 41 2018 | 53:15 | 1 | |
|
2021-11-11 | Thomas Debize Modern Pentest Tricks For Faster, Wider, Greater Engagements Area 41 2018 | 45:24 | 2 | |
|
2021-11-11 | Carel van Rooyen and Philipp Promeuschel Blame The Badge Area 41 2018 | 35:39 | 4 | |
|
2021-11-11 | Area41 Team Closing Ceremony Area 41 2018 | 21:54 | 1 | |
|
2021-11-11 | Thomas Chopitea The Story Of Greendale Area 41 2018 | 40:05 | 1 | |
|
2021-11-11 | Antoine Neuenschwander Web Cryptominers In The CH Zone Area 41 2018 | 39:36 | 2 | |
|
2021-11-11 | Stephan Gerling Swimming IoT Or How To Hack A Vessel Area 41 2018 | 53:32 | 4 | Guide |
|
2021-11-11 | Stefan Friedli and Michael Schneider Red Team Stories From The Trenches Area 41 2018 | 50:12 | 7 | |
|
2021-11-11 | Jérémy Matos Secure Messengers And Man In The Contacts Area 41 2018 | 45:39 | 0 | |
|
2021-11-11 | Intro final Area 41 2018 | 3:10 | 0 | |
|
2021-11-11 | Elliot Ward and Jake Humphries Smart = Secure Breaking Ethereum Smart Contracts Area 41 2018 | 51:59 | 5 | |
|
2021-11-11 | Dobin Rutishauser Fuzzing For Worms Area 41 2018 | 47:40 | 11 | |
|
2021-11-11 | Oliver Kunz Semi Offline Attack on the Android Full Disk Encryption | 47:08 | 22 | |
|
2021-11-11 | Matthias Ganz ROP mitigations and Control Flow Guard the end of code reuse attacks | 46:03 | 7 | |
|
2021-11-11 | Mark Baenziger An internally focused cyber threat intel program | 43:46 | 2 | |
|
2021-11-11 | Lukas Weichselbaum & Michele Spagnuolo Breaking Bad CSP | 54:12 | 2 | |
|
2021-11-11 | Veit Hailperin The Tale of a Fameless but Widespread Web Vulnerability Class | 40:09 | 3 | |
|
2021-11-11 | Tom Van Goethem Time is not on your side Exploiting browser based web timing attacks | 43:51 | 1 | |
|
2021-11-11 | Pascal Junod Are Crypto APIs Good Friends of Developers | 48:42 | 1 | |
|
2021-11-11 | Opening Ceremony | 17:13 | 1 | |
|
2021-11-11 | Gregor Jehle Human Trust vs The Distributed Device Nightmare | 33:56 | 7 | |
|
2021-11-11 | Dominique Cédric Brack Professional Social Engineering | 57:22 | 0 | |
|
2021-11-11 | Daniel Marner Internet of Things in our Smarthome Su casa es mi casa | 35:03 | 0 | |
|
2021-11-11 | Closing Ceremony | 27:33 | 0 | |
|
2021-11-11 | Christian Folini Core Rules Paranoia Mode | 48:22 | 1 | |
|
2021-11-11 | Axelle Apvrille Reversing Internet of Things from Mobile Applications | 45:10 | 12 | |
|
2021-11-11 | Antoine Neuenschwander & Roland Bischofberger With Great Power Comes Great Pwnage | 42:18 | 1 | |
|
2021-11-11 | Andrea Barisani USB armory the open source secure flash drive sized computer | 48:26 | 33 | |
|
2021-11-11 | Abraham Aranguren & Fabian Faessler Smart Sheriff, Dumb Idea | 44:13 | 20 | |
|
2021-11-11 | Aarno Aukia SecDevOps how to secure the DevOps tools | 47:12 | 11 | Guide |
|
2021-11-11 | Kelly Lum No Silver Bullets for Digital Vampires DLP Security for Mortals | 54:30 | 30 | |
|