2023-05-11 | Eliminating Input Based Attacks by Deriving Encoders and Decoders from CFGs | 24:30 | 0 | |
|
2023-05-11 | Embedded Nom a case study of memory safe parsing in resource constrained environments | 26:31 | 1 | |
|
2023-05-11 | Hardware Enforcement of Walther Recursive Program Functions | 14:33 | 0 | |
|
2023-05-11 | How the BIOS assures its handling of inputs | 36:08 | 1 | |
|
2023-05-11 | IDE Plugins for Detecting Input Validation Vulnerabilities | 13:23 | 0 | |
|
2023-05-11 | Lua code security overview and practical approaches to static analysis | 15:53 | 2 | |
|
2023-05-11 | Programming Languages for High Assurance Vehicles | 30:07 | 0 | |
|
2023-05-11 | Slow But Steady Achieving Real Security Within Two Decades | 1:06:30 | 0 | |
|
2023-05-11 | Taming the Length Field in Binary Data Calc Regular Languages | 22:07 | 0 | |
|
2023-05-11 | Writing parsers like it is 2017 | 28:26 | 0 | |
|
2023-05-10 | The Rise Of Supply Chain Attacks What Can We Do by Blessing Usoro | 28:30 | 2 | |
|
2023-05-10 | A Cybersecurity Imagery Problem And What We Can Do About It by Dr Victoria Baines | 30:06 | 6 | |
|
2023-05-10 | Cyber Harms Vs The Myths by Ciaran Martin | 28:10 | 0 | |
|
2023-05-10 | Cyber Immunity For Cyber Age by Eugene Kaspersky | 29:17 | 1 | |
|
2023-05-10 | Cyber Security Lessons Learned From Covid by Brian Honan | 27:41 | 2 | |
|
2023-05-10 | fileference Opening by Gordon Smith & Brian Honan | 7:39 | 0 | |
|
2023-05-10 | From RATs To Extorting Multibillion Companies The Evolution Of A Ransomware Group by Bob McArdle | 29:51 | 4 | |
|
2023-05-10 | From Zero To Full Domain Admin Tracking The Digital Footprint Of A Ransomware Attack by Joe Carson | 30:58 | 2 | |
|
2023-05-10 | How EC3 Supports Member States To Combat Cybercime by Philipp Amann | 30:10 | 4 | |
|
2023-05-10 | Overview Of The Recommendations Of The Ransomware Task Force by Jen Ellis | 30:32 | 3 | |
|
2023-05-10 | Ransomware On The Rise What You Need To Know And How To Combat It by Alistair Mills | 20:53 | 4 | Guide |
|
2023-05-10 | Sean Newman Security Think Differently | 29:08 | 0 | |
|
2023-05-10 | Brian Honan | 16:37 | 2 | |
|
2023-05-10 | Cyber Challenge 2013 | 2:20 | 1 | |
|
2023-05-10 | Dr Jessica Barker Attitudes and Behaviours in Cyber Security | 32:01 | 1 | |
|
2023-05-10 | Overview of 2013 IRISS Conference | 2:08 | 0 | |
|
2023-05-10 | Year in Review & Key Threats to Ireland by Brian Honan | 17:57 | 1 | Review |
|
2023-05-10 | Digital Barbarians at the Gate Winning at Cybersecurity in the Age of Cyber | 30:39 | 2 | |
|
2023-05-10 | fileference Opening by Gordon Smith | 8:29 | 0 | |
|
2023-05-10 | Gamification And how it applies to you by Maria Hyland | 28:56 | 0 | |
|
2023-05-10 | Getting into the infosec industry from different directions by T Langford & L Munson | 27:48 | 1 | |
|
2023-05-10 | How I rob banks by Freakyclown | 41:04 | 0 | |
|
2023-05-10 | Incident Response Lessons from the trenches by David Stubley | 32:01 | 1 | |
|
2023-05-10 | Mahkra ni Orroz by Chris Boyd | 37:48 | 1 | |
|
2023-05-10 | Protecting what matters cyber security lessons from surviving an earthquake | 25:21 | 0 | |
|
2023-05-10 | Putting the human back on the robot by Quentyn Taylor | 26:31 | 0 | |
|
2023-05-10 | The human nature of cyber security by Jessica Barker | 28:35 | 0 | |
|
2023-05-10 | Trusting Security In A Zero Trust World Wendy Nather | 34:07 | 1 | |
|
2023-05-10 | Advanced Persistent Security Ira Winkler | 28:41 | 1 | |
|
2023-05-10 | All Your Bayes Are Belong To Us Lessons Learned From Fighting Spam Martijn Grooten | 26:08 | 1 | |
|
2023-05-10 | Attack Surface Visibility Hide & Seek Eoin Keary | 24:09 | 0 | |
|
2023-05-10 | Barbarians In The Throneroom Dave Lewis | 26:49 | 0 | |
|
2023-05-10 | fileference Closing Gordon Smith | 1:06 | 0 | |
|
2023-05-10 | fileference Opening Gordon Smith | 6:31 | 0 | |
|
2023-05-10 | IRISSCert Year In Review And Key Threats To Ireland Brian Honan | 11:17 | 0 | Review |
|
2023-05-10 | Security Outside The Box Bob McArdle | 27:12 | 0 | |
|
2023-05-10 | The Evolving Role Of The CISO Jacky Fox | 25:54 | 0 | |
|
2023-05-10 | The Past, Present, And Future Of Information Security Jack Daniel | 27:42 | 0 | Guide |
|
2023-05-10 | Trust And Bonfire Of The Profanities Dave Lewis | 28:06 | 0 | |
|
2023-05-10 | A Social Engineers Guide To Deception Understanding How Humans Lie Jenny Radcliffe | 31:06 | 1 | Guide |
|
2023-05-10 | Are Humans A Vulnerability Emma Heffernan | 17:17 | 1 | |
|
2023-05-10 | fileference Closing Gordon Smith | 1:39 | 1 | |
|
2023-05-10 | fileference Opening Gordon Smith | 6:41 | 1 | |
|
2023-05-10 | IRISSCERT Year In Review And Key Threats To Ireland Brian Honan | 18:34 | 0 | Review |
|
2023-05-10 | Not All Cyber Criminals Are Evil Geniuses Graham Cluley | 35:07 | 1 | |
|
2023-05-10 | Patches Will Fail Us The Future Of IT Defence Kirils Solovjovs | 26:33 | 0 | |
|
2023-05-10 | Security And Privacy In Healthcare The Good, The Bad And The Ugly Jelena Milosevic | 35:16 | 0 | |
|
2023-05-10 | State Of Cybersecurity Report Extended Play Dan Raywood | 25:04 | 0 | |
|
2023-05-10 | Technology Ireland ICT Skillnet Carmel Somers | 11:44 | 1 | Vlog |
|
2023-05-10 | They're All Wankers A Look At The Role Of Masturbation In Online Offending NSFW Mick Moran | 41:16 | 1 | |
|
2023-05-09 | Robert McArdle Scada Systems | 31:36 | 2 | |
|
2023-05-09 | Void Balaur A Cyber Mercenary From The Underground by Feike Hacquebord | 45:59 | 1 | |
|
2023-05-09 | Loose Lips Might Sink Clouds by Jason Hill and Dvir Sason | 46:48 | 2 | |
|
2023-05-09 | Managing Large Scale Response by Mathias Fuchs | 53:12 | 0 | |
|
2023-05-09 | Noise And Signals Digging Through Threat And APT stories by Marco Preuss | 52:17 | 3 | |
|
2023-05-09 | Practical Bruteforce Of Military Grade AES 1024 by Sylvain Pelissier and Boi Sletterink | 53:28 | 1 | |
|
2023-05-09 | Practical Exploitation Of Zigbee Networks With RF Transceivers by Nitin Lakshmanan & Sunil Kumar | 38:56 | 0 | |
|
2023-05-09 | Raising Employee Awareness Which Training Strategy To Go For by Eric Bärenzung | 36:11 | 0 | |
|
2023-05-09 | Ransomware Encryption Internals A Behavioral Characterization by Antonio Cocomazzi | 54:57 | 0 | |
|
2023-05-09 | REW sploit Dissect Payloads With Ease by Cesare Pizzi | 45:45 | 0 | |
|
2023-05-09 | Securing Critical Infrastructures With Fortinet by Dino Boris Dougoud | 46:42 | 3 | |
|
2023-05-09 | Stop This Car GTFO by Karim Sudki | 49:23 | 1 | |
|
2023-05-09 | Symbolic Execution Demystified by Jannis Kirschner | 45:10 | 1 | |
|
2023-05-09 | The Nym Network Deep dive by Simon Wicky | 43:39 | 2 | |
|
2023-05-09 | Two Bugs To Rule Them All Taking Over The PHP Supply Chain by Thomas Chauchefoin | 47:30 | 0 | |
|
2023-05-09 | Ming Chow Packet Analysis Using Wireshark | 1:00:44 | 1 | |
|
2023-05-09 | Ryan Castellucci Modern TCPIP, Simplified | 47:41 | 0 | |
|
2023-05-09 | Savino Jossi Reversing 101 for CTFs | 59:30 | 1 | |
|
2023-05-09 | Phillip Wylie The Pentester Blueprint A Guide to Becoming a Pentester | 54:08 | 1 | Guide |
|
2023-05-09 | Tabitha Sable Introductory Network Vulnerability Scanning | 31:07 | 0 | |
|
2023-05-09 | TC Johnson Stuff I Wish I’d Been Taught in Linux 101 | 1:01:43 | 1 | |
|
2023-05-09 | Brett S Open Source Intelligence A Usually Reliable Source | 45:29 | 0 | |
|
2023-05-09 | C Malia Tingler, CAMS Identity and Access Management IAM for Newbies | 24:54 | 3 | |
|
2023-05-09 | Chris Elgee Poking Web Apps | 57:22 | 0 | |
|
2023-05-09 | Collin meta nontechnical tips for enhancing an infosec career | 31:30 | 0 | |
|
2023-05-09 | Daniel Gordon Threat Intelligence 101 | 26:36 | 0 | |
|
2023-05-09 | Dorothea Salo Talk the talk Information security jargon | 25:36 | 1 | Guide |
|
2023-05-09 | Dusty Miller Sysmon Deep Dive | 22:42 | 1 | |
|
2023-05-09 | Fynn Fabry I can has Linux | 29:18 | 0 | |
|
2023-05-09 | glitch Building Your Blue Team Arsenal | 23:08 | 1 | |
|
2023-05-09 | Hammerton Mwawuda Setting up a Virtual Pentesting Lab with Vagrant | 49:53 | 0 | |
|
2023-05-09 | Ian Coldwater Hello World | 46:10 | 3 | |
|
2023-05-09 | Joe Sarkisian JUST JUMP Lessons for Wannabe Social Engineers | 53:26 | 3 | |
|
2023-05-09 | Luke O'Brien & Harrison Whyton The life of an Apprentice in an Enterprise SOC | 25:58 | 1 | |
|
2023-05-05 | SAP Incident Response, real life examples on how to attack and defend Jordan Santarsieri | 50:17 | 12 | Guide |
|
2023-05-05 | Security by Design Reality vs Expectations Julien Patriarca, Wallix | 25:26 | 1 | |
|
2023-05-05 | A Brief History of CTF Jordan Wiens | 50:31 | 6 | |
|
2023-05-05 | Take or Buy Michael Hausding | 55:51 | 4 | |
|
2023-05-05 | A walk with Shannon A walkthrough of a pwn2own baseband exploit Amat Cama | 39:42 | 9 | Walkthrough |
|
2023-05-05 | Unboxing your virtualBox Niklas Baumstark | 45:26 | 0 | |
|