2023-05-05 | Abusing Android In app Billing feature Jérémy Matos | 52:20 | 0 | |
|
2023-05-05 | Unmasking stealth operations using UBA super powers Snir Ben Shimol, Varonis | 59:34 | 7 | |
|
2023-05-05 | Attacking NET deserialization Alvaro Muñoz | 38:47 | 0 | |
|
2023-05-05 | Using Artificial Intelligence to Predict Malicious Infrastructure Activity Staffan Truvé | 55:52 | 2 | |
|
2023-05-05 | Battle of the Smarts Hacking Smartphones with Bluetooth Smart Tal Melamed | 57:26 | 1 | |
|
2023-05-05 | DPAPI and DPAPI NG Decrypting All Users’ Secrets and PFX Passwords Paula Januszkewicz | 1:02:22 | 3 | |
|
2023-05-05 | Email SPFoofing modern email security features and how to break them Roberto Clapis | 34:38 | 3 | Guide |
|
2023-05-05 | GLibC Malloc for Exploiters Leak It, Write It, Become a Wizard Yannay Livneh | 46:41 | 2 | |
|
2023-05-05 | Hijacking the Boot Process, Ransomware Style Raul Alvarez, Fortinet | 49:13 | 3 | |
|
2023-05-05 | How to adapt the SDLC for DevSecOps Zane Lackey | 55:04 | 0 | Guide |
|
2023-05-05 | Least privilege security architecture for virtualization and cloud Ghaleb Zekri, VMware | 36:58 | 1 | |
|
2023-05-05 | Maximize the power of hex rays decompiler Igor Kirillov | 37:36 | 2 | |
|
2023-05-05 | Addressing privacy GDPR, Cloud, and You by Chris Esquire | 16:45 | 2 | |
|
2023-05-05 | What every IT Security Professional should know about the dark web by Mischa Peters, IntSights | 30:37 | 3 | |
|
2023-05-05 | Analyzing a Portable Wireless Storage Device From 0 to RCE by Qinghao Tang & Shuo Yuan, Qihoo 360 | 37:42 | 1 | |
|
2023-05-05 | On the Security of Dockless Bike Sharing Services by Antoine Neuenschwander @ant0inet | 14:00 | 0 | |
|
2023-05-05 | Attack surfaces of smart medical infrastructure by Denis Makrushin @difezza | 33:01 | 4 | |
|
2023-05-05 | Betrayed by the Android User Interface Why a Trusted UI Matters by Yanick Fratantonio @reyammer | 50:30 | 0 | |
|
2023-05-05 | Building a flexible hypervisor level debugger by Mathieu Tarral @mtarral | 51:33 | 2 | |
|
2023-05-05 | Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure | 56:29 | 1 | |
|
2023-05-05 | Cryptocurrency mobile malware by Axelle Apvrille @cryptax, Fortinet | 50:25 | 0 | |
|
2023-05-05 | Dear Blue Team Forensics Advice to Supercharge your DFIR capabilities by Joe Gray @c 3pjoe | 49:24 | 0 | |
|
2023-05-05 | Security Analysis on the Attack Surface of Blockchain Client by Chen Nan & Kame Wang, Tencent | 44:48 | 0 | |
|
2023-05-05 | Digitalisation demands defensive action by Daniel Caduff, FONES | 47:37 | 1 | |
|
2023-05-05 | Exploits in Wetware by Robert Sell @robertesell | 16:15 | 1 | |
|
2023-05-05 | Sneaking Past Device Guard by Philip Tsukerman @philiptsukerman, Cybereason | 45:30 | 2 | |
|
2023-05-05 | From the cloud to the internal network Offense vs Defense by Snir Ben Shimol, Varonis | 53:06 | 1 | |
|
2023-05-05 | Spyware, Ransomware and Worms How to prevent the next SAP tragedy by Jordan Santarcieri | 56:17 | 0 | Guide |
|
2023-05-05 | The Evolution of Cloud Threats by Paolo Passeri @paulsparrows, Netskope | 45:21 | 0 | |
|
2023-05-05 | Growing Hypervisor 0day with Hyperseed by Shawn Denbow @sdenbow , Microsoft | 43:57 | 1 | |
|
2023-05-05 | These are the Droids you are looking for security research on Android by Elena Kovakina, Google | 44:58 | 0 | |
|
2023-05-05 | Threat Hunting Research Methodology A Data Driven Approach by Roberto & Jose Luis Rodriguez | 1:03:05 | 0 | Vlog |
|
2023-05-05 | How to investigate iOS devices by Paul Rascagneres @r00tbsd, Talos | 34:45 | 0 | Guide |
|
2023-05-05 | Turning your BMC into a revolving door the HPE iLO case by Alexandre Gazet, Fabien Perigaud | 50:00 | 0 | |
|
2023-05-05 | Keynote Medieval Castles and Modern Servers by Christian Folini @ChrFolini | 53:19 | 0 | |
|
2023-05-05 | Vulnerabilities of mobile OAuth 2 0 by Nikita Stupin, Mail ru | 34:53 | 0 | |
|
2023-05-05 | Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii | 45:08 | 0 | |
|
2023-05-05 | Let's hack the IoT Hub with Pwnhub dudes IoT Hub Exploitation by Jisub Kim @JisubK, Kanghyun Choi | 15:32 | 0 | |
|
2023-05-05 | NSX T Architecture & Benefits by Erik Bussink, VMware | 52:11 | 0 | |
|
2023-05-05 | Hunting For Bugs In Ethereum 2 0 by Denis Kolegov and JP Aumasson | 41:03 | 0 | |
|
2023-05-05 | It’s Raining Shells How To Find New Attack Primitives In Azure by Andy Robbins | 56:31 | 4 | Guide |
|
2023-05-05 | A Blackbox Fuzzer For Bypassing Rowhammer Mitigation On DDR4 DRAM by Patrick Jattke and Stijn Gunter | 1:00:25 | 0 | |
|
2023-05-05 | A Common Bypass Pattern To Exploit Modern Web Apps by Simon Scannell | 36:28 | 0 | |
|
2023-05-05 | A Framework To Improve Collaboration Between Lawmakers And Cybersecurity Experts by Chris Esquire | 41:50 | 0 | |
|
2023-05-05 | Adventurous Tales Of Online Voting In Switzerland by Christian Folini | 1:04:44 | 2 | |
|
2023-05-05 | Attacking Bluetooth LE Design And Impl In Mobile Wearables by Rahul Umapathi and Nitin Lakshmanan | 39:40 | 1 | |
|
2023-05-05 | Automatically Extracting Static Anti virus Signatures by Vladimir Meier | 44:24 | 0 | |
|
2023-05-05 | Breaking SecureBoot With SMM by Itai Liba & Assaf Carlsbad | 47:12 | 0 | |
|
2023-05-05 | Delegating Kerberos To Bypass Kerberos Delegation Limitation by Charlie Bromberg | 53:10 | 0 | |
|
2023-05-05 | Elevate your security in the cloud with Telsys and AWS by C Szajkowski and G Schmitt | 45:35 | 0 | |
|
2023-05-05 | Exploiting WebKit To Break Authentication And Authorization by Sachin Thakuri & Prakash Sharma | 31:48 | 1 | |
|
2023-05-05 | Forging Golden Hammer Against Android App Protections by Georges Bastien Michel | 1:08:04 | 3 | |
|
2023-05-05 | Hook, Line And Sinker Pillaging API Webhooks by Abhay Bhargav | 43:00 | 1 | |
|
2023-05-05 | How We've Built One Of The Most Secure Media Companies In The World by Andreas Schneider | 50:09 | 1 | |
|
2023-05-04 | Winn Schwartau, IW I O Modeled on Analogue Network Security | 45:27 | 2 | Vlog |
|
2023-05-04 | Christopher Paul, PhD Improving Assessment and Evaluation of DoD Efforts to Inform, | 57:27 | 1 | |
|
2023-05-04 | Dr Hans Mumm, Applying Complexity Leadership Theory to Drone Airspace Integration | 55:03 | 0 | |
|
2023-05-04 | Jorge Sebastiao, Middle East Cyberwar from a Middle East Perspective | 37:35 | 3 | |
|
2023-05-04 | Mark Hardy, Darren Fazino & Max Macrides Tactics for Disrupting Terrorist Operations | 31:25 | 2 | |
|
2023-05-04 | Matt Devost, An Overview I O IW, Russia, ISIS, Perception Management | 36:32 | 2 | |
|
2023-05-04 | Max Macrides, Freeing the Empire of the Mind Memetic Warfare and International Strategy | 36:15 | 0 | |
|
2023-05-04 | Mike Masucci, ISIS, Media Management, and Influence | 1:01:21 | 1 | |
|
2023-05-04 | Travis Hartman, Counter Forensics on the Internet of Things | 50:46 | 1 | |
|
2023-05-04 | The Prometheus Project Colin Williams | 57:14 | 0 | |
|
2023-05-04 | 27 Articles for the Cyber Insurgency Matt Dosmann | 39:11 | 0 | |
|
2023-05-04 | Commodity Crash Choose Your Own Adventure Max Macrides & Darren Fazzino | 18:39 | 0 | |
|
2023-05-04 | Cyber War in the Middle East An InfowarCon Update Jorge Sebastiao | 26:47 | 0 | Vlog |
|
2023-05-04 | DRONE WARS Threats, Vulnerabilities and Hostile Use of UAS Randall K Nichols | 54:47 | 2 | |
|
2023-05-04 | DRONE WARSPolicy,Technology,Defense,Privacy,Surveillance,Espionage&Cyber Kinetic War Dr Hans Mumm | 1:02:16 | 0 | Vlog |
|
2023-05-04 | High Culture Wars Michael J Masucci, JD & Kate Johnson | 1:01:56 | 0 | |
|
2023-05-04 | Infowarcon 16 Wrap Up | 18:42 | 0 | |
|
2023-05-04 | The Financial Impacts of Asymmetric Actors Scott Borg | 54:56 | 0 | |
|
2023-05-04 | Welcome Alain Mowat | 13:10 | 0 | |
|
2023-05-04 | A new source of trouble Amat Cama | 36:54 | 0 | |
|
2023-05-04 | Automating computer security Tyler Nighswander | 47:37 | 1 | |
|
2023-05-04 | Bridging the Gap Stefan Lüders | 1:02:48 | 1 | |
|
2023-05-04 | DevOops Redux Chris Gates | 0:31 | 0 | |
|
2023-05-04 | Dissecting a Metamorphic File Infecting Ransomware Raul Alvarez | 41:47 | 0 | |
|
2023-05-04 | Modern reconnaissance phase on APT Paul Rascagnères | 38:55 | 1 | |
|
2023-05-04 | RHME2 CTF challenges and solutions Eloi Sanfèlix & Andres Moreno | 49:46 | 0 | |
|
2023-05-04 | Secret In me Florian Gaultier | 37:31 | 0 | |
|
2023-05-04 | Microarchitectural Attacks and the Case of Meltdown and Spectre Daniel Gruss | 58:09 | 7 | |
|
2023-05-04 | Using Artificial Intelligence to Predict Malicious Infrastructure Activity Staffan Truvé | 55:52 | 0 | |
|
2023-05-04 | Ph0wn smart devices CTF Behind the Scenes Axelle Apvrille & Philippe Paget | 57:25 | 0 | |
|
2023-05-04 | Quantum Cyber Blochain IoT Jean Philippe Aumasson | 51:22 | 1 | |
|
2023-05-04 | Reducing the Cyber Exposure Gap from Cloud to Containers Thomas Cueni, Tenable | 49:23 | 0 | |
|
2023-05-04 | 5G Machine Learning Craig Gibson, Trend Micro | 58:26 | 2 | |
|
2023-05-04 | SAP Incident Response, real life examples on how to attack and defend Jordan Santarsieri | 50:17 | 1 | Guide |
|
2023-05-04 | A Brief History of CTF Jordan Wiens | 50:31 | 0 | |
|
2023-05-04 | A walk with Shannon A walkthrough of a pwn2own baseband exploit Amat Cama | 39:42 | 0 | Walkthrough |
|
2023-05-04 | Security by Design Reality vs Expectations Julien Patriarca, Wallix | 25:26 | 0 | |
|
2023-05-04 | Take or Buy Michael Hausding | 55:51 | 0 | |
|
2023-05-04 | Abusing Android In app Billing feature Jérémy Matos | 52:20 | 1 | |
|
2023-05-04 | Unboxing your virtualBox Niklas Baumstark | 45:26 | 0 | |
|
2023-05-04 | Attacking NET deserialization Alvaro Muñoz | 38:47 | 0 | |
|
2023-05-04 | Battle of the Smarts Hacking Smartphones with Bluetooth Smart Tal Melamed | 57:26 | 0 | |
|
2023-05-04 | Unmasking stealth operations using UBA super powers Snir Ben Shimol, Varonis | 59:34 | 1 | |
|
2023-05-04 | DPAPI and DPAPI NG Decrypting All Users’ Secrets and PFX Passwords Paula Januszkewicz | 1:02:22 | 0 | |
|
2023-05-04 | Email SPFoofing modern email security features and how to break them Roberto Clapis | 34:38 | 1 | Guide |
|
2023-05-04 | GLibC Malloc for Exploiters Leak It, Write It, Become a Wizard Yannay Livneh | 46:41 | 0 | |
|