2023-05-04 | Hijacking the Boot Process, Ransomware Style Raul Alvarez, Fortinet | 49:13 | 1 | |
|
2023-05-04 | How to adapt the SDLC for DevSecOps Zane Lackey | 55:04 | 1 | Guide |
|
2023-05-04 | Least privilege security architecture for virtualization and cloud Ghaleb Zekri, VMware | 36:58 | 0 | |
|
2023-05-04 | Maximize the power of hex rays decompiler Igor Kirillov | 37:36 | 0 | |
|
2023-05-04 | Travis Hartman Espionage and Data Extrication from High Security Environments | 36:02 | 3 | |
|
2023-05-04 | Capt G Mark Hardy USN, Ret Weaponizing Digital Currency | 56:28 | 0 | |
|
2023-05-04 | Dan Kuehl IO IW Education Two Decades of Successes and Failures | 48:05 | 0 | |
|
2023-05-04 | Georgia Weidman Exploiting BYOD for Network Infiltration | 58:42 | 0 | |
|
2023-05-04 | Jacob Loukkula Building WMDs at Costco for the Poor Man's Terrorist | 1:11:22 | 0 | |
|
2023-05-04 | Jorge Sebastio Middle East Cyberwar from a Middle Eastern Perspective | 43:58 | 0 | |
|
2023-05-04 | Patrick J Scribner Why IO Policy is Wrong for the Future | 24:00 | 7 | |
|
2023-05-04 | Paul Coggin Basic Persistent Threats to the Digital Energy Sector | 56:08 | 4 | |
|
2023-05-04 | Scott Borg Quantifying the Risks of New Technology Deployment | 54:01 | 3 | Vlog |
|
2023-05-03 | TRAILER PART 1 FOR THE GLORY OF THE STATE MACHINE | 2:09 | 7 | |
|
2023-05-03 | Web Hacking Training Trailer | 2:19 | 1 | |
|
2023-05-03 | Speakers Trailer | 1:45 | 0 | |
|
2023-05-03 | Pwning AWS Cloud Services Presented by Mohammed Aldoub | 48:36 | 4 | |
|
2023-05-03 | Office IoT The Elephant In the Room Presented by Quentyn Taylor | 35:24 | 0 | |
|
2023-05-03 | P@ssword Making & Breaking Presented by Will Hunt | 48:09 | 2 | |
|
2023-05-03 | Real Hardware Hacking for S$30 or Less Presented by Joe FitzPatrick | 45:01 | 5 | |
|
2023-05-03 | Reskinning the Robot Things I Would Love to Tell My Younger Self Presented by Quentyn Taylor | 36:32 | 1 | |
|
2023-05-03 | A Red Team Perspective to Research Presented by Vincent Yiu Updated Version Available | 38:27 | 1 | Vlog |
|
2023-05-03 | A Red Team Perspective to Research Presented by Vincent Yiu | 38:27 | 1 | |
|
2023-05-03 | Speed Up Recon & Pwn on Bug Bounty Build Your Own Tool by Igor Lyrchikov & Egor Satlykov | 36:10 | 6 | |
|
2023-05-03 | Analyzing Kony Mobile Applications Presented by Terry Chia | 36:15 | 0 | |
|
2023-05-03 | The Art of Persistence Lurking Behind the Browser Presented by Samuel Pua | 35:36 | 1 | |
|
2023-05-03 | The State of AI Assisted Fuzzing & Program Analysis Presented by Clarence Chio | 47:08 | 1 | |
|
2023-05-03 | Attacking Offensively for Defense Presented by Keith Rayle | 43:02 | 1 | |
|
2023-05-03 | Body Language Behind Social Engineering Attacks Presented by Sarka Pekrova | 33:48 | 1 | |
|
2023-05-03 | You Are Not Hiding From Me NET Presented by Aden Chung | 29:58 | 0 | |
|
2023-05-03 | Cloudy Clusters Catastrophe Presented by Rory McCune | 42:57 | 0 | |
|
2023-05-03 | Data Breaches Barbarians In the Throne Room Presented by Dave Lewis | 32:27 | 0 | |
|
2023-05-03 | Designing Secure Systems Value Driven Threat Modeling Presented by Avi Douglen | 49:50 | 1 | |
|
2023-05-03 | Do You See What They See Asset Discovery In the Age of Security Automation by Isaac Dawson | 29:22 | 4 | |
|
2023-05-03 | Exploiting Windows Vista Resource Virtualization Presented by James Forshaw | 52:58 | 1 | |
|
2023-05-03 | Gargoyle Hunting In Depth Presented by Aliz Hammond | 47:19 | 0 | |
|
2023-05-03 | Infosec In the City Singapore 2019 Highlights | 2:11 | 0 | |
|
2023-05-03 | Native Mobile Botnet & Anti Botnet Solutions Presented by Ron Munitz | 49:16 | 0 | |
|
2023-05-03 | SINCON 2020 Sponsor Horangi Cyber Security | 6:15 | 0 | |
|
2023-05-03 | SINCON 2020 Sponsor Trend Micro | 3:37 | 1 | |
|
2023-05-03 | SINCON 2020 Sponsor Panasonic | 2:01 | 0 | |
|
2023-05-03 | SINCON 2020 Sponsor YesWeHack | 14:39 | 0 | |
|
2023-05-03 | SINCON 2020 Sponsor SecureAge Technology | 10:50 | 0 | Vlog |
|
2023-05-03 | SINCON 2020 Car Security Diary Our Connected Vehicle Journey by Alina Tan, Edmund Lim & Tan Pei | 24:06 | 0 | |
|
2023-05-03 | SINCON 2020 From Zero to Hero ish Your Journey to Car Hacking Begins | 1:28:01 | 0 | |
|
2023-05-03 | SINCON 2020 Main Stage Day 1 | 9:24:25 | 2 | |
|
2023-05-03 | SINCON 2020 Main Stage Day 2 | 7:07:40 | 1 | |
|
2023-05-03 | SINCON 2020 Phishing Made Easy SniperPhish A Web Email Spear Phishing Toolkit | 1:31:20 | 6 | |
|
2023-05-03 | SINCON 2020 Treasure Maps The Hidden Paths to Finding Information | 41:45 | 8 | Guide |
|
2023-05-03 | SINCON 2020 Welcome & Opening Address | 15:57 | 1 | |
|
2023-05-03 | SINCON 2020 Who Stole my $100K's Worth Bitcoin Wallets Catch Them All With New Deceptive Bait | 38:19 | 2 | |
|
2023-05-03 | SINCON 2020 Writing Wireshark Plugins for Security Analysis by Nishant Sharma & Jeswin Mathai | 52:04 | 0 | |
|
2023-05-03 | SINCON 2020 Keynote Cyber Immunity for Cyber Age by Eugene Kaspersky | 3:32 | 1 | |
|
2023-05-03 | SINCON 2020 Keynote Hack for Good Why the Future Needs Hackers by Alex Rice | 44:46 | 0 | |
|
2023-05-03 | SINCON 2020 Sponsor eShard | 1:52 | 1 | |
|
2023-05-03 | CXO Key Considerations for Securing Your Cloud Environment by Raphaël Peyret | 4:48 | 0 | |
|
2023-05-03 | CXO Locking In On Ransomware by Chris Connell | 10:55 | 1 | |
|
2023-05-03 | CXO Securing Identities & Zero Trust by Samuel Evans, Stephen Swann & Ketan Kapadia | 7:12 | 0 | |
|
2023-05-03 | Threat Hunting No Longer a Want, But a Need by Harvey Goh | 34:47 | 2 | |
|
2023-05-03 | CXO Shift Left & What Is Driving a View Towards Modernity in Cyber by Niel Pandya | 8:28 | 0 | |
|
2023-05-03 | CXO The Evolving Role of a CISO by Lim Quan Heng | 6:04 | 0 | |
|
2023-05-03 | Enabling a Secure Software Supply Chain for Business Resiliency Niel Pandya & Jeremy Chua | 28:58 | 2 | |
|
2023-05-03 | Welcome & Opening Address | 16:09 | 1 | |
|
2023-05-03 | filetinuous Security Building Security Into Your Pipelines by Vandana Verma & DeveloperSteve | 32:49 | 1 | |
|
2023-05-03 | Infosec In the City, SINCON 2021 Conference Highlights Behind the Scenes | 2:13 | 0 | |
|
2023-05-03 | Intro to In Vehicular Networks IVN & Free CAN Bus Tools by Kamel Ghali | 46:02 | 7 | |
|
2023-05-03 | From Codes to Cold Cash The $1B Carbanak Heist by Yeo Siang Tiong | 14:52 | 0 | |
|
2023-05-03 | Keynote Blind Spots of Platform Security by Alex Matrosov | 35:40 | 1 | |
|
2023-05-03 | 2 Questions to Identify If Your Company Needs Cybersecurity by Ethan Seow | 24:55 | 0 | |
|
2023-05-03 | 7 Steps to Enter a Cybersecurity Career by Ethan Seow | 28:41 | 0 | |
|
2023-05-03 | Keynote Strengthening ICT Supply Chain Resilience by Genie Gan | 7:33 | 0 | |
|
2023-05-03 | Mobile App Hardening Against Reverse Engineering Attacks by Gautam Arvind Pandian & Vikas Gupta | 44:37 | 0 | |
|
2023-05-03 | An Exposé of the Criminal Underground by Aaron Aubrey Ng | 42:27 | 0 | |
|
2023-05-03 | Ransomware Exploded Modern Defences Against a Technological Plague by Chester Wisniewski | 51:51 | 1 | Vlog |
|
2023-05-03 | SASE as a Menu, Not a Recipe by Mark Guntrip | 24:49 | 0 | |
|
2023-05-03 | APAC Cyber Readiness & Capacity Building by Genie Gan | 16:02 | 0 | |
|
2023-05-03 | Bringing the x86 Complete Reverse Engineering Experience to Smart Contract by xwings & Wu Chen Xu | 37:11 | 5 | |
|
2023-05-03 | Scope X The Path to Surprise Breaches by Dr Meisam Eslahi | 21:00 | 1 | |
|
2023-05-03 | CXO A Special Forces Mindset to Cyber Warfare by Ben Sullivan | 7:38 | 4 | |
|
2023-05-03 | Security Observations in 2021 by Jonar Marzan | 13:02 | 2 | |
|
2023-05-03 | CXO Cyber Risk Success Criteria for Your Boards by Shamane Tan | 6:28 | 1 | |
|
2023-05-03 | Side Channel Attacks at the Age of Deep Learning by Benjamin Timon | 44:14 | 3 | |
|
2023-05-03 | The Game of Cyber Chess Cyber Mayday & the Day After by Shamane Tan | 26:28 | 3 | |
|
2023-05-01 | IRTF Open Session | 2:29:55 | 1 | |
|
2023-05-01 | ACM, IRTF & Internet Society Applied Networking Research Workshop 2017 Part 1 | 1:31:14 | 1 | |
|
2023-05-01 | ACM, IRTF & Internet Society Applied Networking Research Workshop 2017 Part 2 | 1:24:41 | 1 | |
|
2023-05-01 | ACM, IRTF & ISOC Applied Networking Research Workshop 2017 Part 3 | 1:06:13 | 1 | |
|
2023-05-01 | ACM, IRTF & ISOC Applied Networking Research Workshop 2017 Part 4 | 1:11:17 | 0 | |
|
2023-05-01 | IRTF Open session at IETF 106 | 2:02:35 | 1 | |
|
2023-05-01 | Rusty Wagner & Jordan Wiens Hacking Games in a Hacked Game | 57:26 | 3 | |
|
2023-05-01 | Alex Ionescu Insection AWEsomely Exploiting Shared Memory Objects | 1:04:36 | 0 | |
|
2023-05-01 | Braden Thomas Technical Keynote Practical Attacks on DOCSIS | 56:25 | 0 | |
|
2023-05-01 | Infiltrate2015 BJJ Open Mat Part 1 | 18:38 | 7 | |
|
2023-05-01 | Infiltrate2015 BJJ Open Mat part 2 | 5:31 | 2 | |
|
2023-05-01 | Jacob Torrey HARES Hardened Anti Reverse Engineering System | 50:55 | 1 | |
|
2023-05-01 | James Forshaw A Link to the Past Abusing Symbolic Links on Windows | 54:18 | 1 | |
|
2023-05-01 | Joaquim Espinhara & Rafael Silva MIMOSAWRITERROUTER Abusing EPC on Cisco Router to collect dat | 31:02 | 5 | |
|
2023-05-01 | Nathan Rittenhouse Problems in Symbolic Fuzzing | 58:14 | 0 | |
|
2023-05-01 | Neil Archibald Modern Objective C Exploitation | 43:22 | 3 | |
|
2023-05-01 | Patrick Wardle Writing Bad@ss OS X Malware | 58:03 | 0 | |
|