Parent directory/ | - | - |
Analyzing a Portable Wireless Storage Device From 0 to RCE by Qinghao Tang & Shuo Yuan, Qihoo 360.eng.srt | 32.3 KiB | 2019 Oct 01 07:39 |
Vulnerabilities of mobile OAuth 2.0 by Nikita Stupin, Mail.ru.eng.srt | 43.7 KiB | 2019 Oct 01 07:39 |
Let's hack the IoT Hub with Pwnhub dudes IoT Hub Exploitation by Jisub Kim (@JisubK), Kanghyun Choi.eng.srt | 51.0 KiB | 2019 Oct 01 07:39 |
What every (IT Security) Professional should know about the dark web by Mischa Peters, IntSights.eng.srt | 51.0 KiB | 2019 Oct 01 07:39 |
Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.eng.srt | 60.1 KiB | 2019 Oct 01 07:39 |
Attack surfaces of smart medical infrastructure by Denis Makrushin (@difezza).eng.srt | 60.3 KiB | 2019 Oct 01 07:39 |
How to investigate iOS devices by Paul Rascagneres (@r00tbsd), Talos.eng.srt | 60.6 KiB | 2019 Oct 01 07:39 |
The Evolution of Cloud Threats by Paolo Passeri (@paulsparrows), Netskope.eng.srt | 60.8 KiB | 2019 Oct 01 07:39 |
Security Analysis on the Attack Surface of Blockchain Client by Chen Nan & Kame Wang, Tencent.eng.srt | 61.7 KiB | 2019 Oct 01 07:39 |
On the Security of Dockless Bike Sharing Services by Antoine Neuenschwander (@ant0inet).eng.srt | 61.8 KiB | 2019 Oct 01 07:39 |
These are the Droids you are looking for - security research on Android by Elena Kovakina, Google.eng.srt | 64.3 KiB | 2019 Oct 01 07:39 |
NSX-T Architecture & Benefits by Erik Bussink, VMware.eng.srt | 67.0 KiB | 2019 Oct 01 07:39 |
Sneaking Past Device Guard by Philip Tsukerman (@philiptsukerman), Cybereason.eng.srt | 70.7 KiB | 2019 Oct 01 07:39 |
Cryptocurrency mobile malware by Axelle Apvrille (@cryptax), Fortinet.eng.srt | 71.1 KiB | 2019 Oct 01 07:39 |
Keynote - Medieval Castles and Modern Servers by Christian Folini (@ChrFolini).eng.srt | 77.6 KiB | 2019 Oct 01 07:39 |
Turning your BMC into a revolving door the HPE iLO case by Alexandre Gazet, Fabien Perigaud.eng.srt | 80.6 KiB | 2019 Oct 01 07:39 |
Growing Hypervisor 0day with Hyperseed by Shawn Denbow (@sdenbow ), Microsoft.eng.srt | 84.0 KiB | 2019 Oct 01 07:39 |
Building a flexible hypervisor-level debugger by Mathieu Tarral (@mtarral).eng.srt | 84.5 KiB | 2019 Oct 01 07:39 |
Dear Blue Team Forensics Advice to Supercharge your DFIR capabilities by Joe Gray (@c 3pjoe).eng.srt | 84.6 KiB | 2019 Oct 01 07:39 |
Addressing privacy GDPR, Cloud, and You by Chris Esquire.eng.srt | 85.4 KiB | 2019 Oct 01 07:39 |
From the cloud to the internal network - Offense vs Defense by Snir Ben-Shimol, Varonis.eng.srt | 89.0 KiB | 2019 Oct 01 07:39 |
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarcieri.eng.srt | 94.0 KiB | 2019 Oct 01 07:39 |
Betrayed by the Android User Interface Why a Trusted UI Matters by Yanick Fratantonio (@reyammer).eng.srt | 97.3 KiB | 2019 Oct 01 07:39 |
Digitalisation demands defensive action by Daniel Caduff, FONES.eng.srt | 117.9 KiB | 2019 Oct 01 07:39 |
Threat Hunting Research Methodology A Data Driven Approach by Roberto & Jose Luis Rodriguez.eng.srt | 120.0 KiB | 2019 Oct 01 07:39 |
Exploits in Wetware by Robert Sell (@robertesell).eng.srt | 177.6 KiB | 2019 Oct 01 07:39 |
Attack surfaces of smart medical infrastructure by Denis Makrushin (@difezza).mp4 | 9.9 MiB | 2021 Oct 18 05:30 |
Exploits in Wetware by Robert Sell (@robertesell).mp4 | 16.2 MiB | 2021 Oct 18 05:30 |
Betrayed by the Android User Interface Why a Trusted UI Matters by Yanick Fratantonio (@reyammer).mp4 | 16.9 MiB | 2021 Oct 18 05:30 |
These are the Droids you are looking for - security research on Android by Elena Kovakina, Google.mp4 | 17.7 MiB | 2021 Oct 18 05:30 |
On the Security of Dockless Bike Sharing Services by Antoine Neuenschwander (@ant0inet).mp4 | 19.1 MiB | 2021 Oct 18 05:30 |
Security Analysis on the Attack Surface of Blockchain Client by Chen Nan & Kame Wang, Tencent.mp4 | 19.2 MiB | 2021 Oct 18 05:30 |
Addressing privacy GDPR, Cloud, and You by Chris Esquire.mp4 | 19.2 MiB | 2021 Oct 18 05:30 |
Cryptocurrency mobile malware by Axelle Apvrille (@cryptax), Fortinet.mp4 | 21.0 MiB | 2021 Oct 18 05:30 |
Wake up Neo detecting virtualization through speculative execution by Innokentii Sennovskii.mp4 | 21.3 MiB | 2021 Oct 18 05:30 |
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarcieri.mp4 | 21.4 MiB | 2021 Oct 18 05:30 |
Let's hack the IoT Hub with Pwnhub dudes IoT Hub Exploitation by Jisub Kim (@JisubK), Kanghyun Choi.mp4 | 24.1 MiB | 2021 Oct 18 05:30 |
Building a flexible hypervisor-level debugger by Mathieu Tarral (@mtarral).mp4 | 28.9 MiB | 2021 Oct 18 05:30 |
Digitalisation demands defensive action by Daniel Caduff, FONES.mp4 | 29.0 MiB | 2021 Oct 18 05:30 |
Sneaking Past Device Guard by Philip Tsukerman (@philiptsukerman), Cybereason.mp4 | 31.1 MiB | 2021 Oct 18 05:30 |
How to investigate iOS devices by Paul Rascagneres (@r00tbsd), Talos.mp4 | 31.6 MiB | 2021 Oct 18 05:30 |
Turning your BMC into a revolving door the HPE iLO case by Alexandre Gazet, Fabien Perigaud.mp4 | 40.9 MiB | 2021 Oct 18 05:30 |
What every (IT Security) Professional should know about the dark web by Mischa Peters, IntSights.mp4 | 49.6 MiB | 2021 Oct 18 05:30 |
Analyzing a Portable Wireless Storage Device From 0 to RCE by Qinghao Tang & Shuo Yuan, Qihoo 360.mp4 | 51.0 MiB | 2021 Oct 18 05:30 |
Vulnerabilities of mobile OAuth 2.0 by Nikita Stupin, Mail.ru.mp4 | 52.8 MiB | 2021 Oct 18 05:30 |
Growing Hypervisor 0day with Hyperseed by Shawn Denbow (@sdenbow ), Microsoft.mp4 | 74.7 MiB | 2021 Oct 18 05:30 |
Dear Blue Team Forensics Advice to Supercharge your DFIR capabilities by Joe Gray (@c 3pjoe).mp4 | 75.3 MiB | 2021 Oct 18 05:30 |
The Evolution of Cloud Threats by Paolo Passeri (@paulsparrows), Netskope.mp4 | 86.8 MiB | 2021 Oct 18 05:30 |
Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure.mp4 | 92.5 MiB | 2021 Oct 18 05:30 |
Keynote - Medieval Castles and Modern Servers by Christian Folini (@ChrFolini).mp4 | 93.1 MiB | 2021 Oct 18 05:30 |
From the cloud to the internal network - Offense vs Defense by Snir Ben-Shimol, Varonis.mp4 | 98.0 MiB | 2021 Oct 18 05:30 |
NSX-T Architecture & Benefits by Erik Bussink, VMware.mp4 | 110.8 MiB | 2021 Oct 18 05:30 |
Threat Hunting Research Methodology A Data Driven Approach by Roberto & Jose Luis Rodriguez.mp4 | 111.6 MiB | 2021 Oct 18 05:30 |