| ↑ Parent Directory |
| 'We Are About to Land' - How CloudDragon Turns a Nightmare Into Reality - 2021.description
|
2022-04-21 14:47 |
875 B |
| 'We Are About to Land' - How CloudDragon Turns a Nightmare Into Reality - 2021.info.json
|
2022-04-21 14:47 |
265.4 KB |
| 'We Are About to Land' - How CloudDragon Turns a Nightmare Into Reality - 2021.mp4
|
2021-09-01 16:01 |
86.5 MB |
| (Un)protected Broadcasts in Android 9 and 10 - 2021.description
|
2022-04-21 15:03 |
844 B |
| (Un)protected Broadcasts in Android 9 and 10 - 2021.info.json
|
2022-04-21 15:03 |
265.5 KB |
| (Un)protected Broadcasts in Android 9 and 10 - 2021.mp4
|
2021-09-01 13:40 |
63.0 MB |
| 20+ Ways to Bypass Your macOS Privacy Mechanisms - 2021.description
|
2022-04-21 13:14 |
767 B |
| 20+ Ways to Bypass Your macOS Privacy Mechanisms - 2021.info.json
|
2022-04-21 13:14 |
265.4 KB |
| 20+ Ways to Bypass Your macOS Privacy Mechanisms - 2021.mp4
|
2021-12-06 21:51 |
111.7 MB |
| 3d Red Pill - A Guest-to-Host Escape on QEMU_KVM Virtio Device - 2021.description
|
2022-04-21 16:01 |
376 B |
| 3d Red Pill - A Guest-to-Host Escape on QEMU_KVM Virtio Device - 2021.info.json
|
2022-04-21 16:01 |
501.0 KB |
| 3d Red Pill - A Guest-to-Host Escape on QEMU_KVM Virtio Device - 2021.mp4
|
2021-02-27 01:49 |
79.3 MB |
| 5G IMSI Catchers Mirage5G IMSI Catchers Mirage - 2021.description
|
2022-04-21 12:59 |
732 B |
| 5G IMSI Catchers Mirage5G IMSI Catchers Mirage - 2021.info.json
|
2022-04-21 12:59 |
265.5 KB |
| 5G IMSI Catchers Mirage5G IMSI Catchers Mirage - 2021.mp4
|
2021-12-06 19:11 |
109.8 MB |
| A Broken Chain - Discovering OPC UA Attack Surface and Exploiting the Supply Chain - 2021.description
|
2022-04-21 13:03 |
613 B |
| A Broken Chain - Discovering OPC UA Attack Surface and Exploiting the Supply Chain - 2021.info.json
|
2022-04-21 13:03 |
264.8 KB |
| A Broken Chain - Discovering OPC UA Attack Surface and Exploiting the Supply Chain - 2021.mp4
|
2021-12-07 04:57 |
70.0 MB |
| A Decade After Stuxnet's Printer Vulnerability - Printing is Still the Stairway to Heaven - 2021.description
|
2022-04-21 16:33 |
688 B |
| A Decade After Stuxnet's Printer Vulnerability - Printing is Still the Stairway to Heaven - 2021.info.json
|
2022-04-21 16:33 |
598.2 KB |
| A Decade After Stuxnet's Printer Vulnerability - Printing is Still the Stairway to Heaven - 2021.mp4
|
2021-01-20 16:50 |
94.0 MB |
| A Framework for Evaluating and Patching the Human Factor in Cybersecurity - 2021.description
|
2022-04-21 16:57 |
708 B |
| A Framework for Evaluating and Patching the Human Factor in Cybersecurity - 2021.info.json
|
2022-04-21 16:57 |
453.0 KB |
| A Framework for Evaluating and Patching the Human Factor in Cybersecurity - 2021.mp4
|
2021-01-20 00:52 |
68.3 MB |
| A General Approach to Bypassing Many Kernel Protections and its Mitigation - 2021.description
|
2022-04-21 15:03 |
509 B |
| A General Approach to Bypassing Many Kernel Protections and its Mitigation - 2021.info.json
|
2022-04-21 15:03 |
613.0 KB |
| A General Approach to Bypassing Many Kernel Protections and its Mitigation - 2021.mp4
|
2021-08-19 14:15 |
111.2 MB |
| A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning - 2021.description
|
2022-04-21 16:44 |
731 B |
| A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning - 2021.info.json
|
2022-04-21 16:44 |
650.7 KB |
| A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning - 2021.mp4
|
2021-01-19 20:19 |
126.3 MB |
| A Hole in the Tube - Uncovering Vulnerabilities in Critical Infrastructure of Healthcare Facilities - 2021.description
|
2022-04-21 13:03 |
1.4 KB |
| A Hole in the Tube - Uncovering Vulnerabilities in Critical Infrastructure of Healthcare Facilities - 2021.info.json
|
2022-04-21 13:03 |
266.0 KB |
| A Hole in the Tube - Uncovering Vulnerabilities in Critical Infrastructure of Healthcare Facilities - 2021.mp4
|
2021-12-06 20:02 |
80.3 MB |
| A Little Less Speculation, a Little More Action - Deep Dive into Fuchsia's Mitigations for CPU Side.. - 2021.description
|
2022-04-21 17:25 |
1.2 KB |
| A Little Less Speculation, a Little More Action - Deep Dive into Fuchsia's Mitigations for CPU Side.. - 2021.info.json
|
2022-04-21 17:25 |
595.6 KB |
| A Little Less Speculation, a Little More Action - Deep Dive into Fuchsia's Mitigations for CPU Side.. - 2021.mp4
|
2021-01-20 07:06 |
94.7 MB |
| A Look Ahead at Cyber Security in 2021 - 2021.description
|
2022-04-21 17:35 |
257 B |
| A Look Ahead at Cyber Security in 2021 - 2021.info.json
|
2022-04-21 17:35 |
347.6 KB |
| A Look Ahead at Cyber Security in 2021 - 2021.mp4
|
2021-02-16 12:47 |
50.3 MB |
| A Mirage of Safety - Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps - 2021.description
|
2022-04-21 14:56 |
611 B |
| A Mirage of Safety - Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps - 2021.info.json
|
2022-04-21 14:56 |
264.5 KB |
| A Mirage of Safety - Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps - 2021.mp4
|
2021-09-01 18:16 |
74.0 MB |
| A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms - 2021.description
|
2022-04-21 13:14 |
1.1 KB |
| A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms - 2021.info.json
|
2022-04-21 13:14 |
265.3 KB |
| A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms - 2021.mp4
|
2021-12-06 23:37 |
93.4 MB |
| A New Era of One-Click Attacks - How to Break Install-Less Apps - 2021.description
|
2022-04-21 14:37 |
958 B |
| A New Era of One-Click Attacks - How to Break Install-Less Apps - 2021.info.json
|
2022-04-21 14:37 |
264.9 KB |
| A New Era of One-Click Attacks - How to Break Install-Less Apps - 2021.mp4
|
2021-09-01 12:12 |
69.6 MB |
| A New Hope - The One Last Chance to Save Your SSD Data - 2021.description
|
2022-04-21 15:38 |
522 B |
| A New Hope - The One Last Chance to Save Your SSD Data - 2021.info.json
|
2022-04-21 15:38 |
577.4 KB |
| A New Hope - The One Last Chance to Save Your SSD Data - 2021.mp4
|
2021-04-06 12:29 |
158.4 MB |
| A Survivor-Centric, Trauma-Informed Approach to Stalkerware - 2021.description
|
2022-04-21 13:11 |
590 B |
| A Survivor-Centric, Trauma-Informed Approach to Stalkerware - 2021.info.json
|
2022-04-21 13:11 |
264.4 KB |
| A Survivor-Centric, Trauma-Informed Approach to Stalkerware - 2021.mp4
|
2021-12-06 23:45 |
68.5 MB |
| A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices - 2021.description
|
2022-04-21 15:02 |
693 B |
| A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices - 2021.info.json
|
2022-04-21 15:02 |
264.7 KB |
| A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices - 2021.mp4
|
2021-09-01 16:01 |
75.7 MB |
| About Directed Fuzzing and Use-After-Free - How to Find Complex & Silent Bugs - 2021.description
|
2022-04-21 16:47 |
528 B |
| About Directed Fuzzing and Use-After-Free - How to Find Complex & Silent Bugs - 2021.info.json
|
2022-04-21 16:47 |
527.6 KB |
| About Directed Fuzzing and Use-After-Free - How to Find Complex & Silent Bugs - 2021.mp4
|
2021-01-19 22:46 |
107.7 MB |
| Action Bias and the Two Most Dangerous Words in Cybersecurity - 2021.description
|
2022-04-21 13:12 |
659 B |
| Action Bias and the Two Most Dangerous Words in Cybersecurity - 2021.info.json
|
2022-04-21 13:12 |
264.8 KB |
| Action Bias and the Two Most Dangerous Words in Cybersecurity - 2021.mp4
|
2021-12-07 00:11 |
102.7 MB |
| Active Directory Security in the Cloud Age - 2021.description
|
2022-04-21 14:34 |
51 B |
| Active Directory Security in the Cloud Age - 2021.info.json
|
2022-04-21 14:34 |
263.7 KB |
| Active Directory Security in the Cloud Age - 2021.mp4
|
2021-10-18 14:59 |
60.3 MB |
| Adversary Detection Pipelines - Finally Making Your Threat Intel Useful - 2021.description
|
2022-04-21 16:06 |
375 B |
| Adversary Detection Pipelines - Finally Making Your Threat Intel Useful - 2021.info.json
|
2022-04-21 16:06 |
265.1 KB |
| Adversary Detection Pipelines - Finally Making Your Threat Intel Useful - 2021.mp4
|
2021-02-26 21:35 |
170.0 MB |
| Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet - 2021.description
|
2022-04-21 14:57 |
624 B |
| Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet - 2021.info.json
|
2022-04-21 14:57 |
266.1 KB |
| Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet - 2021.mp4
|
2021-09-01 17:06 |
93.3 MB |
| Alcatraz - A Practical Hypervisor Sandbox to Prevent Escapes from the KVM_QEMU and KVM-Based MicroVMs - 2021.description
|
2022-04-21 13:00 |
970 B |
| Alcatraz - A Practical Hypervisor Sandbox to Prevent Escapes from the KVM_QEMU and KVM-Based MicroVMs - 2021.info.json
|
2022-04-21 13:00 |
265.5 KB |
| Alcatraz - A Practical Hypervisor Sandbox to Prevent Escapes from the KVM_QEMU and KVM-Based MicroVMs - 2021.mp4
|
2021-12-06 20:40 |
119.9 MB |
| All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate... - 2021.description
|
2022-04-21 17:33 |
944 B |
| All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate... - 2021.info.json
|
2022-04-21 17:33 |
716.9 KB |
| All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate... - 2021.mp4
|
2021-01-20 12:27 |
193.4 MB |
| ALPACA - Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication - 2021.description
|
2022-04-21 13:02 |
610 B |
| ALPACA - Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication - 2021.info.json
|
2022-04-21 13:02 |
265.6 KB |
| ALPACA - Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication - 2021.mp4
|
2021-12-06 22:26 |
97.0 MB |
| An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures - 2021.description
|
2022-04-21 14:23 |
844 B |
| An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures - 2021.info.json
|
2022-04-21 14:23 |
265.6 KB |
| An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures - 2021.mp4
|
2021-12-06 16:47 |
142.4 MB |
| An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers - 2021.description
|
2022-04-21 16:33 |
685 B |
| An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers - 2021.info.json
|
2022-04-21 16:33 |
600.8 KB |
| An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers - 2021.mp4
|
2021-01-20 14:43 |
107.2 MB |
| Anatomy of Native IIS Malware - 2021.description
|
2022-04-21 13:09 |
659 B |
| Anatomy of Native IIS Malware - 2021.info.json
|
2022-04-21 13:09 |
265.1 KB |
| Anatomy of Native IIS Malware - 2021.mp4
|
2021-12-07 05:05 |
100.2 MB |
| Another Road Leads to the Host - From a Message to VM Escape on Nvidia vGPU - 2021.description
|
2022-04-21 13:10 |
663 B |
| Another Road Leads to the Host - From a Message to VM Escape on Nvidia vGPU - 2021.info.json
|
2022-04-21 13:10 |
265.5 KB |
| Another Road Leads to the Host - From a Message to VM Escape on Nvidia vGPU - 2021.mp4
|
2021-12-07 04:15 |
117.5 MB |
| Apple Neural Engine Internal - From ML Algorithm to HW Registers - 2021.description
|
2022-04-21 14:54 |
625 B |
| Apple Neural Engine Internal - From ML Algorithm to HW Registers - 2021.info.json
|
2022-04-21 14:54 |
264.6 KB |
| Apple Neural Engine Internal - From ML Algorithm to HW Registers - 2021.mp4
|
2021-09-01 14:21 |
78.5 MB |
| Applying AI as a Service to Targeted Phishing & Defending Against AI Generated Attacks - 2021.description
|
2022-04-21 14:07 |
859 B |
| Applying AI as a Service to Targeted Phishing & Defending Against AI Generated Attacks - 2021.info.json
|
2022-04-21 14:07 |
265.1 KB |
| Applying AI as a Service to Targeted Phishing & Defending Against AI Generated Attacks - 2021.mp4
|
2021-12-06 16:15 |
70.7 MB |
| Arm'd and Dangerous - 2021.description
|
2022-04-21 12:59 |
401 B |
| Arm'd and Dangerous - 2021.info.json
|
2022-04-21 12:59 |
265.5 KB |
| Arm'd and Dangerous - 2021.mp4
|
2021-12-06 19:36 |
73.0 MB |
| Attacking and Defending Machine Learning Applications of Public Cloud - 2021.description
|
2022-04-21 15:50 |
443 B |
| Attacking and Defending Machine Learning Applications of Public Cloud - 2021.info.json
|
2022-04-21 15:50 |
448.2 KB |
| Attacking and Defending Machine Learning Applications of Public Cloud - 2021.mp4
|
2021-02-27 04:25 |
51.1 MB |
| Automate Security Incident Response - Minimize Risk and Downtime from Cyber Security Threats. - 2021.description
|
2022-04-21 17:35 |
388 B |
| Automate Security Incident Response - Minimize Risk and Downtime from Cyber Security Threats. - 2021.info.json
|
2022-04-21 17:35 |
361.0 KB |
| Automate Security Incident Response - Minimize Risk and Downtime from Cyber Security Threats. - 2021.mp4
|
2021-02-16 12:58 |
57.2 MB |
| Back in Black Hat - The 7th Annual Black Hat USA NOC Report - 2021.description
|
2022-04-21 15:16 |
545 B |
| Back in Black Hat - The 7th Annual Black Hat USA NOC Report - 2021.info.json
|
2022-04-21 15:16 |
265.1 KB |
| Back in Black Hat - The 7th Annual Black Hat USA NOC Report - 2021.mp4
|
2021-08-20 15:08 |
244.9 MB |
| Back to the Future. Cross-Protocol Attacks in the Era of 5G - 2021.description
|
2022-04-21 16:01 |
451 B |
| Back to the Future. Cross-Protocol Attacks in the Era of 5G - 2021.info.json
|
2022-04-21 16:01 |
490.4 KB |
| Back to the Future. Cross-Protocol Attacks in the Era of 5G - 2021.mp4
|
2021-02-27 02:23 |
119.5 MB |
| Bam the BAM - Electromagnetic Fault Injection & Automotive Systems - 2021.description
|
2022-04-21 13:13 |
618 B |
| Bam the BAM - Electromagnetic Fault Injection & Automotive Systems - 2021.info.json
|
2022-04-21 13:13 |
264.6 KB |
| Bam the BAM - Electromagnetic Fault Injection & Automotive Systems - 2021.mp4
|
2021-12-07 01:25 |
93.7 MB |
| Beyond Root - Custom Firmware for Embedded Mobile Chipsets - 2021.description
|
2022-04-21 16:44 |
525 B |
| Beyond Root - Custom Firmware for Embedded Mobile Chipsets - 2021.info.json
|
2022-04-21 16:44 |
592.9 KB |
| Beyond Root - Custom Firmware for Embedded Mobile Chipsets - 2021.mp4
|
2021-01-20 02:33 |
108.2 MB |
| BinTyper - Type Confusion Detection for C++ Binaries - 2021.description
|
2022-04-21 15:27 |
479 B |
| BinTyper - Type Confusion Detection for C++ Binaries - 2021.info.json
|
2022-04-21 15:27 |
484.3 KB |
| BinTyper - Type Confusion Detection for C++ Binaries - 2021.mp4
|
2021-03-23 12:26 |
65.1 MB |
| Biometrics & Privacy - Time to Faceoff or is that FaceApp - 2021.description
|
2022-04-21 15:49 |
457 B |
| Biometrics & Privacy - Time to Faceoff or is that FaceApp - 2021.info.json
|
2022-04-21 15:49 |
575.7 KB |
| Biometrics & Privacy - Time to Faceoff or is that FaceApp - 2021.mp4
|
2021-02-27 05:02 |
151.6 MB |
| BitLeaker - Subverting BitLocker with One Vulnerability - 2021.description
|
2022-04-21 15:46 |
360 B |
| BitLeaker - Subverting BitLocker with One Vulnerability - 2021.info.json
|
2022-04-21 15:46 |
583.5 KB |
| BitLeaker - Subverting BitLocker with One Vulnerability - 2021.mp4
|
2021-02-27 10:23 |
130.5 MB |
| Black-Box Laser Fault Injection on a Secure Memory - 2021.description
|
2022-04-21 17:28 |
908 B |
| Black-Box Laser Fault Injection on a Secure Memory - 2021.info.json
|
2022-04-21 17:28 |
606.1 KB |
| Black-Box Laser Fault Injection on a Secure Memory - 2021.mp4
|
2021-01-20 07:48 |
108.5 MB |
| Blackhat Asia 21Locknote - Conclusions and Key Takeaways from Day 1 locknote - 2021.description
|
2022-04-21 15:16 |
574 B |
| Blackhat Asia 21Locknote - Conclusions and Key Takeaways from Day 1 locknote - 2021.info.json
|
2022-04-21 15:16 |
557.7 KB |
| Blackhat Asia 21Locknote - Conclusions and Key Takeaways from Day 1 locknote - 2021.mp4
|
2021-08-20 09:37 |
203.2 MB |
| Breaking Brains, Solving Problems - Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros - 2021.description
|
2022-04-28 10:57 |
765 B |
| Breaking Brains, Solving Problems - Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros - 2021.info.json
|
2022-04-28 10:57 |
607.8 KB |
| Breaking Brains, Solving Problems - Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros - 2021.mp4
|
2021-01-20 10:44 |
129.2 MB |
| Breaking Network Segregation Using Esoteric Command & Control Channels - 2021.description
|
2022-04-21 14:01 |
538 B |
| Breaking Network Segregation Using Esoteric Command & Control Channels - 2021.info.json
|
2022-04-21 14:01 |
265.1 KB |
| Breaking Network Segregation Using Esoteric Command & Control Channels - 2021.mp4
|
2021-12-07 04:11 |
89.5 MB |
| Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot - 2021.description
|
2022-04-21 17:02 |
898 B |
| Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot - 2021.info.json
|
2022-04-21 17:02 |
572.1 KB |
| Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot - 2021.mp4
|
2021-01-20 11:08 |
114.7 MB |
| Breaking Secure Bootloaders - 2021.description
|
2022-04-21 13:12 |
423 B |
| Breaking Secure Bootloaders - 2021.info.json
|
2022-04-21 13:12 |
266.4 KB |
| Breaking Secure Bootloaders - 2021.mp4
|
2021-12-06 21:08 |
90.7 MB |
| Breaking the Isolation - Cross-Account AWS Vulnerabilities - 2021.description
|
2022-04-21 13:03 |
793 B |
| Breaking the Isolation - Cross-Account AWS Vulnerabilities - 2021.info.json
|
2022-04-21 13:03 |
264.9 KB |
| Breaking the Isolation - Cross-Account AWS Vulnerabilities - 2021.mp4
|
2021-12-06 19:01 |
70.0 MB |
| Breaking VSM by Attacking SecureKernel - 2021.description
|
2022-04-21 17:03 |
848 B |
| Breaking VSM by Attacking SecureKernel - 2021.info.json
|
2022-04-21 17:03 |
605.2 KB |
| Breaking VSM by Attacking SecureKernel - 2021.mp4
|
2021-01-20 08:18 |
101.9 MB |
| Bridging Security Infrastructure Between the Data Center and AWS Lambda - 2021.description
|
2022-04-21 13:04 |
794 B |
| Bridging Security Infrastructure Between the Data Center and AWS Lambda - 2021.info.json
|
2022-04-21 13:04 |
544.7 KB |
| Bridging Security Infrastructure Between the Data Center and AWS Lambda - 2021.mp4
|
2021-12-01 12:01 |
72.9 MB |
| Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers - 2021.description
|
2022-04-21 16:48 |
640 B |
| Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers - 2021.info.json
|
2022-04-21 16:48 |
589.6 KB |
| Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers - 2021.mp4
|
2021-01-19 20:06 |
177.9 MB |
| Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa - 2021.description
|
2022-04-21 16:44 |
589 B |
| Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa - 2021.info.json
|
2022-04-21 16:44 |
560.3 KB |
| Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa - 2021.mp4
|
2021-01-20 01:42 |
118.2 MB |
| Bypassing NGAV for Fun and Profit - 2021.description
|
2022-04-21 15:23 |
460 B |
| Bypassing NGAV for Fun and Profit - 2021.info.json
|
2022-04-21 15:23 |
264.9 KB |
| Bypassing NGAV for Fun and Profit - 2021.mp4
|
2021-05-21 20:27 |
86.0 MB |
| Bypassing Windows Hello for Business and Pleasure - 2021.description
|
2022-04-21 13:00 |
777 B |
| Bypassing Windows Hello for Business and Pleasure - 2021.info.json
|
2022-04-21 13:00 |
264.9 KB |
| Bypassing Windows Hello for Business and Pleasure - 2021.mp4
|
2021-12-06 18:36 |
95.0 MB |
| Can You Hear Me Now Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications - 2021.description
|
2022-04-21 15:11 |
676 B |
| Can You Hear Me Now Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications - 2021.info.json
|
2022-04-21 15:11 |
264.7 KB |
| Can You Hear Me Now Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications - 2021.mp4
|
2021-08-21 01:53 |
69.5 MB |
| Can You Roll Your Own SIEM - 2021.description
|
2022-04-21 13:13 |
763 B |
| Can You Roll Your Own SIEM - 2021.info.json
|
2022-04-21 13:13 |
265.9 KB |
| Can You Roll Your Own SIEM - 2021.mp4
|
2021-12-06 20:56 |
63.5 MB |
| Can Your Security Mid Game Stand Up to the IT Ransomware Playbook - 2021.description
|
2022-04-21 14:35 |
257 B |
| Can Your Security Mid Game Stand Up to the IT Ransomware Playbook - 2021.info.json
|
2022-04-21 14:35 |
264.5 KB |
| Can Your Security Mid Game Stand Up to the IT Ransomware Playbook - 2021.mp4
|
2021-10-12 15:32 |
79.4 MB |
| Carrying our Insecurities with Us - The Risks of Implanted Medical Devices in Secure Spaces - 2021.description
|
2022-04-21 16:39 |
727 B |
| Carrying our Insecurities with Us - The Risks of Implanted Medical Devices in Secure Spaces - 2021.info.json
|
2022-04-21 16:39 |
595.7 KB |
| Carrying our Insecurities with Us - The Risks of Implanted Medical Devices in Secure Spaces - 2021.mp4
|
2021-01-20 15:15 |
131.0 MB |
| CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days - 2021.description
|
2022-04-21 15:40 |
446 B |
| CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days - 2021.info.json
|
2022-04-21 15:40 |
265.2 KB |
| CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days - 2021.mp4
|
2021-09-01 08:55 |
110.4 MB |
| Certified Pre-Owned - Abusing Active Directory Certificate Services - 2021.description
|
2022-04-21 13:15 |
569 B |
| Certified Pre-Owned - Abusing Active Directory Certificate Services - 2021.info.json
|
2022-04-21 13:15 |
265.3 KB |
| Certified Pre-Owned - Abusing Active Directory Certificate Services - 2021.mp4
|
2021-12-06 21:12 |
144.1 MB |
| Cloud Native AppSec in 2021 - 2021.description
|
2022-04-21 14:33 |
40 B |
| Cloud Native AppSec in 2021 - 2021.info.json
|
2022-04-21 14:33 |
263.4 KB |
| Cloud Native AppSec in 2021 - 2021.mp4
|
2021-10-21 17:52 |
44.7 MB |
| CloudLeak - DNN Model Extractions from Commercial MLaaS Platforms - 2021.description
|
2022-04-21 16:42 |
868 B |
| CloudLeak - DNN Model Extractions from Commercial MLaaS Platforms - 2021.info.json
|
2022-04-21 16:42 |
599.2 KB |
| CloudLeak - DNN Model Extractions from Commercial MLaaS Platforms - 2021.mp4
|
2021-01-19 23:04 |
99.2 MB |
| Cloudy with a Chance of APT - Novel Microsoft 365 Attacks in the Wild - 2021.description
|
2022-04-21 13:16 |
682 B |
| Cloudy with a Chance of APT - Novel Microsoft 365 Attacks in the Wild - 2021.info.json
|
2022-04-21 13:16 |
266.5 KB |
| Cloudy with a Chance of APT - Novel Microsoft 365 Attacks in the Wild - 2021.mp4
|
2021-12-06 22:39 |
116.1 MB |
| CnCHunter - An MITM-Approach to Identify Live CnC Servers - 2021.description
|
2022-04-21 13:49 |
878 B |
| CnCHunter - An MITM-Approach to Identify Live CnC Servers - 2021.info.json
|
2022-04-21 13:49 |
560.2 KB |
| CnCHunter - An MITM-Approach to Identify Live CnC Servers - 2021.mp4
|
2021-12-01 15:37 |
93.1 MB |
| Come to the Dark Side, We Have Apples - Turning macOS Management Evil - 2021.description
|
2022-04-21 13:30 |
316 B |
| Come to the Dark Side, We Have Apples - Turning macOS Management Evil - 2021.info.json
|
2022-04-21 13:30 |
265.0 KB |
| Come to the Dark Side, We Have Apples - Turning macOS Management Evil - 2021.mp4
|
2021-12-06 20:56 |
109.8 MB |
| Complexity Killed Security - 2021.description
|
2022-04-21 16:08 |
473 B |
| Complexity Killed Security - 2021.info.json
|
2022-04-21 16:08 |
506.7 KB |
| Complexity Killed Security - 2021.mp4
|
2021-02-27 12:30 |
122.0 MB |
| Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities - 2021.description
|
2022-04-21 17:08 |
583 B |
| Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities - 2021.info.json
|
2022-04-21 17:08 |
602.6 KB |
| Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities - 2021.mp4
|
2021-01-20 12:49 |
114.3 MB |
| Crashing Your Way to Medium-IL - Exploiting the PDB Parser for Privilege Escalation - 2021.description
|
2022-04-21 13:31 |
685 B |
| Crashing Your Way to Medium-IL - Exploiting the PDB Parser for Privilege Escalation - 2021.info.json
|
2022-04-21 13:31 |
265.0 KB |
| Crashing Your Way to Medium-IL - Exploiting the PDB Parser for Privilege Escalation - 2021.mp4
|
2021-12-07 12:49 |
93.8 MB |
| Cross-Site Escape - Pwning macOS Safari Sandbox the Unusual Way - 2021.description
|
2022-04-21 15:25 |
467 B |
| Cross-Site Escape - Pwning macOS Safari Sandbox the Unusual Way - 2021.info.json
|
2022-04-21 15:25 |
492.0 KB |
| Cross-Site Escape - Pwning macOS Safari Sandbox the Unusual Way - 2021.mp4
|
2021-03-10 12:46 |
72.9 MB |
| Cybersecurity Meets Reality - 2021.description
|
2022-04-21 14:30 |
74 B |
| Cybersecurity Meets Reality - 2021.info.json
|
2022-04-21 14:30 |
43.5 KB |
| Cybersecurity Meets Reality - 2021.mp4
|
2021-11-11 05:04 |
80.5 MB |
| Cybersecurity Threats in 2021 - What You Need to Know - 2021.description
|
2022-04-21 16:10 |
254 B |
| Cybersecurity Threats in 2021 - What You Need to Know - 2021.info.json
|
2022-04-21 16:10 |
263.9 KB |
| Cybersecurity Threats in 2021 - What You Need to Know - 2021.mp4
|
2021-09-01 23:02 |
66.4 MB |
| DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics - 2021.description
|
2022-04-28 10:14 |
855 B |
| DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics - 2021.info.json
|
2022-04-28 10:14 |
266.8 KB |
| DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics - 2021.mp4
|
2021-12-07 07:39 |
90.0 MB |
| Debug Resurrection on Nordic nRF52 Series - 2021.description
|
2022-04-21 15:25 |
442 B |
| Debug Resurrection on Nordic nRF52 Series - 2021.info.json
|
2022-04-21 15:25 |
555.7 KB |
| Debug Resurrection on Nordic nRF52 Series - 2021.mp4
|
2021-03-10 14:02 |
97.2 MB |
| Decade of the RATs – Custom Chinese Linux Rootkits for Everyone - 2021.description
|
2022-04-21 16:41 |
718 B |
| Decade of the RATs – Custom Chinese Linux Rootkits for Everyone - 2021.info.json
|
2022-04-21 16:41 |
265.4 KB |
| Decade of the RATs – Custom Chinese Linux Rootkits for Everyone - 2021.mp4
|
2021-07-26 08:13 |
270.2 MB |
| Deepfake Social Engineering - Creating a Framework for Synthetic Media Social Engineering - 2021.description
|
2022-04-21 13:16 |
613 B |
| Deepfake Social Engineering - Creating a Framework for Synthetic Media Social Engineering - 2021.info.json
|
2022-04-21 13:16 |
265.4 KB |
| Deepfake Social Engineering - Creating a Framework for Synthetic Media Social Engineering - 2021.mp4
|
2021-12-06 18:19 |
105.8 MB |
| Defeating a Secure Element with Multiple Laser Fault Injections - 2021.description
|
2022-04-21 13:49 |
847 B |
| Defeating a Secure Element with Multiple Laser Fault Injections - 2021.info.json
|
2022-04-21 13:49 |
265.4 KB |
| Defeating a Secure Element with Multiple Laser Fault Injections - 2021.mp4
|
2021-12-07 06:34 |
78.0 MB |
| Demigod - The Art of Emulating Kernel Rootkits - 2021.description
|
2022-04-21 16:36 |
801 B |
| Demigod - The Art of Emulating Kernel Rootkits - 2021.info.json
|
2022-04-21 16:36 |
820.1 KB |
| Demigod - The Art of Emulating Kernel Rootkits - 2021.mp4
|
2021-01-20 13:53 |
182.0 MB |
| Demystify AI Security Products With a Universal Pluggable XAI Translator - 2021.description
|
2022-04-21 13:49 |
829 B |
| Demystify AI Security Products With a Universal Pluggable XAI Translator - 2021.info.json
|
2022-04-21 13:49 |
502.9 KB |
| Demystify AI Security Products With a Universal Pluggable XAI Translator - 2021.mp4
|
2021-12-01 16:37 |
44.4 MB |
| Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier - 2021.description
|
2022-04-21 16:04 |
434 B |
| Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier - 2021.info.json
|
2022-04-21 16:04 |
448.8 KB |
| Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier - 2021.mp4
|
2021-02-26 22:41 |
59.2 MB |
| Demystifying Modern Windows Rootkits - 2021.description
|
2022-04-21 16:48 |
560 B |
| Demystifying Modern Windows Rootkits - 2021.info.json
|
2022-04-21 16:48 |
533.3 KB |
| Demystifying Modern Windows Rootkits - 2021.mp4
|
2021-01-19 20:48 |
66.6 MB |
| Demystifying “Limitless XDR” with Nate Fick - 2021.description
|
2022-04-21 14:31 |
79 B |
| Demystifying “Limitless XDR” with Nate Fick - 2021.info.json
|
2022-04-21 14:31 |
263.7 KB |
| Demystifying “Limitless XDR” with Nate Fick - 2021.mp4
|
2021-10-27 12:12 |
45.9 MB |
| Design Pitfalls in Commercial Mini-Programs on Android and iOS - 2021.description
|
2022-04-21 15:39 |
498 B |
| Design Pitfalls in Commercial Mini-Programs on Android and iOS - 2021.info.json
|
2022-04-21 15:39 |
489.5 KB |
| Design Pitfalls in Commercial Mini-Programs on Android and iOS - 2021.mp4
|
2021-03-28 10:12 |
86.7 MB |
| Detecting Access Token Manipulation - 2021.description
|
2022-04-21 17:35 |
968 B |
| Detecting Access Token Manipulation - 2021.info.json
|
2022-04-21 17:35 |
591.2 KB |
| Detecting Access Token Manipulation - 2021.mp4
|
2021-01-20 05:28 |
120.5 MB |
| Detecting Fake 4G Base Stations in Real Time - 2021.description
|
2022-04-21 16:39 |
929 B |
| Detecting Fake 4G Base Stations in Real Time - 2021.info.json
|
2022-04-21 16:39 |
621.7 KB |
| Detecting Fake 4G Base Stations in Real Time - 2021.mp4
|
2021-01-20 16:00 |
168.9 MB |
| Disappeared Coins - Steal Hashrate in Stratum Secretly - 2021.description
|
2022-04-21 14:38 |
1.1 KB |
| Disappeared Coins - Steal Hashrate in Stratum Secretly - 2021.info.json
|
2022-04-21 14:38 |
265.1 KB |
| Disappeared Coins - Steal Hashrate in Stratum Secretly - 2021.mp4
|
2021-09-01 13:36 |
123.1 MB |
| Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel - 2021.description
|
2022-04-21 15:28 |
470 B |
| Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel - 2021.info.json
|
2022-04-21 15:28 |
472.2 KB |
| Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel - 2021.mp4
|
2021-03-24 13:15 |
73.2 MB |
| Discovering Hidden Properties to Attack the Node.js Ecosystem - 2021.description
|
2022-04-21 16:30 |
517 B |
| Discovering Hidden Properties to Attack the Node.js Ecosystem - 2021.info.json
|
2022-04-21 16:30 |
593.8 KB |
| Discovering Hidden Properties to Attack the Node.js Ecosystem - 2021.mp4
|
2021-01-20 18:02 |
110.3 MB |
| Disinformation At Scale - Using GPT-3 Maliciously for Information Operations - 2021.description
|
2022-04-21 13:17 |
634 B |
| Disinformation At Scale - Using GPT-3 Maliciously for Information Operations - 2021.info.json
|
2022-04-21 13:17 |
265.4 KB |
| Disinformation At Scale - Using GPT-3 Maliciously for Information Operations - 2021.mp4
|
2021-12-07 00:18 |
111.4 MB |
| Dive into Apple IO80211FamilyV2 - 2021.description
|
2022-04-21 17:03 |
732 B |
| Dive into Apple IO80211FamilyV2 - 2021.info.json
|
2022-04-21 17:03 |
595.4 KB |
| Dive into Apple IO80211FamilyV2 - 2021.mp4
|
2021-01-20 12:55 |
108.3 MB |
| Diverse Perspectives in Threat Intelligence - 2021.description
|
2022-04-21 15:19 |
174 B |
| Diverse Perspectives in Threat Intelligence - 2021.info.json
|
2022-04-21 15:19 |
263.4 KB |
| Diverse Perspectives in Threat Intelligence - 2021.mp4
|
2021-09-07 01:14 |
56.8 MB |
| Diving in to Spooler - Discovering LPE and RCE Vulnerabilities in Windows Printer - 2021.description
|
2022-04-21 13:48 |
714 B |
| Diving in to Spooler - Discovering LPE and RCE Vulnerabilities in Windows Printer - 2021.info.json
|
2022-04-21 13:48 |
264.7 KB |
| Diving in to Spooler - Discovering LPE and RCE Vulnerabilities in Windows Printer - 2021.mp4
|
2021-12-07 07:00 |
56.4 MB |
| Domain Borrowing - Catch My C2 Traffic if You Can - 2021.description
|
2022-04-28 10:42 |
514 B |
| Domain Borrowing - Catch My C2 Traffic if You Can - 2021.info.json
|
2022-04-28 10:42 |
562.0 KB |
| Domain Borrowing - Catch My C2 Traffic if You Can - 2021.mp4
|
2021-08-17 13:30 |
96.2 MB |
| Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation - 2021.description
|
2022-04-21 16:07 |
434 B |
| Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation - 2021.info.json
|
2022-04-21 16:07 |
265.5 KB |
| Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation - 2021.mp4
|
2021-10-15 15:27 |
85.7 MB |
| Effective Vulnerability Discovery with Machine Learning - 2021.description
|
2022-04-21 15:36 |
482 B |
| Effective Vulnerability Discovery with Machine Learning - 2021.info.json
|
2022-04-21 15:36 |
502.1 KB |
| Effective Vulnerability Discovery with Machine Learning - 2021.mp4
|
2021-03-28 15:59 |
200.9 MB |
| efiXplorer - Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis - 2021.description
|
2022-04-21 15:37 |
553 B |
| efiXplorer - Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis - 2021.info.json
|
2022-04-21 15:37 |
687.4 KB |
| efiXplorer - Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis - 2021.mp4
|
2021-03-28 12:01 |
147.6 MB |
| Emulating Samsung's Baseband for Security Testing - 2021.description
|
2022-04-21 17:25 |
890 B |
| Emulating Samsung's Baseband for Security Testing - 2021.info.json
|
2022-04-21 17:25 |
593.6 KB |
| Emulating Samsung's Baseband for Security Testing - 2021.mp4
|
2021-01-20 05:03 |
125.4 MB |
| Engineering Cybersecurity for a Nation - What Singapore is Learning from Cars and Sanitation - 2021.description
|
2022-04-21 15:47 |
442 B |
| Engineering Cybersecurity for a Nation - What Singapore is Learning from Cars and Sanitation - 2021.info.json
|
2022-04-21 15:47 |
265.3 KB |
| Engineering Cybersecurity for a Nation - What Singapore is Learning from Cars and Sanitation - 2021.mp4
|
2021-02-27 12:10 |
244.2 MB |
| Engineering Empathy - Adapting Software Engineering Principles and Process to Security - 2021.description
|
2022-04-21 16:11 |
518 B |
| Engineering Empathy - Adapting Software Engineering Principles and Process to Security - 2021.info.json
|
2022-04-21 16:11 |
598.7 KB |
| Engineering Empathy - Adapting Software Engineering Principles and Process to Security - 2021.mp4
|
2021-01-20 17:17 |
83.1 MB |
| Enter Sandbox - 2021.description
|
2022-04-21 14:36 |
788 B |
| Enter Sandbox - 2021.info.json
|
2022-04-21 14:36 |
266.7 KB |
| Enter Sandbox - 2021.mp4
|
2021-09-01 12:32 |
102.7 MB |
| Escaping Virtualized Containers - 2021.description
|
2022-04-21 17:03 |
574 B |
| Escaping Virtualized Containers - 2021.info.json
|
2022-04-21 17:03 |
617.3 KB |
| Escaping Virtualized Containers - 2021.mp4
|
2021-02-27 10:57 |
98.2 MB |
| EtherOops - Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks - 2021.description
|
2022-04-21 16:49 |
967 B |
| EtherOops - Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks - 2021.info.json
|
2022-04-21 16:49 |
620.9 KB |
| EtherOops - Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks - 2021.mp4
|
2021-01-20 01:28 |
232.6 MB |
| Everything has Changed in iOS 14, but Jailbreak is Eternal - 2021.description
|
2022-04-21 14:00 |
471 B |
| Everything has Changed in iOS 14, but Jailbreak is Eternal - 2021.info.json
|
2022-04-21 14:00 |
265.1 KB |
| Everything has Changed in iOS 14, but Jailbreak is Eternal - 2021.mp4
|
2021-12-07 04:16 |
146.1 MB |
| Experimenting with Real-Time Event Feeds - 2021.description
|
2022-04-21 17:26 |
610 B |
| Experimenting with Real-Time Event Feeds - 2021.info.json
|
2022-04-21 17:26 |
284.7 KB |
| Experimenting with Real-Time Event Feeds - 2021.mp4
|
2021-01-20 07:36 |
100.7 MB |
| Exploiting Kernel Races through Taming Thread Interleaving - 2021.description
|
2022-04-21 17:34 |
721 B |
| Exploiting Kernel Races through Taming Thread Interleaving - 2021.info.json
|
2022-04-21 17:34 |
585.9 KB |
| Exploiting Kernel Races through Taming Thread Interleaving - 2021.mp4
|
2021-01-20 11:55 |
111.4 MB |
| Exploiting Windows COM_WinRT ServicesExploiting Windows COM_WinRT Services - 2021.description
|
2022-04-21 13:24 |
523 B |
| Exploiting Windows COM_WinRT ServicesExploiting Windows COM_WinRT Services - 2021.info.json
|
2022-04-21 13:24 |
264.3 KB |
| Exploiting Windows COM_WinRT ServicesExploiting Windows COM_WinRT Services - 2021.mp4
|
2021-12-07 22:45 |
62.8 MB |
| Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones - 2021.description
|
2022-04-21 14:02 |
550 B |
| Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones - 2021.info.json
|
2022-04-21 14:02 |
265.2 KB |
| Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones - 2021.mp4
|
2021-12-07 02:48 |
116.6 MB |
| Faking a Factory - Creating and Operating a Realistic Honeypot - 2021.description
|
2022-04-21 15:44 |
370 B |
| Faking a Factory - Creating and Operating a Realistic Honeypot - 2021.info.json
|
2022-04-21 15:44 |
264.5 KB |
| Faking a Factory - Creating and Operating a Realistic Honeypot - 2021.mp4
|
2021-08-27 08:24 |
83.0 MB |
| Fast Chat with Austin Murphy, CrowdStrike’s VP & GM, Falcon Complete - 2021.description
|
2022-04-21 15:19 |
156 B |
| Fast Chat with Austin Murphy, CrowdStrike’s VP & GM, Falcon Complete - 2021.info.json
|
2022-04-21 15:19 |
263.6 KB |
| Fast Chat with Austin Murphy, CrowdStrike’s VP & GM, Falcon Complete - 2021.mp4
|
2021-09-06 00:23 |
62.9 MB |
| Fast Chat with Maor Bin - Securing the SaaS App Estate - 2021.description
|
2022-04-21 15:05 |
213 B |
| Fast Chat with Maor Bin - Securing the SaaS App Estate - 2021.info.json
|
2022-04-21 15:05 |
263.3 KB |
| Fast Chat with Maor Bin - Securing the SaaS App Estate - 2021.mp4
|
2021-08-24 13:28 |
45.1 MB |
| FASTCash and INJX_Pure - How Threat Actors Use Public Standards for Financial Fraud - 2021.description
|
2022-04-21 16:40 |
642 B |
| FASTCash and INJX_Pure - How Threat Actors Use Public Standards for Financial Fraud - 2021.info.json
|
2022-04-21 16:40 |
583.8 KB |
| FASTCash and INJX_Pure - How Threat Actors Use Public Standards for Financial Fraud - 2021.mp4
|
2021-01-20 20:07 |
108.8 MB |
| Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM - 2021.description
|
2022-04-21 15:21 |
542 B |
| Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM - 2021.info.json
|
2022-04-21 15:21 |
265.0 KB |
| Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM - 2021.mp4
|
2021-05-21 14:00 |
84.4 MB |
| Fingerprint-Jacking - Practical Fingerprint Authorization Hijacking in Android Apps - 2021.description
|
2022-04-21 15:32 |
557 B |
| Fingerprint-Jacking - Practical Fingerprint Authorization Hijacking in Android Apps - 2021.info.json
|
2022-04-21 15:32 |
553.5 KB |
| Fingerprint-Jacking - Practical Fingerprint Authorization Hijacking in Android Apps - 2021.mp4
|
2021-03-27 21:32 |
97.1 MB |
| First Contact - Vulnerabilities in Contactless Payments - 2021.description
|
2022-04-21 15:43 |
414 B |
| First Contact - Vulnerabilities in Contactless Payments - 2021.info.json
|
2022-04-21 15:43 |
265.2 KB |
| First Contact - Vulnerabilities in Contactless Payments - 2021.mp4
|
2021-05-13 19:31 |
93.3 MB |
| Fixing a Memory Forensics Blind Spot - Linux Kernel Tracing - 2021.description
|
2022-04-21 13:59 |
667 B |
| Fixing a Memory Forensics Blind Spot - Linux Kernel Tracing - 2021.info.json
|
2022-04-21 13:59 |
491.5 KB |
| Fixing a Memory Forensics Blind Spot - Linux Kernel Tracing - 2021.mp4
|
2021-12-01 18:29 |
60.7 MB |
| Fooling Windows through Superfetch - 2021.description
|
2022-04-21 17:01 |
1.1 KB |
| Fooling Windows through Superfetch - 2021.info.json
|
2022-04-21 17:01 |
605.4 KB |
| Fooling Windows through Superfetch - 2021.mp4
|
2021-01-20 12:05 |
148.7 MB |
| Forget Zero Trust - Aim to 'Control the Controllables' - 2021.description
|
2022-04-21 15:20 |
251 B |
| Forget Zero Trust - Aim to 'Control the Controllables' - 2021.info.json
|
2022-04-21 15:20 |
264.8 KB |
| Forget Zero Trust - Aim to 'Control the Controllables' - 2021.mp4
|
2021-09-03 09:47 |
104.8 MB |
| FPs are Cheap. Show me the CVEs! - 2021.description
|
2022-04-21 15:30 |
472 B |
| FPs are Cheap. Show me the CVEs! - 2021.info.json
|
2022-04-21 15:30 |
473.9 KB |
| FPs are Cheap. Show me the CVEs! - 2021.mp4
|
2021-03-23 10:13 |
90.9 MB |
| FragAttacks - Breaking Wi-Fi through Fragmentation and Aggregation - 2021.description
|
2022-04-21 14:00 |
607 B |
| FragAttacks - Breaking Wi-Fi through Fragmentation and Aggregation - 2021.info.json
|
2022-04-21 14:00 |
265.2 KB |
| FragAttacks - Breaking Wi-Fi through Fragmentation and Aggregation - 2021.mp4
|
2021-12-07 03:07 |
107.4 MB |
| From an URGENT_11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet - 2021.description
|
2022-04-21 16:02 |
485 B |
| From an URGENT_11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet - 2021.info.json
|
2022-04-21 16:02 |
514.7 KB |
| From an URGENT_11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet - 2021.mp4
|
2021-02-27 00:39 |
97.5 MB |
| From Ransomware to RansomOps - Evolution of A Threat - 2021.description
|
2022-04-21 15:20 |
173 B |
| From Ransomware to RansomOps - Evolution of A Threat - 2021.info.json
|
2022-04-21 15:20 |
263.7 KB |
| From Ransomware to RansomOps - Evolution of A Threat - 2021.mp4
|
2021-09-03 23:14 |
72.7 MB |
| From Zero to Sixty - The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower - 2021.description
|
2022-04-21 15:48 |
517 B |
| From Zero to Sixty - The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower - 2021.info.json
|
2022-04-21 15:48 |
581.3 KB |
| From Zero to Sixty - The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower - 2021.mp4
|
2021-03-10 10:59 |
97.7 MB |
| Generating YARA Rules by Classifying Malicious Byte Sequences - 2021.description
|
2022-04-21 13:25 |
854 B |
| Generating YARA Rules by Classifying Malicious Byte Sequences - 2021.info.json
|
2022-04-21 13:25 |
265.7 KB |
| Generating YARA Rules by Classifying Malicious Byte Sequences - 2021.mp4
|
2021-12-07 02:54 |
80.0 MB |
| Give Me a SQL Injection, I Shall PWN IIS and SQL Server - 2021.description
|
2022-04-21 14:54 |
772 B |
| Give Me a SQL Injection, I Shall PWN IIS and SQL Server - 2021.info.json
|
2022-04-21 14:54 |
265.3 KB |
| Give Me a SQL Injection, I Shall PWN IIS and SQL Server - 2021.mp4
|
2021-09-01 14:22 |
103.0 MB |
| Government-Mandated Front Doors - A Global Assessment of Legalized Government Access to Data - 2021.description
|
2022-04-21 13:29 |
667 B |
| Government-Mandated Front Doors - A Global Assessment of Legalized Government Access to Data - 2021.info.json
|
2022-04-21 13:29 |
264.6 KB |
| Government-Mandated Front Doors - A Global Assessment of Legalized Government Access to Data - 2021.mp4
|
2021-12-07 06:33 |
73.4 MB |
| Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control... - 2021.description
|
2022-04-21 15:30 |
501 B |
| Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control... - 2021.info.json
|
2022-04-21 15:30 |
489.9 KB |
| Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control... - 2021.mp4
|
2021-03-21 14:03 |
68.5 MB |
| Greybox Program Synthesis - A New Approach to Attack Dataflow Obfuscation - 2021.description
|
2022-04-21 13:27 |
668 B |
| Greybox Program Synthesis - A New Approach to Attack Dataflow Obfuscation - 2021.info.json
|
2022-04-21 13:27 |
265.2 KB |
| Greybox Program Synthesis - A New Approach to Attack Dataflow Obfuscation - 2021.mp4
|
2021-12-07 04:14 |
89.5 MB |
| Hack Different - Pwning iOS 14 with Generation Z Bug - 2021.description
|
2022-04-21 13:48 |
564 B |
| Hack Different - Pwning iOS 14 with Generation Z Bug - 2021.info.json
|
2022-04-21 13:48 |
264.7 KB |
| Hack Different - Pwning iOS 14 with Generation Z Bug - 2021.mp4
|
2021-12-07 06:43 |
80.1 MB |
| Hacking a Capsule Hotel - Ghost in the Bedrooms - 2021.description
|
2022-04-28 10:19 |
573 B |
| Hacking a Capsule Hotel - Ghost in the Bedrooms - 2021.info.json
|
2022-04-28 10:19 |
264.5 KB |
| Hacking a Capsule Hotel - Ghost in the Bedrooms - 2021.mp4
|
2021-12-07 03:11 |
64.8 MB |
| Hacking Government Cybersecurity - 2021.description
|
2022-04-21 15:31 |
373 B |
| Hacking Government Cybersecurity - 2021.info.json
|
2022-04-21 15:31 |
264.9 KB |
| Hacking Government Cybersecurity - 2021.mp4
|
2021-09-02 05:51 |
130.8 MB |
| Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices - 2021.description
|
2022-04-21 16:35 |
693 B |
| Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices - 2021.info.json
|
2022-04-21 16:35 |
601.1 KB |
| Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices - 2021.mp4
|
2021-01-20 19:01 |
117.4 MB |
| Hacking the Voter - Lessons from a Decade of Russian Military Operations - 2021.description
|
2022-04-21 16:59 |
935 B |
| Hacking the Voter - Lessons from a Decade of Russian Military Operations - 2021.info.json
|
2022-04-21 16:59 |
611.3 KB |
| Hacking the Voter - Lessons from a Decade of Russian Military Operations - 2021.mp4
|
2021-01-20 05:17 |
139.5 MB |
| hAFL1 - Our Journey of Fuzzing Hyper-V and Discovering a 0-Day - 2021.description
|
2022-04-21 13:47 |
569 B |
| hAFL1 - Our Journey of Fuzzing Hyper-V and Discovering a 0-Day - 2021.info.json
|
2022-04-21 13:47 |
265.1 KB |
| hAFL1 - Our Journey of Fuzzing Hyper-V and Discovering a 0-Day - 2021.mp4
|
2021-12-07 05:44 |
84.6 MB |
| Healthscare – An Insider's Biopsy of Healthcare Application Security - 2021.description
|
2022-04-21 16:11 |
705 B |
| Healthscare – An Insider's Biopsy of Healthcare Application Security - 2021.info.json
|
2022-04-21 16:11 |
615.7 KB |
| Healthscare – An Insider's Biopsy of Healthcare Application Security - 2021.mp4
|
2021-01-20 17:29 |
100.4 MB |
| Hermes Attack - Steal DNN Models In AI Privatization Deployment Scenarios - 2021.description
|
2022-04-21 15:39 |
482 B |
| Hermes Attack - Steal DNN Models In AI Privatization Deployment Scenarios - 2021.info.json
|
2022-04-21 15:39 |
528.1 KB |
| Hermes Attack - Steal DNN Models In AI Privatization Deployment Scenarios - 2021.mp4
|
2021-04-05 16:09 |
87.5 MB |
| Heroku Abuse Operations - Hunting Wolves in Sheep's Clothing - 2021.description
|
2022-04-21 16:37 |
822 B |
| Heroku Abuse Operations - Hunting Wolves in Sheep's Clothing - 2021.info.json
|
2022-04-21 16:37 |
602.8 KB |
| Heroku Abuse Operations - Hunting Wolves in Sheep's Clothing - 2021.mp4
|
2021-01-20 16:38 |
133.7 MB |
| Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature - 2021.description
|
2022-04-21 16:03 |
525 B |
| Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature - 2021.info.json
|
2022-04-21 16:03 |
509.3 KB |
| Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature - 2021.mp4
|
2021-02-27 00:03 |
104.9 MB |
| Hey, You, Get off My Private Data - Do Apps Respect Your Privacy as They Claim - 2021.description
|
2022-04-21 14:56 |
600 B |
| Hey, You, Get off My Private Data - Do Apps Respect Your Privacy as They Claim - 2021.info.json
|
2022-04-21 14:56 |
265.3 KB |
| Hey, You, Get off My Private Data - Do Apps Respect Your Privacy as They Claim - 2021.mp4
|
2021-09-01 17:21 |
102.5 MB |
| Hiding Objects from Computer Vision by Exploiting Correlation Biases - 2021.description
|
2022-04-21 14:38 |
1.0 KB |
| Hiding Objects from Computer Vision by Exploiting Correlation Biases - 2021.info.json
|
2022-04-21 14:38 |
265.0 KB |
| Hiding Objects from Computer Vision by Exploiting Correlation Biases - 2021.mp4
|
2021-09-01 14:04 |
81.2 MB |
| Hiding Process Memory via Anti-Forensic Techniques - 2021.description
|
2022-04-21 16:51 |
881 B |
| Hiding Process Memory via Anti-Forensic Techniques - 2021.info.json
|
2022-04-21 16:51 |
577.2 KB |
| Hiding Process Memory via Anti-Forensic Techniques - 2021.mp4
|
2021-01-20 01:19 |
63.6 MB |
| How Application Security Orchestration & Correlation adds Efficiency & Accountability to DevSecOps - 2021.description
|
2022-04-21 14:25 |
53 B |
| How Application Security Orchestration & Correlation adds Efficiency & Accountability to DevSecOps - 2021.info.json
|
2022-04-21 14:25 |
263.4 KB |
| How Application Security Orchestration & Correlation adds Efficiency & Accountability to DevSecOps - 2021.mp4
|
2021-11-29 16:26 |
37.1 MB |
| How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover - 2021.description
|
2022-04-21 14:47 |
1.0 KB |
| How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover - 2021.info.json
|
2022-04-21 14:47 |
264.8 KB |
| How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover - 2021.mp4
|
2021-09-01 14:28 |
62.8 MB |
| How Embedded TCP_IP Stacks Breed Critical Vulnerabilities - 2021.description
|
2022-04-21 15:35 |
525 B |
| How Embedded TCP_IP Stacks Breed Critical Vulnerabilities - 2021.info.json
|
2022-04-21 15:35 |
572.6 KB |
| How Embedded TCP_IP Stacks Breed Critical Vulnerabilities - 2021.mp4
|
2021-04-05 15:44 |
112.3 MB |
| How Healthcare Can Use Network Data To Detect Threats - 2021.description
|
2022-04-21 16:09 |
214 B |
| How Healthcare Can Use Network Data To Detect Threats - 2021.info.json
|
2022-04-21 16:09 |
263.9 KB |
| How Healthcare Can Use Network Data To Detect Threats - 2021.mp4
|
2021-09-04 04:14 |
85.7 MB |
| How I Can Unlock Your Smart Door - Security Pitfalls in Cross-Vendor IoT Access Control - 2021.description
|
2022-04-21 15:01 |
1.1 KB |
| How I Can Unlock Your Smart Door - Security Pitfalls in Cross-Vendor IoT Access Control - 2021.info.json
|
2022-04-21 15:01 |
265.5 KB |
| How I Can Unlock Your Smart Door - Security Pitfalls in Cross-Vendor IoT Access Control - 2021.mp4
|
2021-09-01 16:55 |
98.3 MB |
| How I Created My Clone Using AI - Next-Gen Social Engineering - 2021.description
|
2022-04-28 10:56 |
566 B |
| How I Created My Clone Using AI - Next-Gen Social Engineering - 2021.info.json
|
2022-04-28 10:56 |
610.3 KB |
| How I Created My Clone Using AI - Next-Gen Social Engineering - 2021.mp4
|
2021-01-20 15:27 |
108.8 MB |
| How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain - 2021.description
|
2022-04-21 14:25 |
372 B |
| How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain - 2021.info.json
|
2022-04-21 14:25 |
265.1 KB |
| How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain - 2021.mp4
|
2021-11-23 19:29 |
127.4 MB |
| How is Machine Learning and Data Science Transforming Cyber Security - 2021.description
|
2022-04-21 14:36 |
316 B |
| How is Machine Learning and Data Science Transforming Cyber Security - 2021.info.json
|
2022-04-21 14:36 |
265.0 KB |
| How is Machine Learning and Data Science Transforming Cyber Security - 2021.mp4
|
2021-09-02 18:21 |
71.4 MB |
| How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration - 2021.description
|
2022-04-21 15:26 |
574 B |
| How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration - 2021.info.json
|
2022-04-21 15:26 |
486.6 KB |
| How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration - 2021.mp4
|
2021-03-21 11:02 |
70.3 MB |
| How to Better Fuzz Windows 10 Directx Kernel at Present - 2021.description
|
2022-04-21 15:22 |
449 B |
| How to Better Fuzz Windows 10 Directx Kernel at Present - 2021.info.json
|
2022-04-21 15:22 |
469.4 KB |
| How to Better Fuzz Windows 10 Directx Kernel at Present - 2021.mp4
|
2021-03-11 15:50 |
53.6 MB |
| HPE iLO5 Firmware Security - Go Home Cryptoprocessor, You're Drunk! - 2021.description
|
2022-04-28 10:11 |
738 B |
| HPE iLO5 Firmware Security - Go Home Cryptoprocessor, You're Drunk! - 2021.info.json
|
2022-04-28 10:11 |
265.3 KB |
| HPE iLO5 Firmware Security - Go Home Cryptoprocessor, You're Drunk! - 2021.mp4
|
2021-12-07 05:51 |
89.5 MB |
| HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges - 2021.description
|
2022-04-21 16:37 |
594 B |
| HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges - 2021.info.json
|
2022-04-21 16:37 |
619.8 KB |
| HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges - 2021.mp4
|
2021-01-20 13:20 |
128.7 MB |
| HTTP_2 - The Sequel is Always Worse - 2021.description
|
2022-04-21 15:07 |
579 B |
| HTTP_2 - The Sequel is Always Worse - 2021.info.json
|
2022-04-21 15:07 |
265.1 KB |
| HTTP_2 - The Sequel is Always Worse - 2021.mp4
|
2021-08-22 16:40 |
88.2 MB |
| Hunting Invisible Salamanders - Cryptographic (in)Security with Attacker-Controlled Keys - 2021.description
|
2022-04-21 16:45 |
817 B |
| Hunting Invisible Salamanders - Cryptographic (in)Security with Attacker-Controlled Keys - 2021.info.json
|
2022-04-21 16:45 |
526.1 KB |
| Hunting Invisible Salamanders - Cryptographic (in)Security with Attacker-Controlled Keys - 2021.mp4
|
2021-01-19 20:51 |
55.7 MB |
| Hunting Vulnerabilities of gRPC Protocol Armed Mobile_IoT Applications - 2021.description
|
2022-04-21 14:46 |
726 B |
| Hunting Vulnerabilities of gRPC Protocol Armed Mobile_IoT Applications - 2021.info.json
|
2022-04-21 14:46 |
552.7 KB |
| Hunting Vulnerabilities of gRPC Protocol Armed Mobile_IoT Applications - 2021.mp4
|
2021-08-16 07:45 |
99.2 MB |
| I calc'd Calc - Exploiting Excel Online - 2021.description
|
2022-04-21 17:27 |
920 B |
| I calc'd Calc - Exploiting Excel Online - 2021.info.json
|
2022-04-21 17:27 |
606.3 KB |
| I calc'd Calc - Exploiting Excel Online - 2021.mp4
|
2021-01-20 10:13 |
137.4 MB |
| IAM Concerned - OAuth Token Hijacking in Google Cloud (GCP) - 2021.description
|
2022-04-21 15:26 |
439 B |
| IAM Concerned - OAuth Token Hijacking in Google Cloud (GCP) - 2021.info.json
|
2022-04-21 15:26 |
574.2 KB |
| IAM Concerned - OAuth Token Hijacking in Google Cloud (GCP) - 2021.mp4
|
2021-03-21 11:25 |
182.6 MB |
| Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale - 2021.description
|
2022-04-21 15:50 |
426 B |
| Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale - 2021.info.json
|
2022-04-21 15:50 |
544.0 KB |
| Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale - 2021.mp4
|
2021-02-27 04:23 |
85.1 MB |
| IMP4GT - IMPersonation Attacks in 4G NeTworks - 2021.description
|
2022-04-21 16:45 |
907 B |
| IMP4GT - IMPersonation Attacks in 4G NeTworks - 2021.info.json
|
2022-04-21 16:45 |
614.4 KB |
| IMP4GT - IMPersonation Attacks in 4G NeTworks - 2021.mp4
|
2021-01-19 19:40 |
139.1 MB |
| Improving Mental Models of End-to-End Encrypted Communication - 2021.description
|
2022-04-28 10:57 |
650 B |
| Improving Mental Models of End-to-End Encrypted Communication - 2021.info.json
|
2022-04-28 10:57 |
585.6 KB |
| Improving Mental Models of End-to-End Encrypted Communication - 2021.mp4
|
2021-01-20 11:34 |
99.1 MB |
| In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor - 2021.description
|
2022-04-21 15:04 |
909 B |
| In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor - 2021.info.json
|
2022-04-21 15:04 |
369.1 KB |
| In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor - 2021.mp4
|
2021-08-19 14:26 |
79.2 MB |
| In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems - 2021.description
|
2022-04-21 15:05 |
781 B |
| In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems - 2021.info.json
|
2022-04-21 15:05 |
45.2 KB |
| In-Field Emulation & Fuzzing of PLCs to Uncover the Next Zero-Day in Industrial Control Systems - 2021.mp4
|
2021-09-01 12:37 |
115.7 MB |
| Incident Response With Wendi Whitmore - 2021.description
|
2022-04-21 15:18 |
251 B |
| Incident Response With Wendi Whitmore - 2021.info.json
|
2022-04-21 15:18 |
264.2 KB |
| Incident Response With Wendi Whitmore - 2021.mp4
|
2021-08-14 16:11 |
133.2 MB |
| Industrial Protocol Gateways Under Analysis - 2021.description
|
2022-04-21 16:47 |
1000 B |
| Industrial Protocol Gateways Under Analysis - 2021.info.json
|
2022-04-21 16:47 |
597.8 KB |
| Industrial Protocol Gateways Under Analysis - 2021.mp4
|
2021-01-20 01:59 |
157.6 MB |
| Insights and Predictions - What's Next in InfoSec - 2021.description
|
2022-04-21 15:15 |
610 B |
| Insights and Predictions - What's Next in InfoSec - 2021.info.json
|
2022-04-21 15:15 |
262.9 KB |
| Insights and Predictions - What's Next in InfoSec - 2021.mp4
|
2021-08-21 03:21 |
215.8 MB |
| Insights on Multi-Factor Authentication - 2021.description
|
2022-04-21 15:19 |
160 B |
| Insights on Multi-Factor Authentication - 2021.info.json
|
2022-04-21 15:19 |
264.0 KB |
| Insights on Multi-Factor Authentication - 2021.mp4
|
2021-09-06 16:03 |
50.7 MB |
| Internal Affairs - Hacking File System Access from the Web - 2021.description
|
2022-04-21 13:30 |
802 B |
| Internal Affairs - Hacking File System Access from the Web - 2021.info.json
|
2022-04-21 13:30 |
264.6 KB |
| Internal Affairs - Hacking File System Access from the Web - 2021.mp4
|
2021-12-06 22:12 |
59.6 MB |
| Intrusion’s Look Ahead to 2022 - 2021.description
|
2022-04-21 14:24 |
237 B |
| Intrusion’s Look Ahead to 2022 - 2021.info.json
|
2022-04-21 14:24 |
263.7 KB |
| Intrusion’s Look Ahead to 2022 - 2021.mp4
|
2021-12-06 13:51 |
80.1 MB |
| iOS Kernel PAC, One Year Later - 2021.description
|
2022-04-21 16:33 |
646 B |
| iOS Kernel PAC, One Year Later - 2021.info.json
|
2022-04-21 16:33 |
604.2 KB |
| iOS Kernel PAC, One Year Later - 2021.mp4
|
2021-01-20 16:14 |
132.3 MB |
| IoT Skimmer - Energy Market Manipulation through High-Wattage IoT Botnets - 2021.description
|
2022-04-21 17:34 |
773 B |
| IoT Skimmer - Energy Market Manipulation through High-Wattage IoT Botnets - 2021.info.json
|
2022-04-21 17:34 |
559.1 KB |
| IoT Skimmer - Energy Market Manipulation through High-Wattage IoT Botnets - 2021.mp4
|
2021-01-20 11:20 |
98.2 MB |
| IPvSeeYou - Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation - 2021.description
|
2022-04-21 13:27 |
680 B |
| IPvSeeYou - Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation - 2021.info.json
|
2022-04-21 13:27 |
265.5 KB |
| IPvSeeYou - Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation - 2021.mp4
|
2021-12-07 01:34 |
134.4 MB |
| It's not FINished - The Evolving Maturity in Ransomware Operations - 2021.description
|
2022-04-21 15:38 |
487 B |
| It's not FINished - The Evolving Maturity in Ransomware Operations - 2021.info.json
|
2022-04-21 15:38 |
569.8 KB |
| It's not FINished - The Evolving Maturity in Ransomware Operations - 2021.mp4
|
2021-04-05 15:04 |
105.3 MB |
| Jack-in-the-Cache - A New Code injection Technique through Modifying X86-to-ARM Translation Cache - 2021.description
|
2022-04-21 15:27 |
520 B |
| Jack-in-the-Cache - A New Code injection Technique through Modifying X86-to-ARM Translation Cache - 2021.info.json
|
2022-04-21 15:27 |
485.9 KB |
| Jack-in-the-Cache - A New Code injection Technique through Modifying X86-to-ARM Translation Cache - 2021.mp4
|
2021-03-21 15:01 |
81.1 MB |
| Keynote - Clocking On - 2021.description
|
2022-04-21 14:29 |
523 B |
| Keynote - Clocking On - 2021.info.json
|
2022-04-21 14:29 |
265.4 KB |
| Keynote - Clocking On - 2021.mp4
|
2021-11-25 15:08 |
345.9 MB |
| Keynote - Embedding a Human-Centric Approach Into a Global Cyber Security Program - 2021.description
|
2022-04-21 13:01 |
383 B |
| Keynote - Embedding a Human-Centric Approach Into a Global Cyber Security Program - 2021.info.json
|
2022-04-21 13:01 |
265.8 KB |
| Keynote - Embedding a Human-Centric Approach Into a Global Cyber Security Program - 2021.mp4
|
2021-12-07 03:00 |
331.4 MB |
| Keynote - Hacking the Cybersecurity Puzzle - 2021.description
|
2022-04-21 15:12 |
850 B |
| Keynote - Hacking the Cybersecurity Puzzle - 2021.info.json
|
2022-04-21 15:12 |
267.0 KB |
| Keynote - Hacking the Cybersecurity Puzzle - 2021.mp4
|
2021-08-22 03:42 |
435.8 MB |
| Keynote - Lessons From 11 Billion Breached Records - 2021.description
|
2022-04-21 14:36 |
590 B |
| Keynote - Lessons From 11 Billion Breached Records - 2021.info.json
|
2022-04-21 14:36 |
275.5 KB |
| Keynote - Lessons From 11 Billion Breached Records - 2021.mp4
|
2021-09-03 22:22 |
91.1 MB |
| Keynote - Secretary Alejandro Mayorkas - 2021.description
|
2022-04-21 14:21 |
292 B |
| Keynote - Secretary Alejandro Mayorkas - 2021.info.json
|
2022-04-21 14:21 |
264.5 KB |
| Keynote - Secretary Alejandro Mayorkas - 2021.mp4
|
2021-12-06 15:15 |
230.7 MB |
| Keynote - Supply Chain Infections and the Future of Contactless Deliveries - 2021.description
|
2022-04-21 15:06 |
568 B |
| Keynote - Supply Chain Infections and the Future of Contactless Deliveries - 2021.info.json
|
2022-04-21 15:06 |
266.7 KB |
| Keynote - Supply Chain Infections and the Future of Contactless Deliveries - 2021.mp4
|
2021-08-22 16:17 |
332.8 MB |
| Kr00k - How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices - 2021.description
|
2022-04-21 16:02 |
543 B |
| Kr00k - How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices - 2021.info.json
|
2022-04-21 16:02 |
558.9 KB |
| Kr00k - How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices - 2021.mp4
|
2021-02-27 01:03 |
101.5 MB |
| Kr00k - Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices - 2021.description
|
2022-04-21 17:27 |
1.0 KB |
| Kr00k - Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices - 2021.info.json
|
2022-04-21 17:27 |
604.4 KB |
| Kr00k - Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices - 2021.mp4
|
2021-01-20 07:22 |
121.2 MB |
| LadderLeak - Breaking ECDSA with Less than One Bit of Nonce Leakage - 2021.description
|
2022-04-21 15:28 |
506 B |
| LadderLeak - Breaking ECDSA with Less than One Bit of Nonce Leakage - 2021.info.json
|
2022-04-21 15:28 |
553.4 KB |
| LadderLeak - Breaking ECDSA with Less than One Bit of Nonce Leakage - 2021.mp4
|
2021-03-21 15:30 |
90.9 MB |
| Lamphone - Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps - 2021.description
|
2022-04-21 17:02 |
1012 B |
| Lamphone - Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps - 2021.info.json
|
2022-04-21 17:02 |
577.1 KB |
| Lamphone - Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps - 2021.mp4
|
2021-01-20 02:57 |
106.9 MB |
| Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant - 2021.description
|
2022-04-21 16:34 |
1.0 KB |
| Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant - 2021.info.json
|
2022-04-21 16:34 |
605.8 KB |
| Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant - 2021.mp4
|
2021-01-20 19:27 |
198.1 MB |
| Legal Pitfalls to Avoid in Security Incidents - 2021.description
|
2022-04-21 13:32 |
348 B |
| Legal Pitfalls to Avoid in Security Incidents - 2021.info.json
|
2022-04-21 13:32 |
264.3 KB |
| Legal Pitfalls to Avoid in Security Incidents - 2021.mp4
|
2021-12-07 06:36 |
73.5 MB |
| Let's Attack Let's Encrypt - 2021.description
|
2022-04-21 14:01 |
719 B |
| Let's Attack Let's Encrypt - 2021.info.json
|
2022-04-21 14:01 |
264.6 KB |
| Let's Attack Let's Encrypt - 2021.mp4
|
2021-12-07 03:14 |
72.3 MB |
| Light Commands - Hacking Voice Assistants with Lasers - 2021.description
|
2022-04-21 15:36 |
465 B |
| Light Commands - Hacking Voice Assistants with Lasers - 2021.info.json
|
2022-04-21 15:36 |
519.6 KB |
| Light Commands - Hacking Voice Assistants with Lasers - 2021.mp4
|
2021-04-05 17:15 |
222.8 MB |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2021 - 2021.description
|
2022-04-21 13:10 |
525 B |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2021 - 2021.info.json
|
2022-04-21 13:10 |
265.1 KB |
| Locknote - Conclusions and Key Takeaways from Black Hat Europe 2021 - 2021.mp4
|
2021-12-07 01:04 |
226.9 MB |
| Locknote - Conclusions and Key Takeaways from Day 1 - 2021.description
|
2022-04-21 15:49 |
334 B |
| Locknote - Conclusions and Key Takeaways from Day 1 - 2021.info.json
|
2022-04-21 15:49 |
603.9 KB |
| Locknote - Conclusions and Key Takeaways from Day 1 - 2021.mp4
|
2021-08-19 17:36 |
335.5 MB |
| Locknote - Conclusions and Key Takeaways from Day 2 - 2021.description
|
2022-04-21 15:49 |
341 B |
| Locknote - Conclusions and Key Takeaways from Day 2 - 2021.info.json
|
2022-04-21 15:49 |
592.0 KB |
| Locknote - Conclusions and Key Takeaways from Day 2 - 2021.mp4
|
2021-03-10 11:51 |
219.6 MB |
| Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community - 2021.description
|
2022-04-21 16:35 |
1.1 KB |
| Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community - 2021.info.json
|
2022-04-21 16:35 |
599.3 KB |
| Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community - 2021.mp4
|
2021-02-26 23:25 |
116.5 MB |
| Manufacturing Hardware Implants from Idea to Mass Production - A Hacker's Journey - 2021.description
|
2022-04-21 15:24 |
432 B |
| Manufacturing Hardware Implants from Idea to Mass Production - A Hacker's Journey - 2021.info.json
|
2022-04-21 15:24 |
264.5 KB |
| Manufacturing Hardware Implants from Idea to Mass Production - A Hacker's Journey - 2021.mp4
|
2021-05-21 23:13 |
183.5 MB |
| May the Trust be with You - Empowering TrustZone-M with Multiple Trusted Environments - 2021.description
|
2022-04-21 16:07 |
510 B |
| May the Trust be with You - Empowering TrustZone-M with Multiple Trusted Environments - 2021.info.json
|
2022-04-21 16:07 |
496.1 KB |
| May the Trust be with You - Empowering TrustZone-M with Multiple Trusted Environments - 2021.mp4
|
2021-02-26 20:30 |
69.9 MB |
| Mem2Img - Memory-Resident Malware Detection via Convolution Neural Network - 2021.description
|
2022-04-21 14:40 |
1.5 KB |
| Mem2Img - Memory-Resident Malware Detection via Convolution Neural Network - 2021.info.json
|
2022-04-21 14:40 |
265.5 KB |
| Mem2Img - Memory-Resident Malware Detection via Convolution Neural Network - 2021.mp4
|
2021-09-01 18:29 |
73.9 MB |
| MFA-ing the Un-MFA-ble - Protecting Auth Systems' Core Secrets - 2021.description
|
2022-04-21 13:31 |
589 B |
| MFA-ing the Un-MFA-ble - Protecting Auth Systems' Core Secrets - 2021.info.json
|
2022-04-21 13:31 |
267.2 KB |
| MFA-ing the Un-MFA-ble - Protecting Auth Systems' Core Secrets - 2021.mp4
|
2021-12-07 05:19 |
109.9 MB |
| Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild - 2021.description
|
2022-04-21 14:39 |
1.3 KB |
| Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild - 2021.info.json
|
2022-04-21 14:39 |
265.8 KB |
| Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild - 2021.mp4
|
2021-09-01 13:44 |
99.2 MB |
| Misuse of DNS, the Second Most Used Protocol - 2021.description
|
2022-04-21 15:44 |
367 B |
| Misuse of DNS, the Second Most Used Protocol - 2021.info.json
|
2022-04-21 15:44 |
264.3 KB |
| Misuse of DNS, the Second Most Used Protocol - 2021.mp4
|
2021-09-04 13:38 |
84.5 MB |
| Mobius Band - Explore Hyper-V Attack Interface through Vulnerabilities Internals - 2021.description
|
2022-04-21 13:26 |
667 B |
| Mobius Band - Explore Hyper-V Attack Interface through Vulnerabilities Internals - 2021.info.json
|
2022-04-21 13:26 |
518.6 KB |
| Mobius Band - Explore Hyper-V Attack Interface through Vulnerabilities Internals - 2021.mp4
|
2021-12-02 14:02 |
82.4 MB |
| Modernizing API Security - 2021.description
|
2022-04-21 14:36 |
45 B |
| Modernizing API Security - 2021.info.json
|
2022-04-21 14:36 |
263.1 KB |
| Modernizing API Security - 2021.mp4
|
2021-09-22 16:23 |
36.5 MB |
| Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets - 2021.description
|
2022-04-21 16:14 |
902 B |
| Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets - 2021.info.json
|
2022-04-21 16:14 |
600.2 KB |
| Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets - 2021.mp4
|
2021-01-20 15:44 |
113.3 MB |
| My Cloud is APT's Cloud - Investigating and Defending Office 365 - 2021.description
|
2022-04-21 16:46 |
715 B |
| My Cloud is APT's Cloud - Investigating and Defending Office 365 - 2021.info.json
|
2022-04-21 16:46 |
603.7 KB |
| My Cloud is APT's Cloud - Investigating and Defending Office 365 - 2021.mp4
|
2021-01-19 20:35 |
141.7 MB |
| My Ticks Don't Lie - New Timing Attacks for Hypervisor Detection - 2021.description
|
2022-04-21 15:37 |
506 B |
| My Ticks Don't Lie - New Timing Attacks for Hypervisor Detection - 2021.info.json
|
2022-04-21 15:37 |
558.5 KB |
| My Ticks Don't Lie - New Timing Attacks for Hypervisor Detection - 2021.mp4
|
2021-04-05 15:50 |
119.7 MB |
| Needing the DoH - The Ongoing Encryption and Centralization of DNS - 2021.description
|
2022-04-21 17:28 |
845 B |
| Needing the DoH - The Ongoing Encryption and Centralization of DNS - 2021.info.json
|
2022-04-21 17:28 |
593.1 KB |
| Needing the DoH - The Ongoing Encryption and Centralization of DNS - 2021.mp4
|
2021-01-20 06:38 |
127.3 MB |
| New Attack Surface in Safari - Using Just One Web Audio Vulnerability to Rule Safari - 2021.description
|
2022-04-21 15:00 |
895 B |
| New Attack Surface in Safari - Using Just One Web Audio Vulnerability to Rule Safari - 2021.info.json
|
2022-04-21 15:00 |
264.9 KB |
| New Attack Surface in Safari - Using Just One Web Audio Vulnerability to Rule Safari - 2021.mp4
|
2021-09-01 15:09 |
56.9 MB |
| Next Gen SoC - How to get SOCs to do their job, i.e. handle Security - 2021.description
|
2022-04-21 14:32 |
64 B |
| Next Gen SoC - How to get SOCs to do their job, i.e. handle Security - 2021.info.json
|
2022-04-21 14:32 |
261.3 KB |
| Next Gen SoC - How to get SOCs to do their job, i.e. handle Security - 2021.mp4
|
2021-10-26 18:48 |
65.5 MB |
| Next-Gen DFIR - Mass Exploits & Supplier Compromise - 2021.description
|
2022-04-21 13:32 |
662 B |
| Next-Gen DFIR - Mass Exploits & Supplier Compromise - 2021.info.json
|
2022-04-21 13:32 |
265.6 KB |
| Next-Gen DFIR - Mass Exploits & Supplier Compromise - 2021.mp4
|
2021-12-07 06:04 |
129.7 MB |
| NoJITsu - Locking Down JavaScript Engines - 2021.description
|
2022-04-21 16:43 |
706 B |
| NoJITsu - Locking Down JavaScript Engines - 2021.info.json
|
2022-04-21 16:43 |
533.6 KB |
| NoJITsu - Locking Down JavaScript Engines - 2021.mp4
|
2021-01-20 01:05 |
99.9 MB |
| Office Drama on macOS - 2021.description
|
2022-04-21 16:47 |
572 B |
| Office Drama on macOS - 2021.info.json
|
2022-04-21 16:47 |
618.9 KB |
| Office Drama on macOS - 2021.mp4
|
2021-01-19 22:01 |
151.7 MB |
| Operation Chimera - APT Operation Targets Semiconductor Vendors - 2021.description
|
2022-04-21 16:41 |
1.0 KB |
| Operation Chimera - APT Operation Targets Semiconductor Vendors - 2021.info.json
|
2022-04-21 16:41 |
612.5 KB |
| Operation Chimera - APT Operation Targets Semiconductor Vendors - 2021.mp4
|
2021-01-20 00:44 |
94.1 MB |
| Over the Air Baseband Exploit - Gaining Remote Code Execution on 5G Smartphones - 2021.description
|
2022-04-21 14:06 |
816 B |
| Over the Air Baseband Exploit - Gaining Remote Code Execution on 5G Smartphones - 2021.info.json
|
2022-04-21 14:06 |
46.2 KB |
| Over the Air Baseband Exploit - Gaining Remote Code Execution on 5G Smartphones - 2021.mp4
|
2021-12-06 14:57 |
108.3 MB |
| Page Cache Attacks - Microarchitectural Attacks on Flawless Hardware - 2021.description
|
2022-04-21 16:01 |
474 B |
| Page Cache Attacks - Microarchitectural Attacks on Flawless Hardware - 2021.info.json
|
2022-04-21 16:01 |
557.0 KB |
| Page Cache Attacks - Microarchitectural Attacks on Flawless Hardware - 2021.mp4
|
2021-02-27 01:27 |
125.7 MB |
| Patching Loopholes - Finding Backdoors in Applications - 2021.description
|
2022-04-21 15:46 |
381 B |
| Patching Loopholes - Finding Backdoors in Applications - 2021.info.json
|
2022-04-21 15:46 |
426.7 KB |
| Patching Loopholes - Finding Backdoors in Applications - 2021.mp4
|
2021-02-27 10:34 |
46.2 MB |
| PCIe Device Attacks - Beyond DMA. Exploiting PCIe Switches, Messages and Errors - 2021.description
|
2022-04-21 14:12 |
945 B |
| PCIe Device Attacks - Beyond DMA. Exploiting PCIe Switches, Messages and Errors - 2021.info.json
|
2022-04-21 14:12 |
45.1 KB |
| PCIe Device Attacks - Beyond DMA. Exploiting PCIe Switches, Messages and Errors - 2021.mp4
|
2021-12-06 18:44 |
104.9 MB |
| Permission Mining in GCP - 2021.description
|
2022-04-21 15:22 |
420 B |
| Permission Mining in GCP - 2021.info.json
|
2022-04-21 15:22 |
264.5 KB |
| Permission Mining in GCP - 2021.mp4
|
2021-08-27 18:57 |
66.1 MB |
| Please Make a Dentist Appointment ASAP - Attacking IOBluetoothFamily HCI and Vendor-Specific Commands - 2021.description
|
2022-04-21 15:23 |
500 B |
| Please Make a Dentist Appointment ASAP - Attacking IOBluetoothFamily HCI and Vendor-Specific Commands - 2021.info.json
|
2022-04-21 15:23 |
581.1 KB |
| Please Make a Dentist Appointment ASAP - Attacking IOBluetoothFamily HCI and Vendor-Specific Commands - 2021.mp4
|
2021-03-10 14:40 |
114.3 MB |
| Plundervolt - Flipping Bits from Software without Rowhammer - 2021.description
|
2022-04-21 16:45 |
917 B |
| Plundervolt - Flipping Bits from Software without Rowhammer - 2021.info.json
|
2022-04-21 16:45 |
599.7 KB |
| Plundervolt - Flipping Bits from Software without Rowhammer - 2021.mp4
|
2021-01-20 00:31 |
151.1 MB |
| Policy Implications of Faulty Cyber Risk Models and How to Fix Them - 2021.description
|
2022-04-21 16:58 |
1.3 KB |
| Policy Implications of Faulty Cyber Risk Models and How to Fix Them - 2021.info.json
|
2022-04-21 16:58 |
636.5 KB |
| Policy Implications of Faulty Cyber Risk Models and How to Fix Them - 2021.mp4
|
2021-01-20 06:56 |
151.6 MB |
| Portable Data exFiltration - XSS for PDFs - 2021.description
|
2022-04-21 15:24 |
462 B |
| Portable Data exFiltration - XSS for PDFs - 2021.info.json
|
2022-04-21 15:24 |
547.0 KB |
| Portable Data exFiltration - XSS for PDFs - 2021.mp4
|
2021-03-12 13:02 |
77.9 MB |
| Portable Document Flaws 101 - 2021.description
|
2022-04-21 17:00 |
429 B |
| Portable Document Flaws 101 - 2021.info.json
|
2022-04-21 17:00 |
675.1 KB |
| Portable Document Flaws 101 - 2021.mp4
|
2021-01-20 08:06 |
132.5 MB |
| POSWorld. Should You be Afraid of Hands-On Payment Devices - 2021.description
|
2022-04-21 15:31 |
501 B |
| POSWorld. Should You be Afraid of Hands-On Payment Devices - 2021.info.json
|
2022-04-21 15:31 |
531.5 KB |
| POSWorld. Should You be Afraid of Hands-On Payment Devices - 2021.mp4
|
2021-03-27 19:25 |
86.2 MB |
| Practical Defenses Against Adversarial Machine Learning - 2021.description
|
2022-04-21 17:31 |
897 B |
| Practical Defenses Against Adversarial Machine Learning - 2021.info.json
|
2022-04-21 17:31 |
531.1 KB |
| Practical Defenses Against Adversarial Machine Learning - 2021.mp4
|
2021-01-20 06:08 |
197.3 MB |
| Pre-built JOP Chains with the JOP ROCKET - Bypassing DEP without ROP - 2021.description
|
2022-04-21 14:55 |
1.1 KB |
| Pre-built JOP Chains with the JOP ROCKET - Bypassing DEP without ROP - 2021.info.json
|
2022-04-21 14:55 |
265.5 KB |
| Pre-built JOP Chains with the JOP ROCKET - Bypassing DEP without ROP - 2021.mp4
|
2021-09-01 23:48 |
171.5 MB |
| Precursor - Towards Evidence-Based Trust in Hardware - 2021.description
|
2022-04-21 15:40 |
419 B |
| Precursor - Towards Evidence-Based Trust in Hardware - 2021.info.json
|
2022-04-21 15:40 |
624.8 KB |
| Precursor - Towards Evidence-Based Trust in Hardware - 2021.mp4
|
2021-04-05 16:59 |
168.4 MB |
| President's Cup Cyber Competition - Finding the Best Cyber Talent in the US Government - 2021.description
|
2022-04-21 14:10 |
760 B |
| President's Cup Cyber Competition - Finding the Best Cyber Talent in the US Government - 2021.info.json
|
2022-04-21 14:10 |
265.7 KB |
| President's Cup Cyber Competition - Finding the Best Cyber Talent in the US Government - 2021.mp4
|
2021-12-06 19:17 |
116.2 MB |
| ProxyLogon is Just the Tip of the Iceberg - A New Attack Surface on Microsoft Exchange Server! - 2021.description
|
2022-04-21 14:20 |
634 B |
| ProxyLogon is Just the Tip of the Iceberg - A New Attack Surface on Microsoft Exchange Server! - 2021.info.json
|
2022-04-21 14:20 |
265.8 KB |
| ProxyLogon is Just the Tip of the Iceberg - A New Attack Surface on Microsoft Exchange Server! - 2021.mp4
|
2021-12-06 18:52 |
118.2 MB |
| Put in One Bug and Pop Out More - An Effective Way of Bug Hunting in Chrome - 2021.description
|
2022-04-21 14:19 |
640 B |
| Put in One Bug and Pop Out More - An Effective Way of Bug Hunting in Chrome - 2021.info.json
|
2022-04-21 14:19 |
265.1 KB |
| Put in One Bug and Pop Out More - An Effective Way of Bug Hunting in Chrome - 2021.mp4
|
2021-12-06 16:31 |
80.9 MB |
| Qualcomm WiFi - Infinity War - 2021.description
|
2022-04-21 14:11 |
671 B |
| Qualcomm WiFi - Infinity War - 2021.info.json
|
2022-04-21 14:11 |
264.8 KB |
| Qualcomm WiFi - Infinity War - 2021.mp4
|
2021-12-06 14:20 |
73.8 MB |
| Quantum Security and Cryptography - You Are (Probably) Doing it Wrong - 2021.description
|
2022-04-21 15:39 |
486 B |
| Quantum Security and Cryptography - You Are (Probably) Doing it Wrong - 2021.info.json
|
2022-04-21 15:39 |
570.4 KB |
| Quantum Security and Cryptography - You Are (Probably) Doing it Wrong - 2021.mp4
|
2021-03-28 12:29 |
98.4 MB |
| Racing the Dark - A New TOCTTOU Story From Apple's Core - 2021.description
|
2022-04-21 14:53 |
615 B |
| Racing the Dark - A New TOCTTOU Story From Apple's Core - 2021.info.json
|
2022-04-21 14:53 |
265.0 KB |
| Racing the Dark - A New TOCTTOU Story From Apple's Core - 2021.mp4
|
2021-09-01 15:52 |
97.2 MB |
| Raiden Glitching Framework - 2021.description
|
2022-04-21 15:43 |
360 B |
| Raiden Glitching Framework - 2021.info.json
|
2022-04-21 15:43 |
619.3 KB |
| Raiden Glitching Framework - 2021.mp4
|
2021-02-27 08:07 |
97.3 MB |
| Ransomware, ICS Risk & Cyber-Mercenaries - Cybercrime in 2021 - 2021.description
|
2022-04-21 14:32 |
75 B |
| Ransomware, ICS Risk & Cyber-Mercenaries - Cybercrime in 2021 - 2021.info.json
|
2022-04-21 14:32 |
263.8 KB |
| Ransomware, ICS Risk & Cyber-Mercenaries - Cybercrime in 2021 - 2021.mp4
|
2021-10-21 18:34 |
76.1 MB |
| Reclaim the Upper Hand in Cloud Security - 2021.description
|
2022-04-21 15:17 |
244 B |
| Reclaim the Upper Hand in Cloud Security - 2021.info.json
|
2022-04-21 15:17 |
263.3 KB |
| Reclaim the Upper Hand in Cloud Security - 2021.mp4
|
2021-08-30 14:36 |
50.0 MB |
| Recording at Scale Across your Global Network is Essential for your Cyber Security Posture - 2021.description
|
2022-04-21 14:34 |
59 B |
| Recording at Scale Across your Global Network is Essential for your Cyber Security Posture - 2021.info.json
|
2022-04-21 14:34 |
264.0 KB |
| Recording at Scale Across your Global Network is Essential for your Cyber Security Posture - 2021.mp4
|
2021-10-12 19:59 |
82.4 MB |
| Redback - Advanced Static Binary Injection - 2021.description
|
2022-04-21 15:50 |
400 B |
| Redback - Advanced Static Binary Injection - 2021.info.json
|
2022-04-21 15:50 |
552.4 KB |
| Redback - Advanced Static Binary Injection - 2021.mp4
|
2021-02-27 03:54 |
93.5 MB |
| Remote Timing Attacks on TPMs, AKA TPM-Fail - 2021.description
|
2022-04-21 16:50 |
705 B |
| Remote Timing Attacks on TPMs, AKA TPM-Fail - 2021.info.json
|
2022-04-21 16:50 |
587.2 KB |
| Remote Timing Attacks on TPMs, AKA TPM-Fail - 2021.mp4
|
2021-01-19 22:26 |
151.4 MB |
| Repurposing Neural Networks to Generate Synthetic Media for Information Operations - 2021.description
|
2022-04-21 16:31 |
1.0 KB |
| Repurposing Neural Networks to Generate Synthetic Media for Information Operations - 2021.info.json
|
2022-04-21 16:31 |
601.3 KB |
| Repurposing Neural Networks to Generate Synthetic Media for Information Operations - 2021.mp4
|
2021-01-20 18:15 |
134.6 MB |
| Reverse Engineering Compliance - 2021.description
|
2022-04-21 15:00 |
616 B |
| Reverse Engineering Compliance - 2021.info.json
|
2022-04-21 15:00 |
264.7 KB |
| Reverse Engineering Compliance - 2021.mp4
|
2021-09-01 15:20 |
93.3 MB |
| Reverse Engineering the M1 - 2021.description
|
2022-04-21 14:07 |
747 B |
| Reverse Engineering the M1 - 2021.info.json
|
2022-04-21 14:07 |
265.4 KB |
| Reverse Engineering the M1 - 2021.mp4
|
2021-12-06 14:13 |
114.0 MB |
| Reverse Engineering the Tesla Battery Management System to increase Power Available - 2021.description
|
2022-04-21 17:31 |
920 B |
| Reverse Engineering the Tesla Battery Management System to increase Power Available - 2021.info.json
|
2022-04-21 17:31 |
606.0 KB |
| Reverse Engineering the Tesla Battery Management System to increase Power Available - 2021.mp4
|
2021-01-20 06:24 |
169.5 MB |
| Reversing the Root - Identifying the Exploited Vulnerability in 0-days Used In-The-Wild - 2021.description
|
2022-04-21 17:01 |
935 B |
| Reversing the Root - Identifying the Exploited Vulnerability in 0-days Used In-The-Wild - 2021.info.json
|
2022-04-21 17:01 |
612.4 KB |
| Reversing the Root - Identifying the Exploited Vulnerability in 0-days Used In-The-Wild - 2021.mp4
|
2021-01-20 10:28 |
135.1 MB |
| Room for Escape - Scribbling Outside the Lines of Template Security - 2021.description
|
2022-04-21 16:58 |
778 B |
| Room for Escape - Scribbling Outside the Lines of Template Security - 2021.info.json
|
2022-04-21 16:58 |
593.2 KB |
| Room for Escape - Scribbling Outside the Lines of Template Security - 2021.mp4
|
2021-01-20 10:56 |
105.1 MB |
| Rope - Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution - 2021.description
|
2022-04-21 14:22 |
1011 B |
| Rope - Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution - 2021.info.json
|
2022-04-21 14:22 |
265.6 KB |
| Rope - Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution - 2021.mp4
|
2021-12-06 16:23 |
104.8 MB |
| Routopsy - Modern Routing Protocol Vulnerability Analysis and Exploitation - 2021.description
|
2022-04-21 16:42 |
822 B |
| Routopsy - Modern Routing Protocol Vulnerability Analysis and Exploitation - 2021.info.json
|
2022-04-21 16:42 |
613.1 KB |
| Routopsy - Modern Routing Protocol Vulnerability Analysis and Exploitation - 2021.mp4
|
2021-01-19 23:14 |
85.7 MB |
| Ruling StarCraft Game Spitefully -- Exploiting the Blind Spot of AI-Powered Game Bots - 2021.description
|
2022-04-21 17:26 |
775 B |
| Ruling StarCraft Game Spitefully -- Exploiting the Blind Spot of AI-Powered Game Bots - 2021.info.json
|
2022-04-21 17:26 |
601.1 KB |
| Ruling StarCraft Game Spitefully -- Exploiting the Blind Spot of AI-Powered Game Bots - 2021.mp4
|
2021-01-20 05:57 |
138.9 MB |
| Safeguarding UEFI Ecosystem - Firmware Supply Chain is Hard(coded) - 2021.description
|
2022-04-21 14:11 |
1.0 KB |
| Safeguarding UEFI Ecosystem - Firmware Supply Chain is Hard(coded) - 2021.info.json
|
2022-04-21 14:11 |
265.6 KB |
| Safeguarding UEFI Ecosystem - Firmware Supply Chain is Hard(coded) - 2021.mp4
|
2021-12-06 16:45 |
120.4 MB |
| Scavenger - Misuse Error Handling Leading to Qemu_KVM Escape - 2021.description
|
2022-04-21 14:37 |
711 B |
| Scavenger - Misuse Error Handling Leading to Qemu_KVM Escape - 2021.info.json
|
2022-04-21 14:37 |
265.2 KB |
| Scavenger - Misuse Error Handling Leading to Qemu_KVM Escape - 2021.mp4
|
2021-09-01 12:23 |
78.7 MB |
| Securing Open Source Software - End-to-end, At massive scale, Together - 2021.description
|
2022-04-21 14:02 |
1.4 KB |
| Securing Open Source Software - End-to-end, At massive scale, Together - 2021.info.json
|
2022-04-21 14:02 |
266.0 KB |
| Securing Open Source Software - End-to-end, At massive scale, Together - 2021.mp4
|
2021-12-06 19:19 |
116.7 MB |
| Securing the Next Version of HTTP - How QUIC and HTTP_3 Compare to HTTP_2 - 2021.description
|
2022-04-21 15:44 |
403 B |
| Securing the Next Version of HTTP - How QUIC and HTTP_3 Compare to HTTP_2 - 2021.info.json
|
2022-04-21 15:44 |
551.1 KB |
| Securing the Next Version of HTTP - How QUIC and HTTP_3 Compare to HTTP_2 - 2021.mp4
|
2021-02-27 09:12 |
72.8 MB |
| Securing the Public, who is in Charge - 2021.description
|
2022-04-28 10:29 |
270 B |
| Securing the Public, who is in Charge - 2021.info.json
|
2022-04-28 10:29 |
265.4 KB |
| Securing the Public, who is in Charge - 2021.mp4
|
2021-11-23 22:51 |
352.6 MB |
| Security Analysis of CHERI ISASecurity Analysis of CHERI ISA - 2021.description
|
2022-04-21 14:04 |
679 B |
| Security Analysis of CHERI ISASecurity Analysis of CHERI ISA - 2021.info.json
|
2022-04-21 14:04 |
264.1 KB |
| Security Analysis of CHERI ISASecurity Analysis of CHERI ISA - 2021.mp4
|
2021-12-06 17:13 |
107.8 MB |
| Security Research on Mercedes-Benz - From Hardware to Car Control - 2021.description
|
2022-04-21 16:43 |
580 B |
| Security Research on Mercedes-Benz - From Hardware to Car Control - 2021.info.json
|
2022-04-21 16:43 |
661.8 KB |
| Security Research on Mercedes-Benz - From Hardware to Car Control - 2021.mp4
|
2021-01-19 23:54 |
153.5 MB |
| Self-Learning AI - Minimize Cyber Disruption - 2021.description
|
2022-04-21 14:35 |
296 B |
| Self-Learning AI - Minimize Cyber Disruption - 2021.info.json
|
2022-04-21 14:35 |
263.6 KB |
| Self-Learning AI - Minimize Cyber Disruption - 2021.mp4
|
2021-09-22 16:18 |
52.9 MB |
| Shield with Hole - New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy - 2021.description
|
2022-04-28 10:48 |
514 B |
| Shield with Hole - New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy - 2021.info.json
|
2022-04-28 10:48 |
567.2 KB |
| Shield with Hole - New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy - 2021.mp4
|
2021-03-21 14:27 |
134.3 MB |
| Sleight of ARM - Demystifying Intel Houdini - 2021.description
|
2022-04-28 10:22 |
872 B |
| Sleight of ARM - Demystifying Intel Houdini - 2021.info.json
|
2022-04-28 10:22 |
265.5 KB |
| Sleight of ARM - Demystifying Intel Houdini - 2021.mp4
|
2021-12-06 21:56 |
107.4 MB |
| Smashing the ML Stack for Fun and Lawsuits - 2021.description
|
2022-04-21 14:23 |
678 B |
| Smashing the ML Stack for Fun and Lawsuits - 2021.info.json
|
2022-04-21 14:23 |
264.8 KB |
| Smashing the ML Stack for Fun and Lawsuits - 2021.mp4
|
2021-12-06 17:12 |
84.7 MB |
| Spectra - Breaking Separation Between Wireless Chips - 2021.description
|
2022-04-21 16:31 |
637 B |
| Spectra - Breaking Separation Between Wireless Chips - 2021.info.json
|
2022-04-21 16:31 |
602.1 KB |
| Spectra - Breaking Separation Between Wireless Chips - 2021.mp4
|
2021-01-20 14:07 |
147.4 MB |
| Speed + Security – Best Practices for Securing Containers - 2021.description
|
2022-04-21 16:10 |
233 B |
| Speed + Security – Best Practices for Securing Containers - 2021.info.json
|
2022-04-21 16:10 |
264.2 KB |
| Speed + Security – Best Practices for Securing Containers - 2021.mp4
|
2021-08-28 11:07 |
92.4 MB |
| Staying Ahead of the Changing Attack Landscape with Zero Trust - 2021.description
|
2022-04-21 14:33 |
44 B |
| Staying Ahead of the Changing Attack Landscape with Zero Trust - 2021.info.json
|
2022-04-21 14:33 |
264.0 KB |
| Staying Ahead of the Changing Attack Landscape with Zero Trust - 2021.mp4
|
2021-10-21 17:53 |
48.6 MB |
| Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication - 2021.description
|
2022-04-21 16:35 |
697 B |
| Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication - 2021.info.json
|
2022-04-21 16:35 |
603.8 KB |
| Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication - 2021.mp4
|
2021-01-20 14:34 |
125.3 MB |
| Stopping Snake Oil with Smaller Healthcare Providers - Addressing Security with Actionable Plans - 2021.description
|
2022-04-21 16:38 |
734 B |
| Stopping Snake Oil with Smaller Healthcare Providers - Addressing Security with Actionable Plans - 2021.info.json
|
2022-04-21 16:38 |
600.4 KB |
| Stopping Snake Oil with Smaller Healthcare Providers - Addressing Security with Actionable Plans - 2021.mp4
|
2021-01-20 17:50 |
125.4 MB |
| Store-to-Leak Forwarding - There and Back Again - 2021.description
|
2022-04-28 10:54 |
419 B |
| Store-to-Leak Forwarding - There and Back Again - 2021.info.json
|
2022-04-28 10:54 |
566.4 KB |
| Store-to-Leak Forwarding - There and Back Again - 2021.mp4
|
2021-02-27 03:08 |
135.4 MB |
| Story of Jailbreaking iOS 13 - 2021.description
|
2022-04-21 15:32 |
442 B |
| Story of Jailbreaking iOS 13 - 2021.info.json
|
2022-04-21 15:32 |
578.2 KB |
| Story of Jailbreaking iOS 13 - 2021.mp4
|
2021-03-28 09:51 |
73.4 MB |
| Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon - 2021.description
|
2022-04-21 17:02 |
654 B |
| Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon - 2021.info.json
|
2022-04-21 17:02 |
474.4 KB |
| Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon - 2021.mp4
|
2021-01-20 02:43 |
66.0 MB |
| Symbexcel - Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros - 2021.description
|
2022-04-21 14:06 |
1.0 KB |
| Symbexcel - Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros - 2021.info.json
|
2022-04-21 14:06 |
265.7 KB |
| Symbexcel - Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros - 2021.mp4
|
2021-12-07 11:38 |
94.2 MB |
| Tackling Social Engineering in Today’s Cybersecurity World - 2021.description
|
2022-04-21 14:33 |
76 B |
| Tackling Social Engineering in Today’s Cybersecurity World - 2021.info.json
|
2022-04-21 14:33 |
263.8 KB |
| Tackling Social Engineering in Today’s Cybersecurity World - 2021.mp4
|
2021-10-21 18:43 |
59.1 MB |
| The B-MAD Approach to Threat Modeling - 2021.description
|
2022-04-21 15:00 |
657 B |
| The B-MAD Approach to Threat Modeling - 2021.info.json
|
2022-04-21 15:00 |
485.9 KB |
| The B-MAD Approach to Threat Modeling - 2021.mp4
|
2021-08-15 21:22 |
78.4 MB |
| The Black Hat NOC - Greatest Hits and Holy...Cows - 2021.description
|
2022-04-21 15:47 |
324 B |
| The Black Hat NOC - Greatest Hits and Holy...Cows - 2021.info.json
|
2022-04-21 15:47 |
632.7 KB |
| The Black Hat NOC - Greatest Hits and Holy...Cows - 2021.mp4
|
2021-02-27 11:31 |
119.4 MB |
| The Case for a National Cybersecurity Safety Board - 2021.description
|
2022-04-21 14:19 |
1.3 KB |
| The Case for a National Cybersecurity Safety Board - 2021.info.json
|
2022-04-21 14:19 |
540.4 KB |
| The Case for a National Cybersecurity Safety Board - 2021.mp4
|
2021-12-02 19:21 |
116.1 MB |
| The Cost of Complexity - Different Vulnerabilities While Implementing the Same RFC - 2021.description
|
2022-04-21 14:39 |
560 B |
| The Cost of Complexity - Different Vulnerabilities While Implementing the Same RFC - 2021.info.json
|
2022-04-21 14:39 |
266.0 KB |
| The Cost of Complexity - Different Vulnerabilities While Implementing the Same RFC - 2021.mp4
|
2021-09-01 21:02 |
99.5 MB |
| The Dark Age of Memory Corruption Mitigations in the Spectre Era - 2021.description
|
2022-04-21 14:05 |
605 B |
| The Dark Age of Memory Corruption Mitigations in the Spectre Era - 2021.info.json
|
2022-04-21 14:05 |
265.1 KB |
| The Dark Age of Memory Corruption Mitigations in the Spectre Era - 2021.mp4
|
2021-12-06 14:42 |
93.0 MB |
| The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis - 2021.description
|
2022-04-21 16:40 |
1014 B |
| The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis - 2021.info.json
|
2022-04-21 16:40 |
536.1 KB |
| The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis - 2021.mp4
|
2021-01-20 19:38 |
100.7 MB |
| The Devil is in the GAN - Defending Deep Generative Models Against Adversarial Attacks - 2021.description
|
2022-04-21 14:30 |
1.0 KB |
| The Devil is in the GAN - Defending Deep Generative Models Against Adversarial Attacks - 2021.info.json
|
2022-04-21 14:30 |
265.8 KB |
| The Devil is in the GAN - Defending Deep Generative Models Against Adversarial Attacks - 2021.mp4
|
2021-11-22 13:40 |
119.2 MB |
| The Evil Alt-Ego - (ab)using HTTP Alternative Services - 2021.description
|
2022-04-21 15:42 |
425 B |
| The Evil Alt-Ego - (ab)using HTTP Alternative Services - 2021.info.json
|
2022-04-21 15:42 |
264.6 KB |
| The Evil Alt-Ego - (ab)using HTTP Alternative Services - 2021.mp4
|
2021-08-31 07:13 |
122.9 MB |
| The Evil of Spy Camera - 2021.description
|
2022-04-21 15:41 |
311 B |
| The Evil of Spy Camera - 2021.info.json
|
2022-04-21 15:41 |
264.4 KB |
| The Evil of Spy Camera - 2021.mp4
|
2021-08-29 21:25 |
93.3 MB |
| The Evolution of Ransomeware - 2021.description
|
2022-04-21 15:21 |
321 B |
| The Evolution of Ransomeware - 2021.info.json
|
2022-04-21 15:21 |
263.3 KB |
| The Evolution of Ransomeware - 2021.mp4
|
2021-08-30 23:09 |
47.5 MB |
| The Evolution of the CISO with Ben Carr, CISO at Qualys - 2021.description
|
2022-04-21 15:19 |
130 B |
| The Evolution of the CISO with Ben Carr, CISO at Qualys - 2021.info.json
|
2022-04-21 15:19 |
263.8 KB |
| The Evolution of the CISO with Ben Carr, CISO at Qualys - 2021.mp4
|
2021-08-31 12:25 |
82.6 MB |
| The Hunt for Major League IoT-ICS Threats - A Deep Dive into IoT Threat Terrain - 2021.description
|
2022-04-21 15:25 |
478 B |
| The Hunt for Major League IoT-ICS Threats - A Deep Dive into IoT Threat Terrain - 2021.info.json
|
2022-04-21 15:25 |
533.6 KB |
| The Hunt for Major League IoT-ICS Threats - A Deep Dive into IoT Threat Terrain - 2021.mp4
|
2021-03-21 10:27 |
159.8 MB |
| The Inside Story - There are Apps in Apps and Here is How to Break Them - 2021.description
|
2022-04-21 16:05 |
443 B |
| The Inside Story - There are Apps in Apps and Here is How to Break Them - 2021.info.json
|
2022-04-21 16:05 |
480.4 KB |
| The Inside Story - There are Apps in Apps and Here is How to Break Them - 2021.mp4
|
2021-02-26 21:50 |
55.8 MB |
| The Kitten that Charmed Me - The 9 Lives of a Nation State Attacker - 2021.description
|
2022-04-21 15:11 |
966 B |
| The Kitten that Charmed Me - The 9 Lives of a Nation State Attacker - 2021.info.json
|
2022-04-21 15:11 |
265.3 KB |
| The Kitten that Charmed Me - The 9 Lives of a Nation State Attacker - 2021.mp4
|
2021-08-20 15:43 |
92.1 MB |
| The Mass Effect - How Opportunistic Workers Drift into Cybercrime - 2021.description
|
2022-04-21 14:03 |
1.1 KB |
| The Mass Effect - How Opportunistic Workers Drift into Cybercrime - 2021.info.json
|
2022-04-21 14:03 |
265.7 KB |
| The Mass Effect - How Opportunistic Workers Drift into Cybercrime - 2021.mp4
|
2021-12-06 14:08 |
109.2 MB |
| The Motion Sensor Western - The Good, the Bad, and the Ugly - 2021.description
|
2022-04-21 15:02 |
1.2 KB |
| The Motion Sensor Western - The Good, the Bad, and the Ugly - 2021.info.json
|
2022-04-21 15:02 |
265.2 KB |
| The Motion Sensor Western - The Good, the Bad, and the Ugly - 2021.mp4
|
2021-09-01 17:22 |
77.8 MB |
| The Paramedic's Guide to Surviving Cybersecurity - 2021.description
|
2022-04-21 16:36 |
1.3 KB |
| The Paramedic's Guide to Surviving Cybersecurity - 2021.info.json
|
2022-04-21 16:36 |
600.4 KB |
| The Paramedic's Guide to Surviving Cybersecurity - 2021.mp4
|
2021-01-20 18:45 |
139.7 MB |
| The Price of Compatibility - Defeating macOS Kernel Using Extended File Attributes - 2021.description
|
2022-04-21 15:02 |
882 B |
| The Price of Compatibility - Defeating macOS Kernel Using Extended File Attributes - 2021.info.json
|
2022-04-21 15:02 |
265.4 KB |
| The Price of Compatibility - Defeating macOS Kernel Using Extended File Attributes - 2021.mp4
|
2021-09-01 14:51 |
102.5 MB |
| The Ripple Effect - Building a Diverse Security Research Team - 2021.description
|
2022-04-21 15:14 |
499 B |
| The Ripple Effect - Building a Diverse Security Research Team - 2021.info.json
|
2022-04-21 15:14 |
265.2 KB |
| The Ripple Effect - Building a Diverse Security Research Team - 2021.mp4
|
2021-08-21 16:07 |
114.4 MB |
| The Rise of Potatoes - Privilege Escalations in Windows Services - 2021.description
|
2022-04-21 15:04 |
507 B |
| The Rise of Potatoes - Privilege Escalations in Windows Services - 2021.info.json
|
2022-04-21 15:04 |
265.4 KB |
| The Rise of Potatoes - Privilege Escalations in Windows Services - 2021.mp4
|
2021-09-01 14:28 |
119.6 MB |
| The State of State Machines - 2021.description
|
2022-04-21 16:09 |
216 B |
| The State of State Machines - 2021.info.json
|
2022-04-21 16:09 |
263.4 KB |
| The State of State Machines - 2021.mp4
|
2021-09-03 20:32 |
114.4 MB |
| The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study - 2021.description
|
2022-04-21 15:32 |
486 B |
| The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study - 2021.info.json
|
2022-04-21 15:32 |
333.1 KB |
| The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study - 2021.mp4
|
2021-03-28 10:17 |
241.5 MB |
| The Tangled Webview ----- Javascriptinterface Once More - 2021.description
|
2022-04-21 15:01 |
647 B |
| The Tangled Webview ----- Javascriptinterface Once More - 2021.info.json
|
2022-04-21 15:01 |
264.2 KB |
| The Tangled Webview ----- Javascriptinterface Once More - 2021.mp4
|
2021-09-01 21:26 |
51.6 MB |
| This is for the Pwners - Exploiting a WebKit 0-day in PlayStation 4 - 2021.description
|
2022-04-21 15:22 |
490 B |
| This is for the Pwners - Exploiting a WebKit 0-day in PlayStation 4 - 2021.info.json
|
2022-04-21 15:22 |
264.5 KB |
| This is for the Pwners - Exploiting a WebKit 0-day in PlayStation 4 - 2021.mp4
|
2021-05-21 15:34 |
61.5 MB |
| Threat Hunting in Active Directory Environment - 2021.description
|
2022-04-21 14:48 |
999 B |
| Threat Hunting in Active Directory Environment - 2021.info.json
|
2022-04-21 14:48 |
265.5 KB |
| Threat Hunting in Active Directory Environment - 2021.mp4
|
2021-09-01 16:35 |
86.0 MB |
| Timeless Timing Attacks - 2021.description
|
2022-04-21 14:09 |
1.0 KB |
| Timeless Timing Attacks - 2021.info.json
|
2022-04-21 14:09 |
266.7 KB |
| Timeless Timing Attacks - 2021.mp4
|
2021-12-06 16:53 |
110.0 MB |
| TiYunZong Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from 2015-2020 - 2021.description
|
2022-04-21 17:28 |
900 B |
| TiYunZong Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from 2015-2020 - 2021.info.json
|
2022-04-21 17:28 |
670.2 KB |
| TiYunZong Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from 2015-2020 - 2021.mp4
|
2021-01-20 10:00 |
91.1 MB |
| Tracking the Criminal of Fake News Based on a Unified Embedding - 2021.description
|
2022-04-21 16:05 |
448 B |
| Tracking the Criminal of Fake News Based on a Unified Embedding - 2021.info.json
|
2022-04-21 16:05 |
464.7 KB |
| Tracking the Criminal of Fake News Based on a Unified Embedding - 2021.mp4
|
2021-02-26 22:06 |
54.8 MB |
| Typhoon Mangkhut - One-click Remote Universal Root Formed with Two Vulnerabilities - 2021.description
|
2022-04-21 14:04 |
1.0 KB |
| Typhoon Mangkhut - One-click Remote Universal Root Formed with Two Vulnerabilities - 2021.info.json
|
2022-04-21 14:04 |
265.8 KB |
| Typhoon Mangkhut - One-click Remote Universal Root Formed with Two Vulnerabilities - 2021.mp4
|
2021-12-06 14:45 |
102.9 MB |
| Uncommon Sense - Detecting Exploits with Novel Hardware Performance Counters and ML Magic - 2021.description
|
2022-04-21 16:57 |
772 B |
| Uncommon Sense - Detecting Exploits with Novel Hardware Performance Counters and ML Magic - 2021.info.json
|
2022-04-21 16:57 |
629.3 KB |
| Uncommon Sense - Detecting Exploits with Novel Hardware Performance Counters and ML Magic - 2021.mp4
|
2021-01-19 23:31 |
132.6 MB |
| Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity - 2021.description
|
2022-04-21 14:20 |
600 B |
| Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity - 2021.info.json
|
2022-04-21 14:20 |
264.9 KB |
| Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity - 2021.mp4
|
2021-12-06 18:31 |
102.9 MB |
| Understanding and Addressing The True Risks Facing Connected Machinery _ Operational Technology - 2021.description
|
2022-04-21 14:34 |
39 B |
| Understanding and Addressing The True Risks Facing Connected Machinery _ Operational Technology - 2021.info.json
|
2022-04-21 14:34 |
264.0 KB |
| Understanding and Addressing The True Risks Facing Connected Machinery _ Operational Technology - 2021.mp4
|
2021-10-18 14:41 |
44.3 MB |
| Understanding the Threat Landscape With Juan Andres Guerrero-Saade of SentinelLabs - 2021.description
|
2022-04-21 15:18 |
192 B |
| Understanding the Threat Landscape With Juan Andres Guerrero-Saade of SentinelLabs - 2021.info.json
|
2022-04-21 15:18 |
263.9 KB |
| Understanding the Threat Landscape With Juan Andres Guerrero-Saade of SentinelLabs - 2021.mp4
|
2021-08-29 00:01 |
62.9 MB |
| Vibe Check - IDK About This…. Why Students May Shy Away From Cyber in a Surveillance State - 2021.description
|
2022-04-21 14:55 |
520 B |
| Vibe Check - IDK About This…. Why Students May Shy Away From Cyber in a Surveillance State - 2021.info.json
|
2022-04-21 14:55 |
265.1 KB |
| Vibe Check - IDK About This…. Why Students May Shy Away From Cyber in a Surveillance State - 2021.mp4
|
2021-09-01 13:18 |
123.8 MB |
| Virtually Private Networks - 2021.description
|
2022-04-21 16:50 |
597 B |
| Virtually Private Networks - 2021.info.json
|
2022-04-21 16:50 |
653.7 KB |
| Virtually Private Networks - 2021.mp4
|
2021-01-20 00:14 |
152.3 MB |
| Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities - 2021.description
|
2022-04-21 15:41 |
544 B |
| Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities - 2021.info.json
|
2022-04-21 15:41 |
265.0 KB |
| Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities - 2021.mp4
|
2021-05-14 03:13 |
216.9 MB |
| Web Cache Entanglement - Novel Pathways to Poisoning - 2021.description
|
2022-04-21 16:38 |
494 B |
| Web Cache Entanglement - Novel Pathways to Poisoning - 2021.info.json
|
2022-04-21 16:38 |
594.5 KB |
| Web Cache Entanglement - Novel Pathways to Poisoning - 2021.mp4
|
2021-01-20 16:26 |
79.2 MB |
| What the Log! So Many Events, so Little Time... - 2021.description
|
2022-04-21 15:45 |
385 B |
| What the Log! So Many Events, so Little Time... - 2021.info.json
|
2022-04-21 15:45 |
265.1 KB |
| What the Log! So Many Events, so Little Time... - 2021.mp4
|
2021-02-27 09:58 |
159.4 MB |
| When Lightning Strikes Thrice - Breaking Thunderbolt 3 Security - 2021.description
|
2022-04-21 16:51 |
1.1 KB |
| When Lightning Strikes Thrice - Breaking Thunderbolt 3 Security - 2021.info.json
|
2022-04-21 16:51 |
605.6 KB |
| When Lightning Strikes Thrice - Breaking Thunderbolt 3 Security - 2021.mp4
|
2021-01-20 02:18 |
198.5 MB |
| When TLS Hacks You - 2021.description
|
2022-04-21 16:38 |
683 B |
| When TLS Hacks You - 2021.info.json
|
2022-04-21 16:38 |
518.2 KB |
| When TLS Hacks You - 2021.mp4
|
2021-01-20 19:15 |
104.3 MB |
| Whispers Among the Stars - A Practical Look at Perpetrating Satellite Eavesdropping Attacks - 2021.description
|
2022-04-21 16:40 |
700 B |
| Whispers Among the Stars - A Practical Look at Perpetrating Satellite Eavesdropping Attacks - 2021.info.json
|
2022-04-21 16:40 |
578.3 KB |
| Whispers Among the Stars - A Practical Look at Perpetrating Satellite Eavesdropping Attacks - 2021.mp4
|
2021-01-20 19:52 |
122.9 MB |
| Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service - 2021.description
|
2022-04-21 14:05 |
522 B |
| Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service - 2021.info.json
|
2022-04-21 14:05 |
264.4 KB |
| Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service - 2021.mp4
|
2021-12-06 13:57 |
78.9 MB |
| Why Asset Management Matters for Cybersecurity - 2021.description
|
2022-04-21 14:31 |
41 B |
| Why Asset Management Matters for Cybersecurity - 2021.info.json
|
2022-04-21 14:31 |
263.7 KB |
| Why Asset Management Matters for Cybersecurity - 2021.mp4
|
2021-10-27 12:46 |
53.1 MB |
| Wi-Fi Brokering - 2021.description
|
2022-04-21 16:08 |
390 B |
| Wi-Fi Brokering - 2021.info.json
|
2022-04-21 16:08 |
540.6 KB |
| Wi-Fi Brokering - 2021.mp4
|
2021-02-26 20:12 |
91.7 MB |
| Wibbly Wobbly, Timey Wimey – What's Really Inside Apple's U1 Chip - 2021.description
|
2022-04-21 14:09 |
910 B |
| Wibbly Wobbly, Timey Wimey – What's Really Inside Apple's U1 Chip - 2021.info.json
|
2022-04-21 14:09 |
265.2 KB |
| Wibbly Wobbly, Timey Wimey – What's Really Inside Apple's U1 Chip - 2021.mp4
|
2021-12-06 18:31 |
89.0 MB |
| Wideshears - Investigating and Breaking Widevine on QTEE - 2021.description
|
2022-04-21 14:53 |
1.1 KB |
| Wideshears - Investigating and Breaking Widevine on QTEE - 2021.info.json
|
2022-04-21 14:53 |
265.1 KB |
| Wideshears - Investigating and Breaking Widevine on QTEE - 2021.mp4
|
2021-09-01 22:15 |
63.0 MB |
| WIFI-Important Remote Attack Surface - Threat is Expanding - 2021.description
|
2022-04-21 15:45 |
365 B |
| WIFI-Important Remote Attack Surface - Threat is Expanding - 2021.info.json
|
2022-04-21 15:45 |
264.4 KB |
| WIFI-Important Remote Attack Surface - Threat is Expanding - 2021.mp4
|
2021-09-02 07:09 |
63.4 MB |
| Win the 0-Day Racing Game Against Botnet in Public Cloud - 2021.description
|
2022-04-21 16:04 |
429 B |
| Win the 0-Day Racing Game Against Botnet in Public Cloud - 2021.info.json
|
2022-04-21 16:04 |
464.7 KB |
| Win the 0-Day Racing Game Against Botnet in Public Cloud - 2021.mp4
|
2021-02-26 22:21 |
55.0 MB |
| Windows Heap-backed Pool - The Good, the Bad, and the Encoded - 2021.description
|
2022-04-21 14:08 |
507 B |
| Windows Heap-backed Pool - The Good, the Bad, and the Encoded - 2021.info.json
|
2022-04-21 14:08 |
265.3 KB |
| Windows Heap-backed Pool - The Good, the Bad, and the Encoded - 2021.mp4
|
2021-12-06 16:54 |
124.6 MB |
| With Friends Like eBPF, Who Needs Enemies - 2021.description
|
2022-04-21 14:03 |
482 B |
| With Friends Like eBPF, Who Needs Enemies - 2021.info.json
|
2022-04-21 14:03 |
265.1 KB |
| With Friends Like eBPF, Who Needs Enemies - 2021.mp4
|
2021-12-06 14:58 |
106.6 MB |
| X-in-the-Middle - Attacking Fast Charging Piles and Electric Vehicles - 2021.description
|
2022-04-21 14:38 |
546 B |
| X-in-the-Middle - Attacking Fast Charging Piles and Electric Vehicles - 2021.info.json
|
2022-04-21 14:38 |
264.5 KB |
| X-in-the-Middle - Attacking Fast Charging Piles and Electric Vehicles - 2021.mp4
|
2021-09-01 16:12 |
63.2 MB |
| You have No Idea Who Sent that Email - 18 Attacks on Email Sender Authentication - 2021.description
|
2022-04-21 16:14 |
1.0 KB |
| You have No Idea Who Sent that Email - 18 Attacks on Email Sender Authentication - 2021.info.json
|
2022-04-21 16:14 |
267.3 KB |
| You have No Idea Who Sent that Email - 18 Attacks on Email Sender Authentication - 2021.mp4
|
2022-01-16 16:10 |
168.6 MB |
| Your Software IS_NOT Vulnerable - CSAF, VEX, and the Future of Advisories - 2021.description
|
2022-04-21 14:24 |
704 B |
| Your Software IS_NOT Vulnerable - CSAF, VEX, and the Future of Advisories - 2021.info.json
|
2022-04-21 14:24 |
264.6 KB |
| Your Software IS_NOT Vulnerable - CSAF, VEX, and the Future of Advisories - 2021.mp4
|
2021-12-06 14:30 |
64.0 MB |
| Zero - The Funniest Number in Cryptography - 2021.description
|
2022-04-21 14:10 |
718 B |
| Zero - The Funniest Number in Cryptography - 2021.info.json
|
2022-04-21 14:10 |
262.1 KB |
| Zero - The Funniest Number in Cryptography - 2021.mp4
|
2021-12-06 14:32 |
67.6 MB |
| ZombieLoad - Leaking Data on Intel CPUs - 2021.description
|
2022-04-21 16:00 |
505 B |
| ZombieLoad - Leaking Data on Intel CPUs - 2021.info.json
|
2022-04-21 16:00 |
342.1 KB |
| ZombieLoad - Leaking Data on Intel CPUs - 2021.mp4
|
2021-02-27 02:46 |
98.7 MB |