Все публикации

#Hacktivity2024 // The Dual-Edged Sword of AI

Hacktivity 2024 Aftermovie | IT Security Conference Highlights

#Hacktivity2023 // Can We Break the Fault Injection Mitigation Bob?

#Hacktivity2023 // API Security Assurance via E2E Testing

#Hacktivity2023 // Examining the Explanatory Factors of Malicious Hacking Behaviors

#Hacktivity2023 // AI Security

#Hacktivity2023 // Clashing EV Chargers in The Pentesting Arena

#Hacktivity2023 // Unraveling the Veins of Automotive Vulnerabilities

#Hacktivity2023 // It Was Harder to Sniff Bluetooth Through My Mask During the Pandemic…

#Hacktivity2023 // 7 Steps to Secure a SaaS Platform – the Worlds Biggest Companies Trust

#Hacktivity2023 // Roundtable Discussion about NIS2 Directive (in Hungarian)

#Hacktivity2023 // Pwning into Power System Center

#Hacktivity2023 // SIEM Slam: Tricking Modern SIEMs with Fake Logs and Confusing Blue Teams

#Hacktivity2023 // Supply Chain Attacks

#Hacktivity2023 // SOCKS Over RDP/Citrix (Pentesting Over Jump Boxes)

#Hacktivity2023 // Beyond Fun and Games: Understanding the Threat Landscape of Extended Reality

#Hacktivity2023 // The New SaaS Cyber Kill Chain

#Hacktivity2023 // How Attackers Find & Exploit Secrets in Source Code

#Hacktivity2023 // How to Hack and Defend (Your) Open Source?

#Hacktivity2023 // Formshaker

#Hacktivity2023 // That’s Just a Tool – Not Good Nor Bad. That Part is Up to YOU

#Hacktivity2023 // The Power of Coercion Techniques in Windows Environments

#Hacktivity2023 // Reality or Myth: Unhackable Application (Using Zero Trust)

#Hacktivity2023 // Carved in Stone: Malware [ab]use of the Bitcoin Blockchain