filmov
tv
Все публикации
0:38:40
#Hacktivity2024 // The Dual-Edged Sword of AI
0:02:03
Hacktivity 2024 Aftermovie | IT Security Conference Highlights
0:37:44
#Hacktivity2023 // Can We Break the Fault Injection Mitigation Bob?
0:41:24
#Hacktivity2023 // API Security Assurance via E2E Testing
0:18:19
#Hacktivity2023 // Examining the Explanatory Factors of Malicious Hacking Behaviors
0:40:46
#Hacktivity2023 // AI Security
0:25:17
#Hacktivity2023 // Clashing EV Chargers in The Pentesting Arena
0:18:42
#Hacktivity2023 // Unraveling the Veins of Automotive Vulnerabilities
0:42:56
#Hacktivity2023 // It Was Harder to Sniff Bluetooth Through My Mask During the Pandemic…
0:31:03
#Hacktivity2023 // 7 Steps to Secure a SaaS Platform – the Worlds Biggest Companies Trust
0:45:54
#Hacktivity2023 // Roundtable Discussion about NIS2 Directive (in Hungarian)
0:43:55
#Hacktivity2023 // Pwning into Power System Center
0:39:03
#Hacktivity2023 // SIEM Slam: Tricking Modern SIEMs with Fake Logs and Confusing Blue Teams
0:22:15
#Hacktivity2023 // Supply Chain Attacks
0:26:16
#Hacktivity2023 // SOCKS Over RDP/Citrix (Pentesting Over Jump Boxes)
0:21:31
#Hacktivity2023 // Beyond Fun and Games: Understanding the Threat Landscape of Extended Reality
0:40:37
#Hacktivity2023 // The New SaaS Cyber Kill Chain
0:43:48
#Hacktivity2023 // How Attackers Find & Exploit Secrets in Source Code
0:43:00
#Hacktivity2023 // How to Hack and Defend (Your) Open Source?
0:34:07
#Hacktivity2023 // Formshaker
0:34:11
#Hacktivity2023 // That’s Just a Tool – Not Good Nor Bad. That Part is Up to YOU
0:38:57
#Hacktivity2023 // The Power of Coercion Techniques in Windows Environments
0:14:30
#Hacktivity2023 // Reality or Myth: Unhackable Application (Using Zero Trust)
0:39:00
#Hacktivity2023 // Carved in Stone: Malware [ab]use of the Bitcoin Blockchain
Вперёд