filmov
tv
Все публикации
0:38:56
Secret Web Hacking Knowledge: CTF Authors Hate These Simple Tricks - Philippe Dourassov
0:23:37
Abusing Misconfigured OIDC Authentication In Cloud Environments - Christophe Tafani-Dereeper
0:42:32
Beating The Sanitizer: Why You Should Add MXSS To Your Toolbox - Paul Gerste & Yaniv Nizry
0:50:34
FuzzyAI: Attacking LLMs With Coverage-Guided Fuzzing - Eran Shimony & Mark Cherp
0:43:26
Current Affairs: IoT Security 101 - Iana Peix
0:28:59
Smart Toy Vulnerabilities Can Put Your Child At Risk Of Abuse By Strangers - Nikolay Frolov
0:44:10
Hijacking The Java Virtual Machine And Bypassing Runtime Application Self-Protection - Mouad Kondah
0:51:31
Meet The Latest Innovations And Startups In Cybersecurity And How To Become A Cyber Entrepreneur?
0:53:14
Patch Different On *OS - John McIntosh
0:30:45
Your NVMe Had Been Syz'ed - Alon Zahavi
0:34:46
MFT: Malicious Fungible Tokens - Mauro Eldritch
0:52:24
Diving Into JumpServer: The Public Key Unlocking Your Whole Network - Oskar Zeino-Mahmalat
0:44:53
Living Off The Land And Attacking Operational Technology With Surgical Precision - Ric Derbyshire
0:54:46
Threats And Mitigations Landscape In The Age Of Generative AI - Andrei Kucharavy
0:47:56
Operation Triangulation: Attacks On IPhones/iPads - Marco Preuss
1:00:13
How (Not) To Implement Secure Digital Identity:A Study Of Poland's Digital ID System - Szymon Chadam
0:52:20
The Accessibility Abyss: Navigating Android Malware Waters - Axelle Apvrille
0:50:45
ADDS Persistance - Burn It, Burn It All - Charlie 'Shutdown' Bromberg & Volker
0:37:20
When Malware Becomes Creative: A Survey Of Android Detection Evasion Tactics - Dimitrios Valsamaras
0:50:09
Enhancing AWS Security: A Holistic Approach To Organization Management - Bogdan Nicorici
0:44:00
Uncommon Process Injection Pattern - Yoann Dequeker
0:50:44
Standing On The Shoulders Of Giant(Dog)s: A Kubernetes Attack Graph Model - Julien Terriac
0:54:40
Pentesting By The Numbers: What Data Analysis Tells About What We Do by Charl Van Der Walt
0:51:16
Go Security Pitfalls: 2 Lessons From The Battlefield At Grafana Labs by Jeremy Matos
Вперёд