filmov
tv
Все публикации
0:42:44
The Black Hat Asia Network Operations Center (NOC) Report
0:33:05
SystemUI As EvilPiP: The Hijacking Attacks on Modern Mobile Devices
0:36:59
Magicdot: A Hacker's Magic Show of Disappearing Dots and Spaces
0:25:18
Operation PoisonedApple: Tracing Credit Card Information Theft to Payment Fraud
0:40:34
Confused Learning: Supply Chain Attacks through Machine Learning Models
0:38:03
The Black Hat Europe Network Operations Center (NOC) Report
0:28:21
Indirect Prompt Injection Into LLMs Using Images and Sounds
0:42:06
International Threat Actors are Targeting Children to Steal Money from Banks & Major Corporations
0:29:15
Endoscope: Unpacking Android Apps with VM-Based Obfuscation
0:36:29
Compromising LLMs: The Advent of AI Malware
0:37:07
All Cops Are Broadcasting: Breaking TETRA After Decades in the Shadows
0:38:09
Scammers Who Scam Scammers, Hackers Who Hack Hackers: Exploring a Sub-economy on Cybercrime Forums
0:48:05
Keynote - Cybersecurity: The Next Generation
0:35:20
Ret2page: The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache
0:33:44
Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security Chip
0:40:13
Attacks From a New Front Door in 4G & 5G Mobile Networks
0:31:54
Android Universal Root: Exploiting Mobile GPU / Command Queue Drivers
0:36:29
AAD Joined Machines - The New Lateral Movement
0:38:03
A Journey Into Fuzzing WebAssembly Virtual Machines
0:38:03
A New Trend for the Blue Team: Using a Symbolic Engine to Detect Evasive Forms of Malware/Ransomware
0:38:28
Trace Me if You Can: Bypassing Linux Syscall Tracing
0:36:26
Monitoring Surveillance Vendors: A Deep Dive into In-the-Wild Android Full Chains in 2021
0:26:47
Stalloris: RPKI Downgrade Attack
0:33:31
New Memory Forensics Techniques to Defeat Device Monitoring Malware
Вперёд