Все публикации

The Black Hat Asia Network Operations Center (NOC) Report

SystemUI As EvilPiP: The Hijacking Attacks on Modern Mobile Devices

Magicdot: A Hacker's Magic Show of Disappearing Dots and Spaces

Operation PoisonedApple: Tracing Credit Card Information Theft to Payment Fraud

Confused Learning: Supply Chain Attacks through Machine Learning Models

The Black Hat Europe Network Operations Center (NOC) Report

Indirect Prompt Injection Into LLMs Using Images and Sounds

International Threat Actors are Targeting Children to Steal Money from Banks & Major Corporations

Endoscope: Unpacking Android Apps with VM-Based Obfuscation

Compromising LLMs: The Advent of AI Malware

All Cops Are Broadcasting: Breaking TETRA After Decades in the Shadows

Scammers Who Scam Scammers, Hackers Who Hack Hackers: Exploring a Sub-economy on Cybercrime Forums

Keynote - Cybersecurity: The Next Generation

Ret2page: The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache

Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security Chip

Attacks From a New Front Door in 4G & 5G Mobile Networks

Android Universal Root: Exploiting Mobile GPU / Command Queue Drivers

AAD Joined Machines - The New Lateral Movement

A Journey Into Fuzzing WebAssembly Virtual Machines

A New Trend for the Blue Team: Using a Symbolic Engine to Detect Evasive Forms of Malware/Ransomware

Trace Me if You Can: Bypassing Linux Syscall Tracing

Monitoring Surveillance Vendors: A Deep Dive into In-the-Wild Android Full Chains in 2021

Stalloris: RPKI Downgrade Attack

New Memory Forensics Techniques to Defeat Device Monitoring Malware