Все публикации

Adversaries Are Doing Stranger Things

The Always-On Purple Team: An Automated CI/CD for Detection Engineering

Mastering Adversary Emulation with Caldera: A Practical Guide

The Second Rule of Hacking: There Are No Rules

From Pentest to Red Team: Overview of The Necessary Skills and Breakdown of Frameworks

OT Pen-testing: How Not to Sink an Oil Rig

Fortifying Resilience: An In-Depth Exploration of the Overall Product Security Assessment Poster

SANS Pen Test 2024: A Sneak Peek Into All That's in Store!

Learn About SEC565: Red Team Operations and Adversary Emulation

A Compendium of Exploits and Bypasses for eBPF-based Cloud Security

Proxyjacking: The Latest Cybercriminal Side Hustle

A Series of Unfortunate Events: A Tail of Hacking Organizations Through Bug Bounties

Just Pocket Change? Examining the Cost of “Nickel and Dime” Exploit Mitigations

The Latest Exploit (BLASTPASS) in the Ongoing NSOZero-Click/Zero-Day Exploitation Campaign

A Hole in the Bucket: The Risk of Public Access toCloud Native Storage

A Practical Approach to Smart Fuzzing:Discovering 8 Zero-Days in a Week

Seek Out New Protocols, and Boldly Hack Undetected

Modern Adversarial Reconnaissance – Long Live the External

Enhancing Red Teaming with AI and ML

Keynote | Hacking the Cloud Like an APT

Unlocking Secrets: An Exploration of PulseView &Side-Channel Timing Attacks

The Invisible Threat: AI-Powered Vishing Attacks and Defense Strategies

Ab)using the Microsoft Identity Platform: ExploringAzure AD Token Caching

That Shouldn’t Have Worked