Все публикации

CactusCon 12 Closing Remarks

CC12 - The Best Free Resources to Get Started in Incident Response

CC12 - The Registry Hives you may be MSIX-ing

CC12 - Simple Ways to Make Webhook Security Better

CC12 - SBOMs for Evil: Turning Un-Remediated Software Supply Chain Documentation into an Attack Path

CC12 - A cactus coup at the goldrush saloon: swindling machine learning caches via wagon train

CC12 - Opening the DarkGate: Exploring the Destructive Potential of AutoIT and Possible Mitigations

CC12 - From Cyber Lemons to Lemonade: A Refreshing Take on Exposed Data

CC12 - Unlocking RFID Security: A Deep Dive into Flipper Zero and the Vulnerabilities of Multiclass

CC12 - Every Contact Leaves a Trace

CC12 - Worst of Cybersecurity Reporting 2023

CC12 Keynote - Naomi Brockwell: Building a More Private Future

CC12 - Track 2, Saturday 2/17/24 B

CC12 - Track 1, Saturday 2/17/24 B

CC12 - Veilid, the future of privacy- aka- how to destroy capitalism with the Cult of the Dead Cow

CC12 - IAES: Guarding the University of Arizona's Heartbeat – The Watchful Eye on Critical

CC12 - DON’T PANIC!: An IR Guide to Communicating with Execs

CC12 - Exploring RMM Tools and Their Forensics

CC12 - Validating Identity in a World of Deepfakes

CC12 - Track 3, Saturday 2/17/24

CC12 - Cyber Espionage and the Global Power Struggle: A Deep Dive

CC12 - Clearing the Fog: Detection and Defense against Cloud Persistence Techniques

CactusCon 12 - Track 1- Friday PART B

CC12 - Leaving Doors Unlocked With Cognito