Parent directory/ | - | - |
0-days - u0026 Mitigations Roadways to Exploit and Secure Connected BMW Cars.mp4 | 36.2 MiB | 2021 Mar 30 11:27 |
A Compendium of Container Escapes.en.transcribed.srt | 89.7 KiB | 2019 Dec 17 15:41 |
A Compendium of Container Escapes.mp4 | 37.4 MiB | 2021 Mar 30 11:32 |
A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works.en.transcribed.srt | 39.6 KiB | 2019 Dec 17 15:42 |
A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works.mp4 | 17.7 MiB | 2021 Mar 30 11:34 |
API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.en.transcribed.srt | 66.2 KiB | 2019 Dec 17 15:41 |
API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.mp4 | 21.7 MiB | 2021 Mar 30 11:53 |
Adventures in the Underland The CQForensic Toolkit as a Unique Weapon Against Hackers.en.transcribed.srt | 97.2 KiB | 2019 Dec 17 15:41 |
Adventures in the Underland The CQForensic Toolkit as a Unique Weapon Against Hackers.mp4 | 48.1 MiB | 2021 Mar 30 11:40 |
All Your Apple are Belong to Us Unique Identification and Cross-Device Tracking of Apple Devices.en.transcribed.srt | 49.3 KiB | 2019 Dec 17 15:41 |
All Your Apple are Belong to Us Unique Identification and Cross-Device Tracking of Apple Devices.mp4 | 43.4 MiB | 2021 Mar 30 11:49 |
All the 4G Modules Could be Hacked.en.transcribed.srt | 62.0 KiB | 2019 Dec 17 15:41 |
All the 4G Modules Could be Hacked.mp4 | 47.9 MiB | 2021 Mar 30 11:45 |
Arm IDA and Cross Check Reversing the Boeing 787's Core Network.en.transcribed.srt | 65.6 KiB | 2019 Dec 17 15:41 |
Arm IDA and Cross Check Reversing the Boeing 787's Core Network.mp4 | 40.8 MiB | 2021 Mar 30 11:58 |
Attacking Electric Motors for Fun and Profit.en.transcribed.srt | 85.9 KiB | 2019 Dec 17 15:41 |
Attacking Electric Motors for Fun and Profit.mp4 | 32.5 MiB | 2021 Mar 30 12:08 |
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD).en.transcribed.srt | 110.5 KiB | 2019 Dec 17 16:55 |
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD).mp4 | 58.3 MiB | 2021 Mar 30 12:03 |
Attacking iPhone XS Max.en.transcribed.srt | 46.1 KiB | 2019 Dec 17 15:41 |
Attacking iPhone XS Max.mp4 | 31.6 MiB | 2021 Mar 30 12:12 |
Automation Techniques in C Reverse Engineering.en.transcribed.srt | 79.5 KiB | 2019 Dec 17 15:41 |
Automation Techniques in C Reverse Engineering.mp4 | 34.2 MiB | 2021 Mar 30 12:17 |
Battle of Windows Service A Silver Bullet to Discover File Privilege Escalation Bugs Automatically.en.transcribed.srt | 25.5 KiB | 2019 Dec 17 15:42 |
Battle of Windows Service A Silver Bullet to Discover File Privilege Escalation Bugs Automatically.mp4 | 22.0 MiB | 2021 Mar 30 12:19 |
Behind the Scenes The Industry of Social Media Manipulation Driven by Malware.en.transcribed.srt | 92.5 KiB | 2019 Dec 17 16:28 |
Behind the Scenes The Industry of Social Media Manipulation Driven by Malware.mp4 | 40.0 MiB | 2021 Mar 30 12:29 |
Behind the scenes of iOS and Mac Security.en.transcribed.srt | 79.2 KiB | 2019 Dec 17 15:41 |
Behind the scenes of iOS and Mac Security.mp4 | 21.7 MiB | 2021 Mar 30 12:24 |
Biometric Authentication Under Threat Liveness Detection Hacking.en.transcribed.srt | 30.0 KiB | 2019 Dec 17 15:42 |
Biometric Authentication Under Threat Liveness Detection Hacking.mp4 | 22.8 MiB | 2021 Mar 30 12:31 |
Black Hat USA 2019 Keynote Every Security Team is a Software Team Now by Dino Dai Zovi.mp4 | 204.4 MiB | 2021 Mar 30 12:45 |
Bounty Operations Best Practices and Common Pitfalls to Avoid in the First 6-12 Months.en.transcribed.srt | 91.9 KiB | 2019 Dec 17 15:41 |
Bounty Operations Best Practices and Common Pitfalls to Avoid in the First 6-12 Months.mp4 | 60.5 MiB | 2021 Mar 30 12:50 |
Breaking Encrypted Databases Generic Attacks on Range Queries.en.transcribed.srt | 77.9 KiB | 2019 Dec 17 15:41 |
Breaking Encrypted Databases Generic Attacks on Range Queries.mp4 | 30.1 MiB | 2021 Mar 30 12:55 |
Breaking Samsung's ARM TrustZone.en.transcribed.srt | 71.2 KiB | 2019 Dec 17 15:41 |
Breaking Samsung's ARM TrustZone.mp4 | 29.2 MiB | 2021 Mar 30 12:59 |
Breaking Through Another Side Bypassing Firmware Security Boundaries from Embedded Controller.en.transcribed.srt | 79.6 KiB | 2019 Dec 17 15:41 |
Breaking Through Another Side Bypassing Firmware Security Boundaries from Embedded Controller.mp4 | 52.6 MiB | 2021 Mar 30 13:04 |
Bypassing the Maginot Line Remotely Exploit the Hardware Decoder on Smartphone.mp4 | 18.7 MiB | 2021 Mar 30 13:07 |
Chip.Fail - Glitching the Silicon of the Connected World.en.transcribed.srt | 84.0 KiB | 2019 Dec 17 15:41 |
Chip.Fail - Glitching the Silicon of the Connected World.mp4 | 50.2 MiB | 2021 Mar 30 13:12 |
ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended.en.transcribed.srt | 53.6 KiB | 2019 Dec 17 15:41 |
ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended.mp4 | 27.5 MiB | 2021 Mar 30 13:14 |
Come Join the CAFSA - Continuous Automated Firmware Security Analysis.en.transcribed.srt | 79.5 KiB | 2019 Dec 17 15:41 |
Come Join the CAFSA - Continuous Automated Firmware Security Analysis.mp4 | 39.9 MiB | 2021 Mar 30 13:19 |
Command Injection in F5 iRules.en.transcribed.srt | 90.2 KiB | 2019 Dec 17 15:42 |
Command Injection in F5 iRules.mp4 | 37.4 MiB | 2021 Mar 30 13:24 |
Controlled Chaos The Inevitable Marriage of DevOps & Security.en.transcribed.srt | 100.4 KiB | 2019 Dec 17 15:41 |
Controlled Chaos The Inevitable Marriage of DevOps & Security.mp4 | 60.9 MiB | 2021 Mar 30 13:30 |
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS.en.transcribed.srt | 81.4 KiB | 2019 Dec 17 15:41 |
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS.mp4 | 35.1 MiB | 2021 Mar 30 13:34 |
Cyber Insurance 101 for CISO's.en.transcribed.srt | 73.6 KiB | 2019 Dec 17 15:41 |
Cyber Insurance 101 for CISO's.mp4 | 46.0 MiB | 2021 Mar 30 13:39 |
Cybersecurity Risk Assessment for Safety-Critical Systems.en.transcribed.srt | 39.1 KiB | 2019 Dec 17 15:41 |
Cybersecurity Risk Assessment for Safety-Critical Systems.mp4 | 25.4 MiB | 2021 Mar 30 13:41 |
Death to the IOC What's Next in Threat Intelligence.en.transcribed.srt | 47.0 KiB | 2019 Dec 17 15:41 |
Death to the IOC What's Next in Threat Intelligence.mp4 | 21.9 MiB | 2021 Mar 30 13:44 |
Debug for Bug Crack and Hack Apple Core by Itself.en.transcribed.srt | 51.4 KiB | 2019 Dec 17 15:41 |
Debug for Bug Crack and Hack Apple Core by Itself.mp4 | 33.5 MiB | 2021 Mar 30 13:49 |
Defense Against Rapidly Morphing DDOS.en.transcribed.srt | 57.9 KiB | 2019 Dec 17 15:41 |
Defense Against Rapidly Morphing DDOS.mp4 | 39.3 MiB | 2021 Mar 30 13:52 |
Denial of Service with a Fistful of Packets Exploiting Algorithmic Complexity Vulnerabilities.en.transcribed.srt | 84.8 KiB | 2019 Dec 17 15:42 |
Denial of Service with a Fistful of Packets Exploiting Algorithmic Complexity Vulnerabilities.mp4 | 41.0 MiB | 2021 Mar 30 13:57 |
Detecting Deep Fakes with Mice.en.transcribed.srt | 47.8 KiB | 2019 Dec 17 15:42 |
Detecting Deep Fakes with Mice.mp4 | 30.6 MiB | 2021 Mar 30 14:00 |
Detecting Malicious Files with YARA Rules as They Traverse the Network.en.transcribed.srt | 29.0 KiB | 2019 Dec 17 15:41 |
Detecting Malicious Files with YARA Rules as They Traverse the Network.mp4 | 17.6 MiB | 2021 Mar 30 14:02 |
DevSecOps - What, Why and How.mp4 | 74.3 MiB | 2021 Mar 30 14:08 |
Dragonblood Attacking the Dragonfly Handshake of WPA3.en.transcribed.srt | 72.6 KiB | 2019 Dec 17 15:41 |
Dragonblood Attacking the Dragonfly Handshake of WPA3.mp4 | 21.8 MiB | 2021 Mar 30 14:13 |
Everybody be Cool, This is a Robbery.en.transcribed.srt | 63.2 KiB | 2019 Dec 17 15:41 |
Everybody be Cool, This is a Robbery.mp4 | 34.1 MiB | 2021 Mar 30 14:18 |
Exploiting Qualcomm WLAN and Modem Over The Air.en.transcribed.srt | 55.7 KiB | 2019 Dec 17 15:41 |
Exploiting Qualcomm WLAN and Modem Over The Air.mp4 | 26.3 MiB | 2021 Mar 30 14:22 |
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine.en.transcribed.srt | 96.0 KiB | 2019 Dec 17 15:41 |
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine.mp4 | 33.3 MiB | 2021 Mar 30 14:27 |
Exploring the New World - Remote Exploitation of SQLite and Curl.en.transcribed.srt | 68.7 KiB | 2019 Dec 17 15:41 |
Exploring the New World - Remote Exploitation of SQLite and Curl.mp4 | 32.7 MiB | 2021 Mar 30 14:32 |
Fantastic Red-Team Attacks and How to Find Them.en.transcribed.srt | 86.5 KiB | 2019 Dec 17 15:41 |
Fantastic Red-Team Attacks and How to Find Them.mp4 | 26.9 MiB | 2021 Mar 30 14:37 |
Finding Our Path How We're Trying to Improve Active Directory Security.en.transcribed.srt | 78.1 KiB | 2019 Dec 17 15:41 |
Finding Our Path How We're Trying to Improve Active Directory Security.mp4 | 54.4 MiB | 2021 Mar 30 14:46 |
Finding a Needle in an Encrypted Haystack.en.transcribed.srt | 82.1 KiB | 2019 Dec 17 15:41 |
Finding a Needle in an Encrypted Haystack.mp4 | 51.4 MiB | 2021 Mar 30 14:41 |
Firmware Cartography Charting the Course for Modern Server Compromise.en.transcribed.srt | 94.1 KiB | 2019 Dec 17 15:41 |
Firmware Cartography Charting the Course for Modern Server Compromise.mp4 | 42.8 MiB | 2021 Mar 30 14:51 |
Flying a False Flag Advanced C2, Trust Conflicts, and Domain Takeover.en.transcribed.srt | 96.0 KiB | 2019 Dec 17 15:42 |
Flying a False Flag Advanced C2, Trust Conflicts, and Domain Takeover.mp4 | 32.7 MiB | 2021 Mar 30 14:56 |
GDPArrrrr Using Privacy Laws to Steal Identities.en.transcribed.srt | 49.2 KiB | 2019 Dec 17 15:42 |
GDPArrrrr Using Privacy Laws to Steal Identities.mp4 | 25.0 MiB | 2021 Mar 30 14:58 |
Ghidra - Journey from Classified NSA Tool to Open Source.en.transcribed.srt | 95.5 KiB | 2019 Dec 17 15:41 |
Ghidra - Journey from Classified NSA Tool to Open Source.mp4 | 41.2 MiB | 2021 Mar 30 15:03 |
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing.en.transcribed.srt | 47.6 KiB | 2019 Dec 17 15:41 |
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing.mp4 | 17.3 MiB | 2021 Mar 30 15:06 |
HTTP Desync Attacks Smashing into the Cell Next Door.en.transcribed.srt | 86.9 KiB | 2019 Dec 17 15:41 |
HTTP Desync Attacks Smashing into the Cell Next Door.mp4 | 34.8 MiB | 2021 Mar 30 15:42 |
Hacking Ten Million Useful Idiots Online Propaganda as a Socio-Technical Security Project.en.transcribed.srt | 97.4 KiB | 2019 Dec 17 15:41 |
Hacking Ten Million Useful Idiots Online Propaganda as a Socio-Technical Security Project.mp4 | 51.1 MiB | 2021 Mar 30 15:11 |
Hacking Your Non-Compete.en.transcribed.srt | 89.2 KiB | 2019 Dec 17 15:41 |
Hacking Your Non-Compete.mp4 | 40.2 MiB | 2021 Mar 30 15:16 |
He Said, She Said - Poisoned RDP Offense and Defense.en.transcribed.srt | 81.2 KiB | 2019 Dec 17 15:41 |
He Said, She Said - Poisoned RDP Offense and Defense.mp4 | 39.1 MiB | 2021 Mar 30 15:21 |
HostSplit Exploitable Antipatterns in Unicode Normalization.en.transcribed.srt | 82.4 KiB | 2019 Dec 17 15:41 |
HostSplit Exploitable Antipatterns in Unicode Normalization.mp4 | 27.8 MiB | 2021 Mar 30 15:26 |
How Do Cyber Insurers View The World.en.transcribed.srt | 107.5 KiB | 2019 Dec 17 15:41 |
How Do Cyber Insurers View The World.mp4 | 73.2 MiB | 2021 Mar 30 15:32 |
How to Detect that Your Domains are Being Abused for Phishing by Using DNS.mp4 | 60.4 MiB | 2021 Mar 30 15:36 |
Hunting for Bugs, Catching Dragons.en.transcribed.srt | 67.4 KiB | 2019 Dec 17 15:41 |
Hunting for Bugs, Catching Dragons.mp4 | 28.3 MiB | 2021 Mar 30 15:46 |
I'm Unique, Just Like You Human Side-Channels and Their Implications for Security and Privacy.en.transcribed.srt | 100.6 KiB | 2019 Dec 17 15:41 |
I'm Unique, Just Like You Human Side-Channels and Their Implications for Security and Privacy.mp4 | 42.8 MiB | 2021 Mar 30 15:51 |
Infighting Among Russian Security Services in the Cyber Sphere.en.transcribed.srt | 100.6 KiB | 2019 Dec 17 15:41 |
Infighting Among Russian Security Services in the Cyber Sphere.mp4 | 46.5 MiB | 2021 Mar 30 15:56 |
Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs.en.transcribed.srt | 59.0 KiB | 2019 Dec 17 15:42 |
Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs.mp4 | 33.3 MiB | 2021 Mar 30 16:01 |
Inside the Apple T2.en.transcribed.srt | 80.8 KiB | 2019 Dec 17 15:41 |
Inside the Apple T2.mp4 | 30.1 MiB | 2021 Mar 30 16:06 |
Integration of Cyber Insurance Into A Risk Management Program.en.transcribed.srt | 112.5 KiB | 2019 Dec 17 15:41 |
Integration of Cyber Insurance Into A Risk Management Program.mp4 | 57.9 MiB | 2021 Mar 30 16:11 |
Internet-Scale Analysis of AWS Cognito Security.en.transcribed.srt | 53.4 KiB | 2019 Dec 17 15:41 |
Internet-Scale Analysis of AWS Cognito Security.mp4 | 31.8 MiB | 2021 Mar 30 16:16 |
Legal GNSS Spoofing and its Effects on Autonomous Vehicles.en.transcribed.srt | 47.7 KiB | 2019 Dec 17 15:42 |
Legal GNSS Spoofing and its Effects on Autonomous Vehicles.mp4 | 27.0 MiB | 2021 Mar 30 16:19 |
Lessons From Two Years of Crypto Audits.en.transcribed.srt | 86.0 KiB | 2019 Dec 17 15:41 |
Lessons From Two Years of Crypto Audits.mp4 | 25.9 MiB | 2021 Mar 30 16:29 |
Lessons and Lulz The 5th Annual Black Hat USA NOC Report.en.transcribed.srt | 92.4 KiB | 2019 Dec 17 15:41 |
Lessons and Lulz The 5th Annual Black Hat USA NOC Report.mp4 | 45.9 MiB | 2021 Mar 30 16:24 |
Look, No Hands - The Remote, Interaction-less Attack Surface of the iPhone.en.transcribed.srt | 70.1 KiB | 2019 Dec 17 16:21 |
Look, No Hands - The Remote, Interaction-less Attack Surface of the iPhone.mp4 | 36.5 MiB | 2021 Mar 30 16:33 |
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection.en.transcribed.srt | 48.1 KiB | 2019 Dec 17 15:41 |
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection.mp4 | 25.7 MiB | 2021 Mar 30 16:51 |
MITRE ATT&CK The Play at Home Edition.en.transcribed.srt | 99.2 KiB | 2019 Dec 17 15:41 |
MITRE ATT&CK The Play at Home Edition.mp4 | 59.7 MiB | 2021 Mar 30 16:56 |
Making Big Things Better The Dead Cow Way.en.transcribed.srt | 102.5 KiB | 2019 Dec 17 15:41 |
Making Big Things Better The Dead Cow Way.mp4 | 79.8 MiB | 2021 Mar 30 16:39 |
Managing for Success Maintaining a Healthy Bug Bounty Program Long Term.en.transcribed.srt | 60.3 KiB | 2019 Dec 17 15:41 |
Managing for Success Maintaining a Healthy Bug Bounty Program Long Term.mp4 | 26.5 MiB | 2021 Mar 30 16:43 |
Messaging Layer Security Towards a New Era of Secure Group Messaging.en.transcribed.srt | 80.7 KiB | 2019 Dec 17 16:57 |
Messaging Layer Security Towards a New Era of Secure Group Messaging.mp4 | 26.4 MiB | 2021 Mar 30 16:48 |
Mobile Interconnect Threats How Next-Gen Products May be Already Outdated.en.transcribed.srt | 44.8 KiB | 2019 Dec 17 15:41 |
Mobile Interconnect Threats How Next-Gen Products May be Already Outdated.mp4 | 20.7 MiB | 2021 Mar 30 16:58 |
Monsters in the Middleboxes Building Tools for Detecting HTTPS Interception.en.transcribed.srt | 49.1 KiB | 2019 Dec 17 15:41 |
Monsters in the Middleboxes Building Tools for Detecting HTTPS Interception.mp4 | 22.5 MiB | 2021 Mar 30 17:01 |
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites.en.transcribed.srt | 86.2 KiB | 2019 Dec 17 15:41 |
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites.mp4 | 38.1 MiB | 2021 Mar 30 17:06 |
New Vulnerabilities in 5G Networks.en.transcribed.srt | 79.7 KiB | 2019 Dec 17 15:41 |
New Vulnerabilities in 5G Networks.mp4 | 46.4 MiB | 2021 Mar 30 17:11 |
On Trust Stories from the Front Lines.en.transcribed.srt | 40.9 KiB | 2019 Dec 17 15:41 |
On Trust Stories from the Front Lines.mp4 | 26.7 MiB | 2021 Mar 30 17:13 |
Operational Templates for State-Level Attack and Collective Defense of Countries.en.transcribed.srt | 84.7 KiB | 2019 Dec 17 15:41 |
Operational Templates for State-Level Attack and Collective Defense of Countries.mp4 | 42.0 MiB | 2021 Mar 30 17:18 |
Paging All Windows Geeks - Finding Evil in Windows 10 Compressed Memory.mp4 | 46.3 MiB | 2021 Mar 30 17:23 |
PeriScope An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.en.transcribed.srt | 41.1 KiB | 2019 Dec 17 15:41 |
PeriScope An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.mp4 | 28.0 MiB | 2021 Mar 30 17:26 |
PicoDMA DMA Attacks at Your Fingertips.en.transcribed.srt | 90.5 KiB | 2019 Dec 17 15:41 |
PicoDMA DMA Attacks at Your Fingertips.mp4 | 32.9 MiB | 2021 Mar 30 17:31 |
Playing Offense and Defense with Deepfakes.en.transcribed.srt | 106.4 KiB | 2019 Dec 17 15:41 |
Playing Offense and Defense with Deepfakes.mp4 | 43.2 MiB | 2021 Mar 30 17:36 |
Preventing Authentication Bypass A Tale of Two Researchers.en.transcribed.srt | 53.3 KiB | 2019 Dec 17 15:41 |
Preventing Authentication Bypass A Tale of Two Researchers.mp4 | 23.3 MiB | 2021 Mar 30 17:40 |
Process Injection Techniques - Gotta Catch Them All.en.transcribed.srt | 76.0 KiB | 2019 Dec 17 15:41 |
Process Injection Techniques - Gotta Catch Them All.mp4 | 36.2 MiB | 2021 Mar 30 17:45 |
Project Zero Five Years of 'Make 0Day Hard'.en.transcribed.srt | 98.4 KiB | 2019 Dec 17 15:41 |
Project Zero Five Years of 'Make 0Day Hard'.mp4 | 33.7 MiB | 2021 Mar 30 17:51 |
Responding to a Cyber Attack with Missiles.en.transcribed.srt | 75.4 KiB | 2019 Dec 17 16:20 |
Responding to a Cyber Attack with Missiles.mp4 | 48.1 MiB | 2021 Mar 30 17:56 |
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More.en.transcribed.srt | 32.7 KiB | 2019 Dec 17 15:41 |
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More.mp4 | 27.0 MiB | 2021 Mar 30 17:58 |
Rogue7 Rogue Engineering-Station Attacks on S7 Simatic PLCs.en.transcribed.srt | 57.1 KiB | 2019 Dec 17 15:42 |
Rogue7 Rogue Engineering-Station Attacks on S7 Simatic PLCs.mp4 | 41.5 MiB | 2021 Mar 30 18:03 |
Rough and Ready Frameworks to Measure Persistent Engagement and Deterrence.en.transcribed.srt | 96.2 KiB | 2019 Dec 17 15:41 |
Rough and Ready Frameworks to Measure Persistent Engagement and Deterrence.mp4 | 34.9 MiB | 2021 Mar 30 18:08 |
SSO Wars The Token Menace.en.transcribed.srt | 38.5 KiB | 2019 Dec 17 15:42 |
SSO Wars The Token Menace.mp4 | 27.4 MiB | 2021 Mar 30 18:35 |
Securing Apps in the Open-By-Default Cloud.en.transcribed.srt | 77.5 KiB | 2019 Dec 17 15:41 |
Securing Apps in the Open-By-Default Cloud.mp4 | 29.2 MiB | 2021 Mar 30 18:12 |
Securing the System A Deep Dive into Reversing Android Pre-Installed Apps.en.transcribed.srt | 83.5 KiB | 2019 Dec 17 15:41 |
Securing the System A Deep Dive into Reversing Android Pre-Installed Apps.mp4 | 42.7 MiB | 2021 Mar 30 18:17 |
Selling 0-Days to Governments and Offensive Security Companies.en.transcribed.srt | 84.1 KiB | 2019 Dec 17 16:55 |
Selling 0-Days to Governments and Offensive Security Companies.mp4 | 38.4 MiB | 2021 Mar 30 18:22 |
Sensor and Process Fingerprinting in Industrial Control Systems.en.transcribed.srt | 86.4 KiB | 2019 Dec 17 15:41 |
Sensor and Process Fingerprinting in Industrial Control Systems.mp4 | 46.5 MiB | 2021 Mar 30 18:28 |
Shifting Knowledge Left Keeping up with Modern Application Security.en.transcribed.srt | 102.3 KiB | 2019 Dec 17 15:41 |
Shifting Knowledge Left Keeping up with Modern Application Security.mp4 | 36.0 MiB | 2021 Mar 30 18:33 |
Testing Your Organization's Social Media Awareness.en.transcribed.srt | 44.9 KiB | 2019 Dec 17 15:41 |
Testing Your Organization's Social Media Awareness.mp4 | 17.6 MiB | 2021 Mar 30 18:38 |
The Discovery of a Government Malware and an Unexpected Spy Scandal.en.transcribed.srt | 72.7 KiB | 2019 Dec 17 15:41 |
The Discovery of a Government Malware and an Unexpected Spy Scandal.mp4 | 37.3 MiB | 2021 Mar 30 18:43 |
The Enemy Within Modern Supply Chain Attacks.en.transcribed.srt | 91.7 KiB | 2019 Dec 17 15:41 |
The Enemy Within Modern Supply Chain Attacks.mp4 | 43.1 MiB | 2021 Mar 30 18:48 |
The Future of ATO.en.transcribed.srt | 100.1 KiB | 2019 Dec 17 15:41 |
The Future of ATO.mp4 | 32.8 MiB | 2021 Mar 30 18:53 |
The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring.en.transcribed.srt | 38.9 KiB | 2019 Dec 17 15:41 |
The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring.mp4 | 26.6 MiB | 2021 Mar 30 18:56 |
The Most Secure Browser Pwning Chrome from 2016 to 2019.en.transcribed.srt | 66.6 KiB | 2019 Dec 17 16:25 |
The Most Secure Browser Pwning Chrome from 2016 to 2019.mp4 | 27.6 MiB | 2021 Mar 30 19:00 |
The Path Less Traveled Abusing Kubernetes Defaults.en.transcribed.srt | 100.7 KiB | 2019 Dec 17 15:41 |
The Path Less Traveled Abusing Kubernetes Defaults.mp4 | 42.7 MiB | 2021 Mar 30 19:05 |
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime.en.transcribed.srt | 46.8 KiB | 2019 Dec 17 15:41 |
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime.mp4 | 22.5 MiB | 2021 Mar 30 19:09 |
Transparency in the Software Supply Chain Making SBOM a Reality.en.transcribed.srt | 54.7 KiB | 2019 Dec 17 15:41 |
Transparency in the Software Supply Chain Making SBOM a Reality.mp4 | 25.3 MiB | 2021 Mar 30 19:12 |
WebAuthn 101 - Demystifying WebAuthn.en.transcribed.srt | 57.9 KiB | 2019 Dec 17 15:41 |
WebAuthn 101 - Demystifying WebAuthn.mp4 | 23.8 MiB | 2021 Mar 30 19:15 |
Woke Hiring Won't Save Us An Actionable Approach to Diversity Hiring and Retention.en.transcribed.srt | 43.9 KiB | 2019 Dec 17 15:42 |
Woke Hiring Won't Save Us An Actionable Approach to Diversity Hiring and Retention.mp4 | 28.1 MiB | 2021 Mar 30 19:17 |
Women in Security Building a Female InfoSec Community in Korea, Japan, and Taiwan.en.transcribed.srt | 54.8 KiB | 2019 Dec 17 15:41 |
Women in Security Building a Female InfoSec Community in Korea, Japan, and Taiwan.mp4 | 44.7 MiB | 2021 Mar 30 19:22 |
Worm Charming Harvesting Malware Lures for Fun and Profit.en.transcribed.srt | 98.6 KiB | 2019 Dec 17 15:41 |
Worm Charming Harvesting Malware Lures for Fun and Profit.mp4 | 37.8 MiB | 2021 Mar 30 19:26 |
Zombie Ant Farming Practical Tips for Playing Hide and Seek with Linux EDRs.en.transcribed.srt | 79.1 KiB | 2019 Dec 17 15:41 |
Zombie Ant Farming Practical Tips for Playing Hide and Seek with Linux EDRs.mp4 | 35.9 MiB | 2021 Mar 30 19:31 |