Parent directory/ | - | - |
Defeating a Secure Element with Multiple Laser Fault Injections.eng.srt | 28.0 KiB | 2022 Nov 19 05:23 |
Wibbly Wobbly, Timey Wimey - What's Really Inside Apple's U1 Chip.eng.srt | 30.5 KiB | 2022 Nov 19 05:55 |
ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication.eng.srt | 37.7 KiB | 2022 Nov 19 05:13 |
A Survivor-Centric, Trauma-Informed Approach to Stalkerware.eng.srt | 40.3 KiB | 2022 Nov 19 05:15 |
Hacking a Capsule Hotel - Ghost in the Bedrooms.eng.srt | 40.8 KiB | 2022 Nov 19 05:33 |
Zero - The Funniest Number in Cryptography.eng.srt | 40.9 KiB | 2022 Nov 19 05:59 |
Your Software IS NOT Vulnerable CSAF, VEX, and the Future of Advisories.eng.srt | 42.9 KiB | 2022 Nov 19 05:58 |
Demystify AI Security Products With a Universal Pluggable XAI Translator.eng.srt | 43.1 KiB | 2022 Nov 19 05:23 |
Mobius Band Explore Hyper-V Attack Interface through Vulnerabilities Internals.eng.srt | 44.6 KiB | 2022 Nov 19 05:39 |
Diving in to Spooler Discovering LPE and RCE Vulnerabilities in Windows Printer.eng.srt | 45.9 KiB | 2022 Nov 19 05:26 |
Qualcomm WiFi Infinity War.eng.srt | 46.4 KiB | 2022 Nov 19 05:43 |
Exploiting Windows COM WinRT ServicesExploiting Windows COM WinRT Services.eng.srt | 46.6 KiB | 2022 Nov 19 05:28 |
A Broken Chain Discovering OPC UA Attack Surface and Exploiting the Supply Chain.eng.srt | 48.7 KiB | 2022 Nov 19 05:10 |
Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service.eng.srt | 49.2 KiB | 2022 Nov 19 05:54 |
Hack Different Pwning iOS 14 with Generation Z Bug.eng.srt | 49.6 KiB | 2022 Nov 19 05:33 |
Fixing a Memory Forensics Blind Spot Linux Kernel Tracing.eng.srt | 50.7 KiB | 2022 Nov 19 05:28 |
Can You Hear Me Now Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications.eng.srt | 50.7 KiB | 2022 Nov 19 05:06 |
Put in One Bug and Pop Out More An Effective Way of Bug Hunting in Chrome.eng.srt | 52.1 KiB | 2022 Nov 19 05:42 |
Let's Attack Let's Encrypt.eng.srt | 53.0 KiB | 2022 Nov 19 05:38 |
Applying AI as a Service to Targeted Phishing & Defending Against AI Generated Attacks.eng.srt | 53.1 KiB | 2022 Nov 19 05:51 |
Bam the BAM - Electromagnetic Fault Injection & Automotive Systems.eng.srt | 53.3 KiB | 2022 Nov 19 05:15 |
Everything has Changed in iOS 14, but Jailbreak is Eternal.eng.srt | 53.4 KiB | 2022 Nov 19 05:28 |
Alcatraz A Practical Hypervisor Sandbox to Prevent Escapes from the KVM QEMU and KVM-Based MicroVMs.eng.srt | 53.7 KiB | 2022 Nov 19 05:11 |
Bridging Security Infrastructure Between the Data Center and AWS Lambda.eng.srt | 54.5 KiB | 2022 Nov 19 05:18 |
A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms.eng.srt | 55.1 KiB | 2022 Nov 19 05:12 |
Generating YARA Rules by Classifying Malicious Byte Sequences.eng.srt | 56.4 KiB | 2022 Nov 19 05:30 |
Bypassing Windows Hello for Business and Pleasure.eng.srt | 56.6 KiB | 2022 Nov 19 05:18 |
Internal Affairs Hacking File System Access from the Web.eng.srt | 57.1 KiB | 2022 Nov 19 05:37 |
Symbexcel Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros.eng.srt | 58.2 KiB | 2022 Nov 19 05:47 |
CnCHunter An MITM-Approach to Identify Live CnC Servers.eng.srt | 58.2 KiB | 2022 Nov 19 05:20 |
Breaking the Isolation Cross-Account AWS Vulnerabilities.eng.srt | 59.1 KiB | 2022 Nov 19 05:17 |
Keynote Secretary Alejandro Mayorkas.eng.srt | 59.5 KiB | 2022 Nov 19 05:59 |
The Dark Age of Memory Corruption Mitigations in the Spectre Era.eng.srt | 59.7 KiB | 2022 Nov 19 05:48 |
Anatomy of Native IIS Malware.eng.srt | 60.3 KiB | 2022 Nov 19 05:13 |
Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity.eng.srt | 60.5 KiB | 2022 Nov 19 05:46 |
Greybox Program Synthesis A New Approach to Attack Dataflow Obfuscation.eng.srt | 60.5 KiB | 2022 Nov 19 05:32 |
20 Ways to Bypass Your macOS Privacy Mechanisms.eng.srt | 60.7 KiB | 2022 Nov 19 05:08 |
HPE iLO5 Firmware Security - Go Home Cryptoprocessor, You're Drunk.eng.srt | 61.1 KiB | 2022 Nov 19 05:36 |
Action Bias and the Two Most Dangerous Words in Cybersecurity.eng.srt | 61.2 KiB | 2022 Nov 19 05:10 |
How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain.eng.srt | 61.7 KiB | 2022 Nov 19 05:06 |
ProxyLogon is Just the Tip of the Iceberg A New Attack Surface on Microsoft Exchange Server.eng.srt | 61.7 KiB | 2022 Nov 19 05:41 |
A Hole in the Tube Uncovering Vulnerabilities in Critical Infrastructure of Healthcare Facilities.eng.srt | 61.8 KiB | 2022 Nov 19 05:10 |
Rope Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution.eng.srt | 61.8 KiB | 2022 Nov 19 05:50 |
Timeless Timing Attacks.eng.srt | 62.4 KiB | 2022 Nov 19 05:50 |
Can You Roll Your Own SIEM.eng.srt | 62.8 KiB | 2022 Nov 19 05:18 |
Government-Mandated Front Doors A Global Assessment of Legalized Government Access to Data.eng.srt | 62.9 KiB | 2022 Nov 19 05:30 |
Typhoon Mangkhut One-click Remote Universal Root Formed with Two Vulnerabilities.eng.srt | 63.7 KiB | 2022 Nov 19 05:53 |
Another Road Leads to the Host From a Message to VM Escape on Nvidia vGPU.eng.srt | 64.4 KiB | 2022 Nov 19 05:14 |
FragAttacks Breaking Wi-Fi through Fragmentation and Aggregation.eng.srt | 64.5 KiB | 2022 Nov 19 05:29 |
Crashing Your Way to Medium-IL Exploiting the PDB Parser for Privilege Escalation.eng.srt | 64.6 KiB | 2022 Nov 19 05:20 |
Arm'd and Dangerous.eng.srt | 64.7 KiB | 2022 Nov 19 05:14 |
Smashing the ML Stack for Fun and Lawsuits.eng.srt | 64.9 KiB | 2022 Nov 19 05:46 |
Windows Heap-backed Pool The Good, the Bad, and the Encoded.eng.srt | 64.9 KiB | 2022 Nov 19 05:58 |
Legal Pitfalls to Avoid in Security Incidents.eng.srt | 65.9 KiB | 2022 Nov 19 05:38 |
ERROR BadAlloc - Broken Memory Allocators Led to Millions of Vulnerable IoT & Embedded Devices.eng.srt | 65.9 KiB | 2022 Nov 19 06:00 |
Deepfake Social Engineering Creating a Framework for Synthetic Media Social Engineering.eng.srt | 66.5 KiB | 2022 Nov 19 05:22 |
hAFL1 Our Journey of Fuzzing Hyper-V and Discovering a 0-Day.eng.srt | 66.5 KiB | 2022 Nov 19 05:33 |
The Mass Effect How Opportunistic Workers Drift into Cybercrime.eng.srt | 67.0 KiB | 2022 Nov 19 05:49 |
Disinformation At Scale Using GPT-3 Maliciously for Information Operations.eng.srt | 67.1 KiB | 2022 Nov 19 05:25 |
The Case for a National Cybersecurity Safety Board.eng.srt | 67.5 KiB | 2022 Nov 19 05:48 |
The Kitten that Charmed Me The 9 Lives of a Nation State Attacker.eng.srt | 67.7 KiB | 2022 Nov 19 05:06 |
President's Cup Cyber Competition Finding the Best Cyber Talent in the US Government.eng.srt | 68.6 KiB | 2022 Nov 19 05:41 |
MFA-ing the Un-MFA-ble Protecting Auth Systems' Core Secrets.eng.srt | 69.1 KiB | 2022 Nov 19 05:39 |
An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures.eng.srt | 69.4 KiB | 2022 Nov 19 05:49 |
Certified Pre-Owned Abusing Active Directory Certificate Services.eng.srt | 69.5 KiB | 2022 Nov 19 05:19 |
HTTP 2 The Sequel is Always Worse.eng.srt | 69.7 KiB | 2022 Nov 19 05:06 |
IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.eng.srt | 70.5 KiB | 2022 Nov 19 05:37 |
Safeguarding UEFI Ecosystem Firmware Supply Chain is Hard(coded).eng.srt | 70.8 KiB | 2022 Nov 19 05:51 |
The Ripple Effect Building a Diverse Security Research Team.eng.srt | 71.3 KiB | 2022 Nov 19 05:06 |
DBREACH Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics.eng.srt | 71.9 KiB | 2022 Nov 19 05:21 |
Sleight of ARM Demystifying Intel Houdini.eng.srt | 72.8 KiB | 2022 Nov 19 05:51 |
Security Analysis of CHERI ISASecurity Analysis of CHERI ISA.eng.srt | 72.9 KiB | 2022 Nov 19 05:43 |
Reverse Engineering the M1.eng.srt | 74.3 KiB | 2022 Nov 19 05:56 |
Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones.eng.srt | 77.0 KiB | 2022 Nov 19 05:34 |
Securing Open Source Software - End-to-end, At massive scale, Together.eng.srt | 78.6 KiB | 2022 Nov 19 05:43 |
The Devil is in the GAN Defending Deep Generative Models Against Adversarial Attacks.eng.srt | 80.2 KiB | 2022 Nov 19 05:06 |
With Friends Like eBPF, Who Needs Enemies.eng.srt | 80.2 KiB | 2022 Nov 19 05:57 |
Breaking Network Segregation Using Esoteric Command & Control Channels.eng.srt | 80.6 KiB | 2022 Nov 19 05:36 |
Come to the Dark Side, We Have Apples Turning macOS Management Evil.eng.srt | 81.9 KiB | 2022 Nov 19 05:20 |
Do You Speak My Language Make Static Analysis Engines Understand Each Other.eng.srt | 82.1 KiB | 2022 Nov 19 05:25 |
Breaking Secure Bootloaders.eng.srt | 84.0 KiB | 2022 Nov 19 05:16 |
Cloudy with a Chance of APT Novel Microsoft 365 Attacks in the Wild.eng.srt | 84.0 KiB | 2022 Nov 19 05:19 |
Back in Black Hat The 7th Annual Black Hat USA NOC Report.eng.srt | 84.4 KiB | 2022 Nov 19 05:06 |
5G IMSI Catchers Mirage5G IMSI Catchers Mirage.eng.srt | 88.2 KiB | 2022 Nov 19 05:09 |
Next-Gen DFIR Mass Exploits & Supplier Compromise.eng.srt | 91.0 KiB | 2022 Nov 19 05:40 |
Locknote Conclusions and Key Takeaways from Day 1.eng.srt | 91.5 KiB | 2022 Nov 19 05:06 |
Keynote Supply Chain Infections and the Future of Contactless Deliveries.eng.srt | 121.5 KiB | 2022 Nov 19 05:06 |
Keynote Hacking the Cybersecurity Puzzle.eng.srt | 130.9 KiB | 2022 Nov 19 05:06 |
Demystify AI Security Products With a Universal Pluggable XAI Translator.mp4 | 14.4 MiB | 2022 Nov 20 20:56 |
Your Software IS NOT Vulnerable CSAF, VEX, and the Future of Advisories.mp4 | 21.7 MiB | 2022 Nov 20 20:56 |
Diving in to Spooler Discovering LPE and RCE Vulnerabilities in Windows Printer.mp4 | 21.9 MiB | 2022 Nov 20 20:56 |
Internal Affairs Hacking File System Access from the Web.mp4 | 22.0 MiB | 2022 Nov 20 20:56 |
Can You Roll Your Own SIEM.mp4 | 22.2 MiB | 2022 Nov 20 20:56 |
A Survivor-Centric, Trauma-Informed Approach to Stalkerware.mp4 | 22.6 MiB | 2022 Nov 20 20:56 |
Fixing a Memory Forensics Blind Spot Linux Kernel Tracing.mp4 | 23.1 MiB | 2022 Nov 20 20:56 |
Can You Hear Me Now Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications.mp4 | 23.4 MiB | 2022 Nov 20 20:56 |
Zero - The Funniest Number in Cryptography.mp4 | 24.1 MiB | 2022 Nov 20 20:56 |
Hacking a Capsule Hotel - Ghost in the Bedrooms.mp4 | 24.9 MiB | 2022 Nov 20 20:56 |
Exploiting Windows COM WinRT ServicesExploiting Windows COM WinRT Services.mp4 | 26.2 MiB | 2022 Nov 20 20:56 |
Generating YARA Rules by Classifying Malicious Byte Sequences.mp4 | 26.8 MiB | 2022 Nov 20 20:56 |
Bridging Security Infrastructure Between the Data Center and AWS Lambda.mp4 | 26.9 MiB | 2022 Nov 20 20:56 |
Smashing the ML Stack for Fun and Lawsuits.mp4 | 27.1 MiB | 2022 Nov 20 20:56 |
Government-Mandated Front Doors A Global Assessment of Legalized Government Access to Data.mp4 | 27.2 MiB | 2022 Nov 20 20:56 |
Applying AI as a Service to Targeted Phishing & Defending Against AI Generated Attacks.mp4 | 27.2 MiB | 2022 Nov 20 20:56 |
hAFL1 Our Journey of Fuzzing Hyper-V and Discovering a 0-Day.mp4 | 27.4 MiB | 2022 Nov 20 20:56 |
A Broken Chain Discovering OPC UA Attack Surface and Exploiting the Supply Chain.mp4 | 27.5 MiB | 2022 Nov 20 20:56 |
Legal Pitfalls to Avoid in Security Incidents.mp4 | 28.0 MiB | 2022 Nov 20 20:56 |
Put in One Bug and Pop Out More An Effective Way of Bug Hunting in Chrome.mp4 | 29.3 MiB | 2022 Nov 20 20:56 |
Defeating a Secure Element with Multiple Laser Fault Injections.mp4 | 29.5 MiB | 2022 Nov 20 20:56 |
Let's Attack Let's Encrypt.mp4 | 29.5 MiB | 2022 Nov 20 20:56 |
DBREACH Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics.mp4 | 29.6 MiB | 2022 Nov 20 20:56 |
Wibbly Wobbly, Timey Wimey - What's Really Inside Apple's U1 Chip.mp4 | 29.7 MiB | 2022 Nov 20 20:56 |
Qualcomm WiFi Infinity War.mp4 | 30.8 MiB | 2022 Nov 20 20:56 |
Hack Different Pwning iOS 14 with Generation Z Bug.mp4 | 31.0 MiB | 2022 Nov 20 20:56 |
The Kitten that Charmed Me The 9 Lives of a Nation State Attacker.mp4 | 31.3 MiB | 2022 Nov 20 20:56 |
Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service.mp4 | 31.5 MiB | 2022 Nov 20 20:56 |
A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms.mp4 | 31.9 MiB | 2022 Nov 20 20:56 |
Crashing Your Way to Medium-IL Exploiting the PDB Parser for Privilege Escalation.mp4 | 32.4 MiB | 2022 Nov 20 20:56 |
Bam the BAM - Electromagnetic Fault Injection & Automotive Systems.mp4 | 32.7 MiB | 2022 Nov 20 20:56 |
Bypassing Windows Hello for Business and Pleasure.mp4 | 32.8 MiB | 2022 Nov 20 20:56 |
The Ripple Effect Building a Diverse Security Research Team.mp4 | 33.0 MiB | 2022 Nov 20 20:56 |
Mobius Band Explore Hyper-V Attack Interface through Vulnerabilities Internals.mp4 | 33.2 MiB | 2022 Nov 20 20:56 |
The Dark Age of Memory Corruption Mitigations in the Spectre Era.mp4 | 33.6 MiB | 2022 Nov 20 20:56 |
HTTP 2 The Sequel is Always Worse.mp4 | 33.9 MiB | 2022 Nov 20 20:56 |
Action Bias and the Two Most Dangerous Words in Cybersecurity.mp4 | 34.3 MiB | 2022 Nov 20 20:56 |
Breaking the Isolation Cross-Account AWS Vulnerabilities.mp4 | 34.6 MiB | 2022 Nov 20 20:56 |
CnCHunter An MITM-Approach to Identify Live CnC Servers.mp4 | 34.6 MiB | 2022 Nov 20 20:56 |
ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication.mp4 | 34.8 MiB | 2022 Nov 20 20:56 |
Greybox Program Synthesis A New Approach to Attack Dataflow Obfuscation.mp4 | 35.4 MiB | 2022 Nov 20 20:56 |
Symbexcel Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros.mp4 | 35.5 MiB | 2022 Nov 20 20:56 |
Breaking Secure Bootloaders.mp4 | 35.5 MiB | 2022 Nov 20 20:56 |
HPE iLO5 Firmware Security - Go Home Cryptoprocessor, You're Drunk.mp4 | 35.6 MiB | 2022 Nov 20 20:56 |
Arm'd and Dangerous.mp4 | 36.0 MiB | 2022 Nov 20 20:56 |
Breaking Network Segregation Using Esoteric Command & Control Channels.mp4 | 36.0 MiB | 2022 Nov 20 20:56 |
FragAttacks Breaking Wi-Fi through Fragmentation and Aggregation.mp4 | 36.2 MiB | 2022 Nov 20 20:56 |
Timeless Timing Attacks.mp4 | 37.5 MiB | 2022 Nov 20 20:56 |
The Mass Effect How Opportunistic Workers Drift into Cybercrime.mp4 | 37.8 MiB | 2022 Nov 20 20:56 |
Typhoon Mangkhut One-click Remote Universal Root Formed with Two Vulnerabilities.mp4 | 38.0 MiB | 2022 Nov 20 20:56 |
Rope Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution.mp4 | 38.3 MiB | 2022 Nov 20 20:56 |
Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity.mp4 | 38.3 MiB | 2022 Nov 20 20:56 |
A Hole in the Tube Uncovering Vulnerabilities in Critical Infrastructure of Healthcare Facilities.mp4 | 38.8 MiB | 2022 Nov 20 20:56 |
The Case for a National Cybersecurity Safety Board.mp4 | 38.8 MiB | 2022 Nov 20 20:56 |
Anatomy of Native IIS Malware.mp4 | 39.1 MiB | 2022 Nov 20 20:56 |
Come to the Dark Side, We Have Apples Turning macOS Management Evil.mp4 | 39.2 MiB | 2022 Nov 20 20:56 |
Sleight of ARM Demystifying Intel Houdini.mp4 | 39.5 MiB | 2022 Nov 20 20:56 |
20 Ways to Bypass Your macOS Privacy Mechanisms.mp4 | 39.6 MiB | 2022 Nov 20 20:56 |
Deepfake Social Engineering Creating a Framework for Synthetic Media Social Engineering.mp4 | 39.8 MiB | 2022 Nov 20 20:56 |
Over the Air Baseband Exploit Gaining Remote Code Execution on 5G Smartphones.mp4 | 40.6 MiB | 2022 Nov 20 20:56 |
The Devil is in the GAN Defending Deep Generative Models Against Adversarial Attacks.mp4 | 40.6 MiB | 2022 Nov 20 20:56 |
MFA-ing the Un-MFA-ble Protecting Auth Systems' Core Secrets.mp4 | 40.8 MiB | 2022 Nov 20 20:56 |
How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain.mp4 | 41.3 MiB | 2022 Nov 20 20:56 |
Securing Open Source Software - End-to-end, At massive scale, Together.mp4 | 41.3 MiB | 2022 Nov 20 20:56 |
Reverse Engineering the M1.mp4 | 41.4 MiB | 2022 Nov 20 20:56 |
ERROR BadAlloc - Broken Memory Allocators Led to Millions of Vulnerable IoT & Embedded Devices.mp4 | 41.5 MiB | 2022 Nov 20 20:56 |
Security Analysis of CHERI ISASecurity Analysis of CHERI ISA.mp4 | 41.6 MiB | 2022 Nov 20 20:56 |
President's Cup Cyber Competition Finding the Best Cyber Talent in the US Government.mp4 | 41.6 MiB | 2022 Nov 20 20:56 |
Disinformation At Scale Using GPT-3 Maliciously for Information Operations.mp4 | 41.8 MiB | 2022 Nov 20 20:56 |
5G IMSI Catchers Mirage5G IMSI Catchers Mirage.mp4 | 42.2 MiB | 2022 Nov 20 20:56 |
With Friends Like eBPF, Who Needs Enemies.mp4 | 42.2 MiB | 2022 Nov 20 20:56 |
Another Road Leads to the Host From a Message to VM Escape on Nvidia vGPU.mp4 | 43.3 MiB | 2022 Nov 20 20:56 |
ProxyLogon is Just the Tip of the Iceberg A New Attack Surface on Microsoft Exchange Server.mp4 | 43.6 MiB | 2022 Nov 20 20:56 |
IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.mp4 | 43.7 MiB | 2022 Nov 20 20:56 |
Cloudy with a Chance of APT Novel Microsoft 365 Attacks in the Wild.mp4 | 44.2 MiB | 2022 Nov 20 20:56 |
Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones.mp4 | 44.2 MiB | 2022 Nov 20 20:56 |
Alcatraz A Practical Hypervisor Sandbox to Prevent Escapes from the KVM QEMU and KVM-Based MicroVMs.mp4 | 44.7 MiB | 2022 Nov 20 20:56 |
Safeguarding UEFI Ecosystem Firmware Supply Chain is Hard(coded).mp4 | 46.5 MiB | 2022 Nov 20 20:56 |
Next-Gen DFIR Mass Exploits & Supplier Compromise.mp4 | 47.6 MiB | 2022 Nov 20 20:56 |
Certified Pre-Owned Abusing Active Directory Certificate Services.mp4 | 47.8 MiB | 2022 Nov 20 20:56 |
An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures.mp4 | 49.2 MiB | 2022 Nov 20 20:56 |
Windows Heap-backed Pool The Good, the Bad, and the Encoded.mp4 | 52.6 MiB | 2022 Nov 20 20:56 |
Everything has Changed in iOS 14, but Jailbreak is Eternal.mp4 | 60.0 MiB | 2022 Nov 20 20:56 |
Keynote Secretary Alejandro Mayorkas.mp4 | 61.7 MiB | 2022 Nov 20 20:56 |
Back in Black Hat The 7th Annual Black Hat USA NOC Report.mp4 | 65.5 MiB | 2022 Nov 20 20:56 |
Do You Speak My Language Make Static Analysis Engines Understand Each Other.mp4 | 74.9 MiB | 2022 Nov 20 20:56 |
Locknote Conclusions and Key Takeaways from Day 1.mp4 | 88.9 MiB | 2022 Nov 20 20:56 |
Keynote Supply Chain Infections and the Future of Contactless Deliveries.mp4 | 97.5 MiB | 2022 Nov 20 20:56 |
Keynote Hacking the Cybersecurity Puzzle.mp4 | 124.9 MiB | 2022 Nov 20 20:56 |