|
The cloud journey 2013-2025 of the European Commission β Claus
|
|
0
|
7
|
August 26, 2025
|
|
THAT PICTURE IS A LIE: SMUGGLING BINARIES WITH STYLE β Harpreet Singh
|
|
0
|
4
|
August 26, 2025
|
|
RomCom exploits Firefox and Windows zero days in the wild β Damien Schaeffer
|
|
0
|
9
|
August 26, 2025
|
|
Beyond post-quantum stereotypes β Antoine Gicquel, Benjamin SEPE
|
|
0
|
4
|
August 26, 2025
|
|
Hacking Kubernetes β Benjamin Koltermann
|
|
0
|
11
|
August 26, 2025
|
|
PersΕna Theory: Infiltration & Deception of Emerging Threat Groups β Tammy Harper
|
|
0
|
19
|
August 26, 2025
|
|
Breaking the Signal: Red Teaming Mobile Networks in 2025 β Ali Abdollahi
|
|
0
|
1
|
August 26, 2025
|
|
Tech Duel: The Escape Battle β Stijn Tomme, Dominiek Madou
|
|
0
|
1
|
August 26, 2025
|
|
Audit and retrospective of an automotive application: Carplay β Etienne CHARRON, Khadim
|
|
0
|
41
|
August 26, 2025
|
|
Yoga for geeks β Georges Kesseler
|
|
0
|
5
|
August 26, 2025
|
|
API Underworld: Red Team Hacking Secrets β Parth Shukla
|
|
0
|
2
|
August 26, 2025
|
|
Web forensic with Lookyloo β RaphaΓ«l Vinot
|
|
0
|
2
|
August 26, 2025
|
|
The βSβ in IoT: Tales from inside the IoT industry β Will Moffat
|
|
0
|
3
|
August 26, 2025
|
|
Tracking and documenting Threat Actors using MISP - A slightly different approach β Csaba Barta
|
|
0
|
8
|
August 26, 2025
|
|
Crafting an Infoleak exploit - A Hands On tutorial β Saumil Shah
|
|
0
|
5
|
August 26, 2025
|
|
The Human Factor: Psychological Safety in Cybersecurity Frontlines β Cris Brafman Kittner
|
|
0
|
12
|
August 26, 2025
|
|
Malware Development for Ethical Hackers (Windows, Linux, Android) β cocomelonc
|
|
0
|
18
|
August 26, 2025
|
|
Detection Engineering with Sigma β Thomas Patzke
|
|
0
|
5
|
August 26, 2025
|
|
Reverse Engineering Ransomware: Hands-On Malware Analysis & IOCs Extraction β Ankshita Maunthrooa
|
|
0
|
7
|
August 26, 2025
|
|
Hands-On Hardware Hacking: Extracting Keys and Owning Encrypted Laptops β Edouard D'hoedt, Hayk Gevorgyan
|
|
0
|
22
|
August 26, 2025
|
|
So you're interested in social engineering? The very first steps β Kirils Solovjovs
|
|
0
|
4
|
August 26, 2025
|
|
Integrating secure coding to DevSecOps cycle β Gopika Subramanian
|
|
0
|
10
|
August 26, 2025
|
|
Revisiting Widevine L3: DRM as a playground for Hackers β Felipe Custodio Romero
|
|
0
|
14
|
August 26, 2025
|
|
Automate Your Hacking: Writing New Tools & Extending Existing Ones β Rahul Binjve
|
|
0
|
3
|
August 26, 2025
|
|
Payload Obfuscation for Red Teams β Duncan Ogilvie
|
|
0
|
10
|
August 26, 2025
|
|
Signals of Conflict: The Rise of OSINT in Cyber and Information Warfare. β Shubham Kumar, Sagar Tiwari
|
|
0
|
6
|
August 26, 2025
|
|
French stealer ecosystem: the resurgence skid gangs in cybercrime space β 0xSeeker
|
|
0
|
2
|
August 26, 2025
|
|
Kaitai Struct: a tool for dealing with binary formats β Petr Pucil
|
|
0
|
11
|
August 26, 2025
|
|
Hacking - 30+ years ago β Walter Belgers
|
|
0
|
4
|
August 26, 2025
|