|
Slipping Through the Cracks: How Malicious Emails Evade Detection β Elyssa Boulila
|
|
1
|
49
|
October 22, 2025
|
|
Reversing a Pay Phone for Fun but No Profit β Inbar Raz
|
|
1
|
10
|
October 22, 2025
|
|
Exploring Threats Leveraging Blockchains β Rascagneres Paul
|
|
1
|
24
|
October 22, 2025
|
|
A pragmatic approach to build a threat landscape β Thomas Patzke
|
|
1
|
21
|
October 22, 2025
|
|
From Achilles to NIS2: Slovakian Lessons on Proactive Cybersecurity and Vulnerability Disclosure β Michal RampΓ‘Ε‘ek, Alexander Valach
|
|
1
|
6
|
October 22, 2025
|
|
Oops, I Hacked It Again: Tales and disclosures β Ignacio Navarro
|
|
1
|
17
|
October 22, 2025
|
|
From Buzzword to Battlefield: The Cybersecurity Challenges of Smart Cities β Marina Bochenkova
|
|
1
|
12
|
October 21, 2025
|
|
Fake Jobs, Real Malware. Uncovering How Cybercriminals are Exploiting the Employment Market β IonuΘ Baltariu
|
|
1
|
25
|
October 21, 2025
|
|
Intelmq.ai - adding ML model support to intelmq β Aaron Kaplan, Sebastian Wagner
|
|
1
|
16
|
October 21, 2025
|
|
No way to enable SSH access to your new router? The vendor might have something to hide β Stanislav Dashevskyi
|
|
1
|
11
|
October 21, 2025
|
|
OverLAPS: Overriding LAPS Logic β Antoine Goichot
|
|
1
|
20
|
October 21, 2025
|
|
Phishing detection using various parts of DNS ecosystem β Piotr BiaΕczak
|
|
1
|
10
|
October 21, 2025
|
|
Anti-Forensics - You are doing it wrong (Believe me, I'm an IR consultant) β Stephan Berger
|
|
1
|
29
|
October 21, 2025
|
|
Confessions of a Linux Drama Queen: Incident Response When Hackers Try to Steal Your Spotlight β Melina Phillips
|
|
1
|
13
|
October 21, 2025
|
|
Containing the Threat: Analyzing cryptomining campaigns β Bogdan Trufanda, Mihai Vasilescu
|
|
1
|
14
|
October 21, 2025
|
|
LOLBlue : Living Off the Land with Blue Team tools β Maxence Fossat, Antoine C
|
|
1
|
22
|
October 21, 2025
|
|
The Parking Chronicles - A DIY Guide to Agents Detection β David Sopas
|
|
0
|
6
|
August 26, 2025
|
|
The cloud journey 2013-2025 of the European Commission β Claus
|
|
0
|
7
|
August 26, 2025
|
|
THAT PICTURE IS A LIE: SMUGGLING BINARIES WITH STYLE β Harpreet Singh
|
|
0
|
5
|
August 26, 2025
|
|
RomCom exploits Firefox and Windows zero days in the wild β Damien Schaeffer
|
|
0
|
9
|
August 26, 2025
|
|
Beyond post-quantum stereotypes β Antoine Gicquel, Benjamin SEPE
|
|
0
|
6
|
August 26, 2025
|
|
PersΕna Theory: Infiltration & Deception of Emerging Threat Groups β Tammy Harper
|
|
0
|
19
|
August 26, 2025
|
|
Breaking the Signal: Red Teaming Mobile Networks in 2025 β Ali Abdollahi
|
|
0
|
1
|
August 26, 2025
|
|
Audit and retrospective of an automotive application: Carplay β Etienne CHARRON, Khadim
|
|
0
|
41
|
August 26, 2025
|
|
The βSβ in IoT: Tales from inside the IoT industry β Will Moffat
|
|
0
|
3
|
August 26, 2025
|
|
Tracking and documenting Threat Actors using MISP - A slightly different approach β Csaba Barta
|
|
0
|
8
|
August 26, 2025
|
|
The Human Factor: Psychological Safety in Cybersecurity Frontlines β Cris Brafman Kittner
|
|
0
|
12
|
August 26, 2025
|
|
Revisiting Widevine L3: DRM as a playground for Hackers β Felipe Custodio Romero
|
|
0
|
16
|
August 26, 2025
|
|
French stealer ecosystem: the resurgence skid gangs in cybercrime space β 0xSeeker
|
|
0
|
2
|
August 26, 2025
|
|
Kaitai Struct: a tool for dealing with binary formats β Petr Pucil
|
|
0
|
11
|
August 26, 2025
|