Showing 12 results
DEF CON 33 Recon Village - Investigating Foreign Tech from Online Retailers   - Michael Portera
28:05
Science & Technologyresearch-presentationpracticalamazon
Dismantling the SEOS Protocol
26:50
Travel & Eventsresearch-presentationtechnical-deep-diverfid
Using Deep Learning Attribution Methods for Fault Injection Attacks
40:16
Travel & Eventsresearch-presentationtechnical-deep-divedeep-learning
Keynote: Perspectives on Trust in Hardware Supply Chains
54:33
Travel & Eventskeynotehybridhardware-security
A Journey into Advanced Theoretical Reverse Engineering
35:33
Travel & Eventsresearch-presentationtechnical-deep-divequalcomm
Locknote: Highlights & Key Takeaways from Black Hat Asia 2025
38:56
Travel & Eventseducationalhybridblack-hat
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
45:07
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive
Behind Closed Doors - Bypassing RFID Readers
42:04
Travel & Eventsresearch-presentationhybridrfid
(Mis)adventures with Copilot+: Attacking and Exploiting Windows NPU Drivers
35:39
Travel & Eventsresearch-presentationtechnical-deep-divewindows-11
DEF CON 33 - One Modem to Brick Them All -Vulns in EV Charging Comms - Jan Berens, Marcell Szakaly
43:23
Science & Technologyresearch-presentationhybridev-charging
Watch Your Phone: Novel USB-Based File Access Attacks Against Mobile Devices
38:43
Travel & Eventsresearch-presentationtechnical-deep-diveusb
DriveThru Car Hacking: Fast Food, Faster Data Breach
36:35
Travel & Eventsresearch-presentationhybriddashcam
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in