Showing 7 results
Keynote: Perspectives on Trust in Hardware Supply Chains
54:33
Travel & Eventskeynotehybridhardware-security
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
45:07
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
30:13
Travel & Eventsresearch-presentationhybridbluetooth
A Closer Look at the Gaps in the Grid: New Vulnerabilities and Exploits Affecting Solar Power
43:13
Travel & Eventsresearch-presentationhybridsolar-power
DEF CON 33 - One Modem to Brick Them All -Vulns in EV Charging Comms - Jan Berens, Marcell Szakaly
43:23
Science & Technologyresearch-presentationhybridev-charging
Double Tap at the Blackbox: Hacking a Car Remotely Twice with MiTM
29:53
Travel & Eventsresearch-presentationhybridautomotive
DriveThru Car Hacking: Fast Food, Faster Data Breach
36:35
Travel & Eventsresearch-presentationhybriddashcam
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in