Showing 7 results
A Journey into Advanced Theoretical Reverse Engineering
35:33
Travel & Eventsresearch-presentationtechnical-deep-divequalcomm
Who Cares Where Waldo Is. Locating macOS Users Without Their Consent
29:02
Travel & Eventsresearch-presentationhybridmacos
The Black Hat Asia Network Operations Center (NOC) Report
24:13
Travel & Eventsresearch-presentationhybridblack-hat
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
30:13
Travel & Eventsresearch-presentationhybridbluetooth
Mini-App But Great Impact: New Ways to Compromise Mobile Apps
22:31
Travel & Eventsresearch-presentationhybridmini-apps
Watch Your Phone: Novel USB-Based File Access Attacks Against Mobile Devices
38:43
Travel & Eventsresearch-presentationtechnical-deep-diveusb
Smishmash - Text Based 2fa Spoofing Using OSINT, Phishing Techniques and a Burner Phone
32:21
Travel & Eventsresearch-presentationhybridsmishing
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in