Showing 25 results
DEF CON 33 Recon Village - Attack Surface in Motion - Muslim Koser
42:25
Science & Technologyresearch-presentationhybridattack-surface
DEF CON 33  Recon Village -  A Playbook for Integration Servers - Ryan Bonner, Guðmundur Karlsson
22:01
Science & Technologyresearch-presentationhybridwebmethods
DEF CON 33 Recon Village  - Mapping the Shadow War From Estonia to Ukraine -  Evgueni Erchov
20:47
Science & Technologyresearch-presentationhybridrussia
DEF CON 33 Recon Village -  Inside the Shadows Tracking RaaS Groups, Cyber Threats - John Dilgen
32:30
Science & Technologyresearch-presentationhybridransomware-as-a-service
DEF CON 33 Recon Village - Robin The Archaeologist of the Dark Web - Apurv Singh Gautam
20:12
Science & Technologyresearch-presentationhybriddark-web
DEF CON 33 Recon Village - OSINT & Modern Recon Uncover Global VPN Infrastructure - Vladimir Tokarev
39:53
Science & Technologyresearch-presentationtechnical-deep-divewindows
Black Hat Europe 2025 | Keynote: Inside the Ransomware Machine
1:01:42
Travel & Eventsresearch-presentationhybridransomware
The ByzRP Solution: A Global Operational Shield for RPKI Validators
47:04
Travel & Eventsresearch-presentationtechnical-deep-divebgp
The Drone Supply Chain's Grand Siege: From Initial Breaches to Long-Term Espionage
32:46
Travel & Eventsresearch-presentationhybridearth-ammit
Operation BlackEcho: Voice Phishing Using Fake Financial and Vaccine Apps
37:19
Travel & Eventsresearch-presentationhybridandroid
Should We Chat, Too? Security Analysis of WeChat's MMTLS Encryption Protocol
39:12
Travel & Eventsresearch-presentationhybridwechat
One Bug to Rule Them All: Stably Exploiting a Preauth RCE Vulnerability on Windows Server 2025
22:15
Travel & Eventsresearch-presentationtechnical-deep-divewindows-server-2025
Keynote: Cyber Threats in the Age of AI
41:45
Travel & Eventskeynotehybridai
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
45:07
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive
The Black Hat Asia Network Operations Center (NOC) Report
24:13
Travel & Eventsresearch-presentationhybridblack-hat
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in