Showing 25 results
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors
29:01
Travel & Eventsresearch-presentationhybridmime
Utilizing AI Models to Conceal and Extract Commands in C2 Images
21:03
Travel & Eventsresearch-presentationhybridai
CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks
27:44
Travel & Eventsresearch-presentationhybridcdn
DEF CON 33 - One Modem to Brick Them All -Vulns in EV Charging Comms - Jan Berens, Marcell Szakaly
43:23
Science & Technologyresearch-presentationhybridev-charging
Foreign Information Manipulation and Interference (Disinformation 2.0)
30:16
Travel & Eventsresearch-presentationhybriddisinformation
Double Tap at the Blackbox: Hacking a Car Remotely Twice with MiTM
29:53
Travel & Eventsresearch-presentationhybridautomotive
vCenter Lost: How the DCERPC Vulnerabilities Changed the Fate of ESXi
30:24
Travel & Eventsresearch-presentationtechnical-deep-divevcenter
QuickShell: Sharing is Caring About an RCE Attack Chain on Quick Share
38:39
Travel & Eventsresearch-presentationtechnical-deep-divegoogle-quick-share
Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
44:06
Travel & Eventsresearch-presentationhybridhttp-headers
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in