Showing 28 results

47:04
Travel & Eventsresearch-presentationtechnical-deep-divebgp

32:46
The Drone Supply Chain's Grand Siege: From Initial Breaches to Long-Term Espionage
Black Hat
5 months ago
Travel & Eventsresearch-presentationhybridearth-ammit

37:19
Travel & Eventsresearch-presentationhybridandroid

25:15
Travel & Eventsresearch-presentationhybridwindows

39:40
Travel & Eventsresearch-presentationhybridmuslim-cyber-army

19:30
Travel & Eventsresearch-presentationtechnical-deep-diveethereum

24:13
Travel & Eventsresearch-presentationhybridblack-hat

29:01
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridmime

30:16
Travel & Eventsresearch-presentationhybriddisinformation

32:06
The Pivotal Role of Large Language Models in Extracting Actionable TTP Attack Chains
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridllm

37:40
ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking!
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridquantum-computing

46:01
DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security
DEFCONConference
Oct 2022
Science & Technologyresearch-presentationpracticalapt
