Showing 65 results
Think Inside the Box: In-the-Wild Abuse of Windows Sandbox in Targeted Attacks
25:15
Travel & Eventsresearch-presentationhybridwindows
JDD: In-depth Mining of Java Deserialization Gadget Chains
37:13
Travel & Eventsresearch-presentationhybridjava
Weaponized Deception: Lessons from Indonesia's Muslim Cyber Army
39:40
Travel & Eventsresearch-presentationhybridmuslim-cyber-army
Sweeping the Blockchain: Unmasking Illicit Accounts in Web3 Scams
19:30
Travel & Eventsresearch-presentationtechnical-deep-diveethereum
The Black Hat Asia Network Operations Center (NOC) Report
24:13
Travel & Eventsresearch-presentationhybridblack-hat
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
45:07
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
30:13
Travel & Eventsresearch-presentationhybridbluetooth
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors
29:01
Travel & Eventsresearch-presentationhybridmime
The Problems of Embedded Python in Excel, or How to Excel in Pwning Pandas
40:55
Travel & Eventsresearch-presentationhybridmicrosoft-excel
Utilizing AI Models to Conceal and Extract Commands in C2 Images
21:03
Travel & Eventsresearch-presentationhybridai
CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks
27:44
Travel & Eventsresearch-presentationhybridcdn
KernelSnitch: Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage
30:49
Travel & Eventsresearch-presentationhybridlinux
A Closer Look at the Gaps in the Grid: New Vulnerabilities and Exploits Affecting Solar Power
43:13
Travel & Eventsresearch-presentationhybridsolar-power
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM
36:36
Travel & Eventsresearch-presentationhybridwasm
Behind Closed Doors - Bypassing RFID Readers
42:04
Travel & Eventsresearch-presentationhybridrfid
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in