Showing 65 results

35:39
Travel & Eventsresearch-presentationtechnical-deep-divewindows-11

43:23
DEF CON 33 - One Modem to Brick Them All -Vulns in EV Charging Comms - Jan Berens, Marcell Szakaly
DEFCONConference
6 months ago
Science & Technologyresearch-presentationhybridev-charging

22:31
Travel & Eventsresearch-presentationhybridmini-apps

38:43
Travel & Eventsresearch-presentationtechnical-deep-diveusb

39:09
Travel & Eventsresearch-presentationhybridcss

30:16
Travel & Eventsresearch-presentationhybriddisinformation

32:28
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridlinux-kernel

21:21
Travel & Eventsresearch-presentationhybridsbom

32:06
The Pivotal Role of Large Language Models in Extracting Actionable TTP Attack Chains
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridllm

35:56
The Illusion of Isolation: How Isolation Failures in CI/CD Servers Lead to RCE and Privacy Risks
Black Hat
6 months ago
Travel & Eventsresearch-presentationtechnical-deep-diveci-cd

29:53
Travel & Eventsresearch-presentationhybridautomotive

47:09
The Oversights Under the Flow: Discovering the Vulnerable Tooling Suites From Azure MLOps
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridazure

40:33
Bridging the Gap: Type Confusion and Boundary Vulnerabilities Between WebAssembly and JavaScript
Black Hat
6 months ago
Travel & Eventsresearch-presentationtechnical-deep-divev8

30:24
Travel & Eventsresearch-presentationtechnical-deep-divevcenter

37:40
ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking!
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridquantum-computing