Showing 68 results

38:37
Travel & Eventsresearch-presentationhybridgenai

37:13
Travel & Eventsresearch-presentationhybridjava

25:15
Travel & Eventsresearch-presentationhybridwindows

39:40
Travel & Eventsresearch-presentationhybridmuslim-cyber-army

38:56
Travel & Eventseducationalhybridblack-hat

19:30
Travel & Eventsresearch-presentationtechnical-deep-diveethereum

24:13
Travel & Eventsresearch-presentationhybridblack-hat

45:07
Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet
Black Hat
5 months ago
Travel & Eventsresearch-presentationtechnical-deep-diveautomotive

30:13
Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridbluetooth

29:01
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridmime

40:55
Travel & Eventsresearch-presentationhybridmicrosoft-excel

21:03
Travel & Eventsresearch-presentationhybridai

27:44
Travel & Eventsresearch-presentationhybridcdn

30:49
KernelSnitch: Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridlinux
