Showing 68 results
A Closer Look at the Gaps in the Grid: New Vulnerabilities and Exploits Affecting Solar Power
43:13
Travel & Eventsresearch-presentationhybridsolar-power
Standing on the Shoulders of Giants: De-Obfuscating WebAssembly Using LLVM
36:36
Travel & Eventsresearch-presentationhybridwasm
Behind Closed Doors - Bypassing RFID Readers
42:04
Travel & Eventsresearch-presentationhybridrfid
(Mis)adventures with Copilot+: Attacking and Exploiting Windows NPU Drivers
35:39
Travel & Eventsresearch-presentationtechnical-deep-divewindows-11
DEF CON 33 - One Modem to Brick Them All -Vulns in EV Charging Comms - Jan Berens, Marcell Szakaly
43:23
Science & Technologyresearch-presentationhybridev-charging
Mini-App But Great Impact: New Ways to Compromise Mobile Apps
22:31
Travel & Eventsresearch-presentationhybridmini-apps
Watch Your Phone: Novel USB-Based File Access Attacks Against Mobile Devices
38:43
Travel & Eventsresearch-presentationtechnical-deep-diveusb
Invisible Ink: Privacy Risks of CSS in Browsers and Emails
39:09
Travel & Eventsresearch-presentationhybridcss
Foreign Information Manipulation and Interference (Disinformation 2.0)
30:16
Travel & Eventsresearch-presentationhybriddisinformation
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
32:28
Travel & Eventsresearch-presentationhybridlinux-kernel
Determining Exploitability of Vulnerabilities with SBOM and VEX
21:21
Travel & Eventsresearch-presentationhybridsbom
The Pivotal Role of Large Language Models in Extracting Actionable TTP Attack Chains
32:06
Travel & Eventsresearch-presentationhybridllm
The Illusion of Isolation: How Isolation Failures in CI/CD Servers Lead to RCE and Privacy Risks
35:56
Travel & Eventsresearch-presentationtechnical-deep-diveci-cd
Double Tap at the Blackbox: Hacking a Car Remotely Twice with MiTM
29:53
Travel & Eventsresearch-presentationhybridautomotive
The Oversights Under the Flow: Discovering the Vulnerable Tooling Suites From Azure MLOps
47:09
Travel & Eventsresearch-presentationhybridazure
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in