Showing 68 results

40:33
Bridging the Gap: Type Confusion and Boundary Vulnerabilities Between WebAssembly and JavaScript
Black Hat
6 months ago
Travel & Eventsresearch-presentationtechnical-deep-divev8

30:24
Travel & Eventsresearch-presentationtechnical-deep-divevcenter

37:40
ObfusQate: Where Quantum Magic Meets Code Security – Say Goodbye to Easy Cracking!
Black Hat
6 months ago
Travel & Eventsresearch-presentationhybridquantum-computing

36:35
Travel & Eventsresearch-presentationhybriddashcam

38:39
Travel & Eventsresearch-presentationtechnical-deep-divegoogle-quick-share

32:21
Smishmash - Text Based 2fa Spoofing Using OSINT, Phishing Techniques and a Burner Phone
Black Hat
Nov 2022
Travel & Eventsresearch-presentationhybridsmishing

46:01
DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security
DEFCONConference
Oct 2022
Science & Technologyresearch-presentationpracticalapt

44:06
Travel & Eventsresearch-presentationhybridhttp-headers