Duration: (18:32) ?Subscribe5835 2025-02-14T04:42:50+00:00
#HITBCyberWeek #CommSec D1 - Hacking The 0day Marketplace
(27:46)
#HITBCyberWeek #CommSec D1 - The Journey For Manufacturers To Develop Cyber Resilient IoT Devices
(29:46)
#HITBCyberWeek #CommSec AI Security: Why, What, How? - Alexander Polyakov
(44:2)
#HITBCyberWeek #CommSec Right The First Time: Modular PCB Design For Makers - Brita Meriac
(23:35)
#HITBCyberWeek #CommSec D2 - Optimizing The Protection Of IoT Devices
(26:)
#HITBCyberWeek #CommSec D1 WORKSHOP - How To Train Your Self-Driving (Dragon) Car
(1:44:39)
#HITBCyberWeek #CommSec AI For Security Or Security For AI? - Sergey Gordeychik
(33:52)
#HITBCyberWeek #CommSec Building A GEN2 UHF RFID Reader With SDR - Adam Laurie
(27:41)
#HITBCyberWeek #CommSec Physics Of Security - Tomas Drab
(31:8)
#HITB2024BKK #COMMSEC D1: My First and Last Shellcode Loader
(1:10:43)
#HITBCW2021 D2 - HITB LAB: ARM IoT Firmware Extraction And Emulation Using ARMX - Saumil Shah
(1:15:28)
#HITBGSEC 2018 D2: NFC Payments: The Art Of Relay And Replay Attacks - Salvador Mendoza
(31:43)
OSB 2015 - Open Source Tools of the Hardware Hacking Trade - Joe Grand
(49:4)
Leveraging OSINT to Track Cyber Threat Actors
(32:21)
Top Tools And Techniques Used By Threat Actors And Malware
(48:11)
#HITB2024BKK #COMMSEC D1: Flash Loans: The Blessing or Curse of DeFi
(41:12)
#HITB2018DXB D1T1: AI Model Security: Reverse Engineering Machine Learning Models - Kang Li
(54:20)
DevSecOps : What, Why and How
(52:46)
#HITBCyberWeek D1 LAB - A Practical Introduction to BLE Security Without Any Special Hardware
(2:20:23)
#HITBCyberWeek #CommSec Adventures In The World Of Transaction Fraud - Tim Yunosov
(48:44)
#HITBCyberWeek #CommSec D2 WORKSHOP - CI/CD With SAST And DAST For Embedded Devices
(1:29:33)
#HITBCyberWeek #CommSec D2 - Spoofing Your Location On IOS Without Jailbreaking
(24:16)
#HITBCyberWeek #CommSec D2 - Inside The Mind Of A Threat Actor: Beyond Pentesting
(23:9)
#HITBCyberWeek #CommSec D2 - Enterprise Security Strategy Leveraging On Zero Trust Approach
(35:1econd)
#HITBCyberWeek #CommSec HIGHLIGHT - Are You Insured Around Cyber Crime? - Jake Kouns
(47:38)
#HITBCyberWeek #CommSec IoT Pentesting The Right Way - Yogesh Ojha
(36:59)
#HITBCyberWeek #CommSec AI For Security Or Security For AI by Sergey Gordeychik
#HITBCyberWeek #CommSec D2 - Trustworthy Shield – A Cheap TPM Module For Older Systems
(18:32)
#HITBCyberWeek #CommSec Insight Into TTPs Of A Middle Eastern Threat Actor - Jaromir Horejsi
(32:30)