Duration: (27:41) ?Subscribe5835 2025-02-14T19:28:43+00:00
#HITBCyberWeek #CommSec D1 - Hacking The 0day Marketplace
(27:46)
#HITBCyberWeek #CommSec D1 - The Journey For Manufacturers To Develop Cyber Resilient IoT Devices
(29:46)
#HITBCyberWeek #CommSec AI Security: Why, What, How? - Alexander Polyakov
(44:2)
#HITBCyberWeek #CommSec Right The First Time: Modular PCB Design For Makers - Brita Meriac
(23:35)
#HITBCyberWeek #CommSec D2 - Optimizing The Protection Of IoT Devices
(26:)
#HITBCyberWeek #CommSec Building A GEN2 UHF RFID Reader With SDR - Adam Laurie
(27:41)
#HITBCyberWeek #CommSec D1 WORKSHOP - How To Train Your Self-Driving (Dragon) Car
(1:44:39)
#HITBCyberWeek #CommSec AI For Security Or Security For AI? - Sergey Gordeychik
(33:52)
DevSecOps : What, Why and How
(52:46)
#HITBCyberWeek #CommSec D1 WORKSHOP - Signal Processing With GNURadio And SDRs
(2:4:45)
#HITBCyberWeek #CommSec Practical Approaches For Testing And Breaking JWT Auth - Mazin Ahmed
(32:21)
#HITBCW2021 D2 - HITB LAB: ARM IoT Firmware Extraction And Emulation Using ARMX - Saumil Shah
(1:15:28)
Selling 0-Days to Governments and Offensive Security Companies
(39:18)
#HITBGSEC 2018 COMMSEC: Breaking Full Disk Encryption - Nicolas Collery and Vitaly Kamluk
(35:57)
BSidesSF 2018 - The IoT Hacker's Toolkit (David Tomaschik)
(28:29)
#HITB2022SIN #COMMSEC API Security Through External Attack Surface Management - Phillip Wylie
(28:47)
Phase Coherent RF Platforms | GRCon2020 by Bobby Smith
(25:40)
#HITB2024BKK #COMMSEC D1: CoralRaider Targets Victims Data and Social Media Accounts
(30:20)
#HITBCyberWeek #CommSec Physics Of Security - Tomas Drab
(31:8)
#HITBCyberWeek #CommSec Adventures In The World Of Transaction Fraud - Tim Yunosov
(48:44)
#HITBCyberWeek #CommSec D2 WORKSHOP - CI/CD With SAST And DAST For Embedded Devices
(1:29:33)
#HITBCyberWeek #CommSec D2 - Spoofing Your Location On IOS Without Jailbreaking
(24:16)
#HITBCyberWeek #CommSec D2 - Inside The Mind Of A Threat Actor: Beyond Pentesting
(23:9)
#HITBCyberWeek #CommSec D2 - Enterprise Security Strategy Leveraging On Zero Trust Approach
(35:1econd)
#HITBCyberWeek #CommSec AI For Security Or Security For AI by Sergey Gordeychik
#HITBCyberWeek #CommSec HIGHLIGHT - Are You Insured Around Cyber Crime? - Jake Kouns
(47:38)
#HITBCyberWeek #CommSec IoT Pentesting The Right Way - Yogesh Ojha
(36:59)
#HITBCyberWeek #CommSec D2 - Trustworthy Shield – A Cheap TPM Module For Older Systems
(18:32)