Duration: (40:9) ?Subscribe5835 2025-02-07T01:42:17+00:00
BlueHat 2024: S09: Pointer Problems – Why We’re Refactoring the Windows Kernel
(44:3)
BlueHat 2024: S01: The two sides of UnOAuthorized
(40:9)
BlueHat 2024: S17: MSTIC - A Threat Intelligence Year in Review
(31:25)
BlueHat 2024: S07: DCOM Research for Everyone!
(45:22)
BlueHat 2024: S11: When the Levee Breaks: Exposing Critical Flaws in Wi-Fi Camera Ecosystems
(44:11)
BlueHat IL 2024 - Dor Amit - BlueHawk - The Bluetooth Motion Detector
(26:29)
BlueHat 2024: Day 1 Keynote: Chris Wysopal (AKA Weld Pond), VeraCode / L0pht
(47:12)
BlueHat 2024: S13: Patterns in the Shadows: Scaling Threat Hunting \u0026 Intel for Modern Adversaries
(38:46)
BlueHat 2024: S03: Double Agent: Exploiting Pass-through Authentication Credential Validation in AAD
(28:37)
BlueHat India 2024: Phishing Landscape Evolution: Unveiling Layers of Email Malware Delivery
(32:32)
BlueHat 2024: LT08: Ransomware Resilience: Turning the Tide Against Cyber Extortion by Tom Williams
(15:)
BlueHat IL 2024 - Gal Weizman - DOM Jungle - Can We Trust The UI?
(36:40)
BlueHat 2024: S04: Creating a Transparent Cloud Industry
(28:2)