-
Evolving Memory Analysis
With Volatility 3
- Mike Auty
-
DeepFake Cyber Security
Threats And Opportunities
- Matt Lewis
-
HeapLab Taster:
GLIBC Heap Exploitation
- Max Kamper
-
Why Security-as-a-Feature
Will Never Happen
- Lawrence Munro
-
Proximity Required: Finding
Vulnerabilities In Contactless Payments
- Leigh-Anne Galloway and Timur Yunusov
-
Why Are We Still Doing
Authentication Wrong?
- Florent Daigniere
-
From Zero To Hero Threat
Modeling In 90 Minutes
- Steven Wierckx
-
What Do Hackers See When
They Look At The Clouds?
- Laura Kankaala