-
The Wicked Problems And Opportunities Of Cyber
- Ollie Whitehouse
-
How Teenage Hacking Went Dark
- Joe Tidy
-
Watt’s Going On?
Threats Facing UK Energy Infrastructure
- John Gilbert
-
Zero Trust: Yesterday, Today And Beyond
- David Lacey
-
What Really Matters:
A Crash Course In Our Next 09 Years
- Ilana Wisby
-
Hunting Evil Domains Using
Content-Agnostic Techniques
- Juxhin Dyrmishi Brigjaj & Ian Muscat
-
Threat Hunting The Node Package Manager
- Valentino Duval
-
TokenFlare: Payload-less Initial Access
Leveraging Cloud Workers & Conditional Access Bypass
- Tom Ellson & Sunny Chau
-
Boulevard Of Broken Scopes: How Can We
Reinvent Pentesting For The Greater Good?
- James Burns
-
A Crash Course On Lattices And How
They’re Building The Future Of Cryptography
- Joshua Limbrey
-
DarkCircuit: Cybersecurity Education
Assisted By Agentic AI Systems
- Brandon Toews and Lilia Vladova & Robbie Smith
-
Live And Let Glitch:
Breaking The AirTag In Real Time
- Daniel Darby
-
Resisting The Quantum Threat To Cryptography
From The Hardware Security Foundation Up!
- Tommy Charles
-
Compromising Threat Actor Communications
- Ben F
-
We Tested The Top 50 Ransomware:
Here’s What We Learned!
- Leo & Maya Czarska
-
Chrome Alone:
How Extensions Sneak Past Your Defenses
- Tasha (BB-8) Armstrong-Godwin
-
Sleep 90d; Hack The Planet:
Responsible Disclosure And Legal Risk
- Rich Hanstock
-
How To Hack A Quantum Computer
- Jamie Friel
-
Detecting The Undetectable: A Heuristic-
Based ML Framework For Trojan Malware
- Darlington Chigozie Okeke