-
Attacking And Defending On-Premises
And Cloud-Based Kubernetes Services
- Sadi Zane
-
Stalking The Stalkers.
- Vangelis Stykas and Felipe Solferini
-
My Experience Using OSINT
To Aid In Finding Missing People
- Ahmed Rashwan
-
Won't Somebody Please
Think Of The Maintenance
- Martin McCloskey
-
How Low Can You Go? - Minimising Container
Attack Surface For Security And Performance
- Ollie Cuffley-Hur
-
Introducing Varc:
Volatile Artifact Collector
- Matt Muir and Paul Scott
-
Cloud Chatter:
Defending Against Cloud C2
- Dagmawi Mulugeta
-
Exploiting Linux Capabilities
- Yannis Folias
-
Scammers Who Scam Scammers, Hackers Who Hack Hackers:
A Hidden Sub-Economy On Criminal Marketplaces, And Why It Matters
- Matt Wixey
-
Patterns, Trends And Practises
In Software Security
- Elisa Cavatorta
-
Everybody Loves TAXII
- Alexander Darby
-
Rainbow Road:
The Game Behind Cyber's Colour Theory
- Ana Vijay
-
"GIFShell" — Covert Attack Chain And C2
Utilizing Microsoft Teams GIFs
- Bobby Rauch
-
Hacking Serverless Applications:
A Treasure Map For Uncharted Waters
- Chen Alon
-
Getting Started With Threat Hunting:
How To Introduce Proactive Security In Your Team
- Wiktor Wielento
-
Fangxiao, A Chinese Phishing Threat Actor
- Emily Dennison and Alana Witten
-
Introduction To Bug Hunting
- Hasan Elisert
-
Sculpting A University-Level
Web App Hacking Curriculum
- Jamie O'Hare
-
Evil Neighbour Attacks On SaaS Platforms
Cloudflare, Bitbucket, Etc
- Yash Kadakia
-
Hacking Brains:
The Security Of Brain-Computer Interfaces
- Julia Wilk
-
Honeypots, I Shrunk The Data
- Oscar Williamson
-
Three Surprising Kubernetes Networking
"Features" And How To Defend Against Them
- James Cleverley-Prance
-
Detection At Scale
- Troy Defty
-
Where Do You Draw The Line?
- Patricia R
-
The Rise Of RaaS
- Ellis Casey
-
DLP Without GOD Keys
A Journey In Maths
- Mick Vaites
-
What3Words: The Emperors Knew Cloves
- Andrew Tierney and Nicky Bloor
-
The Office Of Danger:
A Choose Your Own Adventure Story!
- Phil Eveleigh