-
It’s Time For (R)evolution
- Charl Van Der Walt
-
FuzzyAI: Attacking LLMs
With Coverage-Guided Fuzzing
- Eran Shimony & Mark Cherp
-
You Gotta Fight For Your
Right To Third-Party
- Mat Caplan
-
Your NVMe Had Been Syz'ed
- Alon Zahavi
-
How (Not) To Implement Secure Digital Identity:
Case Study Of Poland's Digital ID System
- Szymon Chadam
-
Malware Development And
Abusing .NET For Initial Access
- Suraj Khetani
-
Why So Optimized?
- Ege Balci
-
Enhancing AWS Security:
A Holistic Approach To Organization Management
- Bogdan Nicorici
-
Don’t Flatten Yourself: Restoring Malware
With Control-Flow Flattening Obfuscation
- Geri Revay
-
Uncommon Process Injection Pattern
- Yoann Dequeker
-
Standing On The Shoulders Of Giant(Dog)s:
A Kubernetes Attack Graph Model
- Julien Terriac
-
Operation Triangulation:
Attacks On IPhones/iPads
- Marco Preuss
-
Hijacking The Java Virtual Machine (JVM) And
Bypassing Runtime Application Self-Protection (RASP)
- Mouad Kondah
-
How To Break Into Organizations With Style:
Hacking Access Control Systems
- Julia Zduńczyk
-
Diving Into JumpServer:
The Public Key Unlocking Your Whole Network
- Oskar Zeino-Mahmalat
-
Smart Toy Vulnerabilities Can Put Your
Child At Risk Of Abuse By Strangers
- Nikolay Frolov
-
Introduction
- Raphaël Conz
-
Threats And Mitigations Landscape
In The Age Of Generative AI
- Andrei Kucharavy
-
The Tale Of Rhadamanthys And The 40 Thieves:
The Nuts, Bolts, And Lineage Of A Multimodular Stealer
- Hasherezade & Ben Herzog
-
From Keyless To Careless: Abusing Misconfigured
OIDC Authentication In Cloud Environments
- Christophe Tafani-Dereeper
-
When Malware Becomes Creative: A Survey Of
Advanced Android Detection Evasion Tactics
- Dimitrios Valsamaras
-
Microsoft 365's BEC-Detection Engineering
Challenges And Opportunities
- Eliraz Levi
-
ADDS Persistance - Burn It, Burn It All
- Charlie "Shutdown" Bromberg & Volker
-
What Can We Do About Cryptocurrency Scams?
- Keven Hendricks
-
Meet The Latest Innovations And Startups In Cybersecurity
And How To Become A Cyber Entrepreneur?
- Trust Valley Startups
-
The Accessibility Abyss:
Navigating Android Malware Waters
- Axelle Apvrille
-
Patch Different On *OS
- John McIntosh
-
Beating The Sanitizer:
Why You Should Add MXSS To Your Toolbox
- Paul Gerste & Yaniv Nizry
-
Secret Web Hacking Knowledge:
CTF Authors Hate These Simple Tricks
- Philippe Dourassov
-
Current Affairs: IoT Security 101
- Iana Peix
-
Choose Your Own Adventure-Red Team Edition
- Nicolas Heiniger
-
An Uninvited House Guest: How PROXYLIB
Overstayed Its Welcome On Android Devices
- Lindsay Kaye
-
Living Off The Land And Attacking
Operational Technology With Surgical Precision
- Ric Derbyshire
-
MFT: Malicious Fungible Tokens
- Mauro Eldritch