-
Long Live Short-Lived Certificates!
Updates On Public Key Infrastructure
- Alexis Hancock
-
Cloud Edge Phishing:
Breaking The Future Of Auth
- Carlos Gómez Quintana
-
Why'd You Only Call Me When You're In SMM?
Exploiting UEFI SMM Vulnerabilities
For Persistent Firmware Implants
- Nika Korchok Wakulich
-
Ghosts In The Lobby: Covert Entry Stories
(And The Lessons That They Teach Us)
- Cori Macy
-
The Power Of Powerlogs
- Sarah Edwards
-
Agentic ProbLLMs:
Exploiting Al Computer-Use And Coding Agents
- Johann Rehberger
-
Architecting Security Onion For Enterprise Resilience:
A Case Study In Scaling Open-Source SIEM For
High-Performance Threat Detection
- Piroon Srisawang and Peerapong Thongpubet & Korrawit Chaikangwan
-
Hot Off The Presses: AI Agents As
Your Organization's Personal Security Newsroom
- Brett Andrews
-
Build Your Own SOC
- Kristen Huang
-
Unpacking Real Malware With Their Runtime Protection:
Insights From Southeast Asia
- Huy Ngo