Channel Avatar

Hacktivity - IT Security Festival @UC71Pa-YHA32hYPKTRjZgbXw@youtube.com

32K subscribers - no pronouns :c

The IT Security Festival - Free late night party - Wargame,


37:44
#Hacktivity2023 // Can We Break the Fault Injection Mitigation Bob?
41:24
#Hacktivity2023 // API Security Assurance via E2E Testing
18:19
#Hacktivity2023 // Examining the Explanatory Factors of Malicious Hacking Behaviors
40:46
#Hacktivity2023 // AI Security
25:17
#Hacktivity2023 // Clashing EV Chargers in The Pentesting Arena
18:42
#Hacktivity2023 // Unraveling the Veins of Automotive Vulnerabilities
42:56
#Hacktivity2023 // It Was Harder to Sniff Bluetooth Through My Mask During the Pandemic…
31:03
#Hacktivity2023 // 7 Steps to Secure a SaaS Platform – the Worlds Biggest Companies Trust
45:54
#Hacktivity2023 // Roundtable Discussion about NIS2 Directive (in Hungarian)
43:55
#Hacktivity2023 // Pwning into Power System Center
39:03
#Hacktivity2023 // SIEM Slam: Tricking Modern SIEMs with Fake Logs and Confusing Blue Teams
22:15
#Hacktivity2023 // Supply Chain Attacks
26:16
#Hacktivity2023 // SOCKS Over RDP/Citrix (Pentesting Over Jump Boxes)
21:31
#Hacktivity2023 // Beyond Fun and Games: Understanding the Threat Landscape of Extended Reality
40:37
#Hacktivity2023 // The New SaaS Cyber Kill Chain
43:48
#Hacktivity2023 // How Attackers Find & Exploit Secrets in Source Code
43:00
#Hacktivity2023 // How to Hack and Defend (Your) Open Source?
34:07
#Hacktivity2023 // Formshaker
34:11
#Hacktivity2023 // That’s Just a Tool – Not Good Nor Bad. That Part is Up to YOU
38:57
#Hacktivity2023 // The Power of Coercion Techniques in Windows Environments
14:30
#Hacktivity2023 // Reality or Myth: Unhackable Application (Using Zero Trust)
39:00
#Hacktivity2023 // Carved in Stone: Malware [ab]use of the Bitcoin Blockchain
21:00
#Hacktivity2023 // Elevating OAuth2.0 for Security of Native Clients
37:04
#Hacktivity2023 // Get Deception In Your Environment Now!
01:04:09
#Hacktivity2021 // The History of Hacking AI Systems
37:26
#Hacktivity2021 // 4 Weird Google VRP Bugs in 40 Minutes
40:05
#Hacktivity2021 // Hackers Deserve Rights
31:05
#Hacktivity2021 // A Common Bypass Pattern to Exploit Modern Web Apps
19:21
#Hacktivity2021 // Mobile App Security Testing is Also Essential
34:45
#Hacktivity2021 // The Key to an "Entire Kingdom": Pandora FMS - Chained Exploit (CVE-2021-34074)
02:02
#Hacktivity2023 NOW+NEXT - Summary of the 20th JUBILEE EDITION // 5-6 October 2023
24:06
#Hacktivity2021 // How to Use Cheated Cryptography to Overload Your Server
37:44
#Hacktivity2021 // How to Bypass Data Exfiltration Detection with Malicious Cryptography Techniques
22:07
#Hacktivity2021 // Security Awareness in Development
41:43
#Hacktivity2021 // Penetration Testing Management: Problems in Large Corporations
19:16
#Hacktivity2021 // Secure by Design: Microservice Application Architecture Assessment
43:13
#Hacktivity2021 // Cloud Security Monitoring and Evasion Techniques
33:59
#Hacktivity2021 // Vulnerabilities: When Securing Your Own Environment is No Longer Enough
39:13
#Hacktivity2021 // Millions for Nothing and Clicks for Free
39:47
#Hacktivity2021 // C2Centipede: APT Level C2 Communications for Common Reverse HTTP Shell Tools
24:22
#Hacktivity2021 // CSS Keylogger in 2021 - The Hubris of the Security Community
38:04
#Hacktivity2021 // MIPS-X: The Next IoT Frontier
22:50
#Hacktivity2021 // GALILEO: In GPS We Trust?
40:01
#Hacktivity2021 // DNS in Offensive Techniques
22:00
#Hacktivity2021 // Investigating the Exploitability of Trusted Execution Environments
33:54
#Hacktivity2021 // Mount(ain) of Bugs
22:14
#Hacktivity2021 // GhostEmperor: From ProxyLogon to Kernel Mode, Story of a Modern Day Rootkit
29:19
#Hacktivity2021 // Detection Engineering: Building Custom Detection Controls for Cloud Environments
31:38
#Hacktivity2021 // Malware Hunting - Using Python as Attack Weapon
37:11
#Hacktivity2021 // How to Upgrade Enterprise Security Using Numeric Technique
16:55
#Hacktivity2021 // Security Issues of an Apartment Intercom and Door Lock System
54:20
#Hacktivity2021 // Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones
45:09
#Hacktivity2022 // Broad View to Automotive Security & Penn testing by András Kabai & László Tóth
46:07
#Hacktivity2022 // Fault Injection (FI) Attacks Against Embedded Systems by András Kabai
42:09
#Hacktivity2022 // DDoS Testing Your Infrastructure, including IPv6 SYN floods by Henrik Kramselund
11:30
#Hacktivity2022 // No Parking, No Problem! by Ignacio Navarro
39:41
#Hacktivity2022 // Applying ATT&CK to Analyze Ransomware Campaigns by Marc Rivero López
20:22
#Hacktivity2022 // Everyday Numbers to Break Not So Everyday Software by Márk Módly
30:34
#Hacktivity2022 // How an Android Application can Drain Your Wallet? by Dimitrios Valsamaras
40:39
#Hacktivity2022 // How Attackers Abused DNS in 2021/2022 by Piotr Głaska