Channel Avatar

scrt.insomnihack @UCGdJZb8OWZPrRK8PuEeoZuA@youtube.com

2.9K subscribers - no pronouns :c

More from this channel (soon)


38:27
An Uninvited House Guest: How PROXYLIB Overstayed Its Welcome On Android Devices - Lindsay Kaye
47:56
Operation Triangulation: Attacks On IPhones/iPads - Marco Preuss
49:36
Don’t Flatten Yourself: Restoring Malware With Control-Flow Flattening Obfuscation - Geri Revay
52:24
Diving Into JumpServer: The Public Key Unlocking Your Whole Network - Oskar Zeino-Mahmalat
50:45
ADDS Persistance - Burn It, Burn It All - Charlie "Shutdown" Bromberg & Volker
37:20
When Malware Becomes Creative: A Survey Of Android Detection Evasion Tactics - Dimitrios Valsamaras
50:44
Standing On The Shoulders Of Giant(Dog)s: A Kubernetes Attack Graph Model - Julien Terriac
23:37
Abusing Misconfigured OIDC Authentication In Cloud Environments - Christophe Tafani-Dereeper
38:56
Secret Web Hacking Knowledge: CTF Authors Hate These Simple Tricks - Philippe Dourassov
01:00:13
How (Not) To Implement Secure Digital Identity:A Study Of Poland's Digital ID System - Szymon Chadam
43:16
You Gotta Fight For Your Right To Third-Party - Mat Caplan
54:46
Threats And Mitigations Landscape In The Age Of Generative AI - Andrei Kucharavy
44:10
Hijacking The Java Virtual Machine And Bypassing Runtime Application Self-Protection - Mouad Kondah
50:34
FuzzyAI: Attacking LLMs With Coverage-Guided Fuzzing - Eran Shimony & Mark Cherp
42:32
Beating The Sanitizer: Why You Should Add MXSS To Your Toolbox - Paul Gerste & Yaniv Nizry
28:59
Smart Toy Vulnerabilities Can Put Your Child At Risk Of Abuse By Strangers - Nikolay Frolov
44:00
Uncommon Process Injection Pattern - Yoann Dequeker
53:14
Patch Different On *OS - John McIntosh
43:26
Current Affairs: IoT Security 101 - Iana Peix
44:53
Living Off The Land And Attacking Operational Technology With Surgical Precision - Ric Derbyshire
30:45
Your NVMe Had Been Syz'ed - Alon Zahavi
51:31
Meet The Latest Innovations And Startups In Cybersecurity And How To Become A Cyber Entrepreneur?
34:46
MFT: Malicious Fungible Tokens - Mauro Eldritch
50:09
Enhancing AWS Security: A Holistic Approach To Organization Management - Bogdan Nicorici
52:20
The Accessibility Abyss: Navigating Android Malware Waters - Axelle Apvrille
01:07:50
It’s Time For (R)evolution - Charl Van Der Walt
41:02
Why So Optimized? - Ege Balci
43:02
Open Sésame! Example Of Modern Electronic Lockpicking by Thomas Bygodt
54:40
Pentesting By The Numbers: What Data Analysis Tells About What We Do by Charl Van Der Walt
46:24
Data Science And Machine Learning In Cybersecurity: Hype Or Reality? by Angelo Schranko De Oliveira
49:05
Hacking Your Jump Rope Or Your Coffee Machine by Axelle Apvrille
35:46
Finding Malicious PyPI Packages In The Wild by Christophe Tafani-Dereeper And Vladimir De Turckheim
42:49
USBvalve: Expose USB Activity On The Fly by Cesare Pizzi
51:39
A Ticket Worth Waiting 65 Years For by Charlie Bromberg
49:19
Attacking And Defending GraphQL: The Ultimate Guide by Leo Juszkiewicz
54:16
Breaking And Fixing Azure AD Device Identity Security by Dirk-jan Mollema
54:05
The Latest Startups In Cybersecurity & How To Become A Cyber Entrepreneur? by Trust Valley Startups
41:23
Hacking Harms! Measuring The Impact And Harm From Cyberattacks by Emma Raffray
35:32
Modern Adventures With Legacy Protocols by Yannay Livneh
51:44
Stories Of Money: Crypto, Hacks, Ransom, DeFi And Attacks by Marco Preuss
47:14
Whatever Pown2own by Benoit Forgette & Damien Cauquil
38:37
Secrets, Data And Cypher-injections: Neo4j Attacks & Cloud Exploits by Nitay Bachrach and Or Emanuel
32:59
The History Of Ransomware: From Floppies To Droppers, And Beyond by Eliad Kimhy
40:08
Uncovering A Critical Vulnerability And Taking Over Decentralized Identity Networks by Shaked Reiner
45:47
Targeted Social Engineering Attacks: Weaponizing Psychology by Christina Lekati
38:22
Inglourious Drivers: The Revenge Of The Peripheral Devices by Omer Tsarfati
47:57
Detection Engineering In Modern Day Security Organization by Tondang Mangatas and Sylvain Lu
47:50
Which Models For Secure ICS Network Architectures To Adapt To New Usages? by Alexandrine Torrents
49:24
Why Kidz Couldn’t Care Less About Your Password Advice? by Mia Landsem
51:16
Go Security Pitfalls: 2 Lessons From The Battlefield At Grafana Labs by Jeremy Matos
31:42
How To Have Visibility And Security OF CICD Ecosystem by Pramod Rana
41:51
Adversary Tracking And All The Lies We Tell Ourselves by Joe Slowik
49:48
Permissionless Android Universal Overlays by Dimitrios Valsamaras
36:24
Optimising Business Value With Secure Access Service Edge by Neil Thacker
01:00:59
Use Case: Red Teaming A Recently Breached Company by Nuri And Marat
59:09
(KEYNOTE) Crazy Incentives And How They Drive Security Into No Man's Land by Dr. Christian Folini
32:27
Turn And Face The Strange: Ch-Ch-Changes In Ransomware Techniques by Lindsay Kaye
37:18
(KEYNOTE) The Converging Threat Landscape by Patrice Perche
32:42
Breaking Docker's Named Pipes SYSTEMatically by Eviatar Gerzi
59:44
An Insider Threat: What Is Social Engineering? by Crux Conception