DEF CON 32 App Sec Village
22 videos • 4,147 views • by DEFCONConference
1
DEF CON 32 - AppSec Considerations From the Casino Industry - Aleise McGowan, Tennisha Martin
DEFCONConference
Download
2
DEF CON 32 - Web2 Meets Web3 Hacking Decentralized Applications - Peiyu Wang
DEFCONConference
Download
3
DEF CON 32 - Your CI CD Pipeline Is Vulnerable, But It's Not Your Fault - Elad Pticha, Oreen Livni
DEFCONConference
Download
4
DEF CON 32 - Lessons Learned from Building & Defending LLM Applications - Javan Rasokat, Andra Lezza
DEFCONConference
Download
5
DEF CON 32 - Using EPSS for Better Management Vulnerability Management - Jerry Gamblin
DEFCONConference
Download
6
DEF CON 32 - Speed Bumps and Speed HacksP: Adventures in Car Mfg Security - Paulo Silva, David Sopas
DEFCONConference
Download
7
DEF CON 32 - Securing Frontends at Scale;Paving our Way to Post XSS World - jen ozmen, Aaron Shim
DEFCONConference
Download
8
DEF CON 32 - Defeating Secure Code Review GPT Hallucinations - Wang Zhilong, Xinzhi Luo
DEFCONConference
Download
9
DEF CON 32 - The Immortal Retrofuturism of Mainframes and How to Keep Them Safe- Michelle Eggers
DEFCONConference
Download
10
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix
DEFCONConference
Download
11
DEF CON 32 - Relative Path File Injection The Next Evolution in RPO - Ian Hickey
DEFCONConference
Download
12
DEF CON 32 -Ticking SQLi - Iggy
DEFCONConference
Download
13
DEF CON 32 - Transforming AppSec Protecting 'Everything as Code' - Kunal Bhattacharya
DEFCONConference
Download
14
DEF COPN 32 - 0 0 0 0 Day Exploiting Localhost APIs From The Browser - Avi Lumel skyGal Elbaz
DEFCONConference
Download
15
DEF CON 32 - BOLABuster-Harnessing LLMs for Automating BOLA Detection - Ravid Mazon, Jay Chen
DEFCONConference
Download
16
DEF CON 32 - The Missing Link How we collect and leverage SBOMs - Cassie Crossley
DEFCONConference
Download
17
DEF CON 32 - Got 99 problems but prompt injection ain't watermelon - Chloé Messdaghi Kasimir Shulz
DEFCONConference
Download
18
DEF CON 32 - Navigating the Cyber Security Labyrinth Choose Your Own Security Adventure - punkcoder
DEFCONConference
Download
19
DEF CON 32 - Maturing Your Application Security Program - SheHacksPurple
DEFCONConference
Download
20
DEF CON 32 - Gridlock The Dual Edged Sword of EV and Solar APIs in Grid Security - Vangelis Stykas
DEFCONConference
Download
21
DEF CON 32 - Fine Grained Authorisation with Relationship Based Access Control - Ben Dechrai
DEFCONConference
Download
22
DEF CON 32 - Hacking Corporate Banking for Fun and Profit - niks, Charles Waterhouse
DEFCONConference
Download