https://bsidescbr.com.au/
“Not All Vulnerabilities Are The Same.”
Watch here: youtu.be/FRMni2WEUM4
“Not All Vulnerabilities Are The Same.”
Watch here: youtu.be/FRMni2WEUM4
“Finding Critical Bugs in Adobe Experience Manager.”
Watch here: youtu.be/3IRdkNv4E0c
“Finding Critical Bugs in Adobe Experience Manager.”
Watch here: youtu.be/3IRdkNv4E0c
“Decoding Threat Actors: a Free Tool for Mapping Aliases and Taming the Name Game.”
Watch here: youtu.be/W_mOrd8IjFQ
“Decoding Threat Actors: a Free Tool for Mapping Aliases and Taming the Name Game.”
Watch here: youtu.be/W_mOrd8IjFQ
“Where Did I Put My Keys? Preventing Data Leaks at Scale with Automation.”
Watch here: youtu.be/8Xi6f_GMvqY
“Where Did I Put My Keys? Preventing Data Leaks at Scale with Automation.”
Watch here: youtu.be/8Xi6f_GMvqY
“Why Rust is Safe.”
Watch here: youtu.be/aLviWMC_U3A
“Why Rust is Safe.”
Watch here: youtu.be/aLviWMC_U3A
“let’s make malware but it might get caught so the malware gets worse.”
Watch here: youtu.be/YqSDB7wuTsU
“let’s make malware but it might get caught so the malware gets worse.”
Watch here: youtu.be/YqSDB7wuTsU
“n00bing my way through circuit board design.”
Watch here: youtu.be/ijJE-HGizx8
“n00bing my way through circuit board design.”
Watch here: youtu.be/ijJE-HGizx8
“DarkEngine: Conducting Research into a Highly Orchestrated Phishing Campaign.”
Watch here: youtu.be/_VFpddDx8ow
“DarkEngine: Conducting Research into a Highly Orchestrated Phishing Campaign.”
Watch here: youtu.be/_VFpddDx8ow
“Developers, the weakest link in the supply chain?”
Watch here: youtu.be/HPQwXX7JOuc
“Developers, the weakest link in the supply chain?”
Watch here: youtu.be/HPQwXX7JOuc
“Modern Identity Providers Under Attack: Tactics, Techniques, Detections and Mitigations.”
Watch here: youtu.be/FA5jkFNnXU0
“Modern Identity Providers Under Attack: Tactics, Techniques, Detections and Mitigations.”
Watch here: youtu.be/FA5jkFNnXU0
“Breaking COMposure: Journey to Hunting Windows COM Vulnerabilities.”
Watch here: youtu.be/TBMyjoTDf-0
“Breaking COMposure: Journey to Hunting Windows COM Vulnerabilities.”
Watch here: youtu.be/TBMyjoTDf-0
“Kerberoasting in C#: An OPSEC Perspective.”
Watch here: youtu.be/owzWkM0yI6o
“Kerberoasting in C#: An OPSEC Perspective.”
Watch here: youtu.be/owzWkM0yI6o
“Why I am (still) finding secrets in your code.”
Watch here: youtu.be/FVoQ3MkRFBI
“Why I am (still) finding secrets in your code.”
Watch here: youtu.be/FVoQ3MkRFBI
“Reversing Bytecode into Bounties: Uncovering Vulnerabilities in Jira and Confluence Plugins.”
Watch here: youtu.be/wgCv-ZtOYaA
“Reversing Bytecode into Bounties: Uncovering Vulnerabilities in Jira and Confluence Plugins.”
Watch here: youtu.be/wgCv-ZtOYaA
“My First Phish: The SAIGA Saga.”
Watch here: youtu.be/yt9UFPzaikI
“My First Phish: The SAIGA Saga.”
Watch here: youtu.be/yt9UFPzaikI
“The Hero’s Skip and the Hacker’s Leap: Exploring Null References from Hyrule to the Enterprise.”
Watch here: youtu.be/jf2J3nn7vJI
“The Hero’s Skip and the Hacker’s Leap: Exploring Null References from Hyrule to the Enterprise.”
Watch here: youtu.be/jf2J3nn7vJI
“MISSION ASSURANCE: Applications Beyond the Military Context.”
Watch here: youtu.be/EoS-8-5xXXY
“MISSION ASSURANCE: Applications Beyond the Military Context.”
Watch here: youtu.be/EoS-8-5xXXY
“Time Traveling Exploitation: Remote Code Execution in a 10,000 Day Old Game Protocol.”
Watch here: youtu.be/7dXaGKF-73Y
“Time Traveling Exploitation: Remote Code Execution in a 10,000 Day Old Game Protocol.”
Watch here: youtu.be/7dXaGKF-73Y
“Sleepless Strings — Template Injection in Insomnia.”
Watch here: youtu.be/7bMTu3yCZVc
“Sleepless Strings — Template Injection in Insomnia.”
Watch here: youtu.be/7bMTu3yCZVc
“‘Well well well, if it isn’t the consequences of my own actions’.”
Watch here: youtu.be/boT88qkWFTY
“‘Well well well, if it isn’t the consequences of my own actions’.”
Watch here: youtu.be/boT88qkWFTY
“Bitsquatting dot gov.au domains – exploring network data bitflips in DNS traffic.”
Watch here: youtu.be/wuOzxKkYgo0
“Bitsquatting dot gov.au domains – exploring network data bitflips in DNS traffic.”
Watch here: youtu.be/wuOzxKkYgo0
“Panda Mirror: How the Chinese CCP manipulates NPM to horde malware.”
Watch here: youtu.be/oBzG7XOByII
“Panda Mirror: How the Chinese CCP manipulates NPM to horde malware.”
Watch here: youtu.be/oBzG7XOByII
“Catching WordPress 0-Days on the Fly.”
Watch here: youtu.be/-K5BZGWrtqM
“Catching WordPress 0-Days on the Fly.”
Watch here: youtu.be/-K5BZGWrtqM
“Intro to CTF.”
Watch here: youtu.be/5GuYGO6CrVQ
“Intro to CTF.”
Watch here: youtu.be/5GuYGO6CrVQ
“When will a quantum computer be able to crack modern encryption and what should we do about it?”
Watch here: youtu.be/L6QnyTAf2Pw
“When will a quantum computer be able to crack modern encryption and what should we do about it?”
Watch here: youtu.be/L6QnyTAf2Pw