Content List

  1. Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant
  2. All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate
  3. IMP4GT – IMPersonation Attacks in 4G NeTworks
  4. Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers
  5. A Hacker’s Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning
  6. Demystifying Modern Windows Rootkits
  7. My Cloud is APT’s Cloud – Investigating and Defending Office 365
  8. Hunting Invisible Salamanders – Cryptographic (in)Security with Attacker-Controlled Keys
  9. Office Drama on macOS
  10. Remote Timing Attacks on TPMs, AKA TPM-Fail
  11. Decade of the RATs – Custom Chinese Linux Rootkits for Everyone
  12. About Directed Fuzzing and Use-After-Free – How to Find Complex & Silent Bugs
  13. CloudLeak – DNN Model Extractions from Commercial MLaaS Platforme
  14. Routopsy – Modern Routing Protocol Vulnerability Analysis and Exploitation
  15. Uncommon Sense – Detecting Exploits with Novel Hardware Performance Counters and ML Magic
  16. Security Research on Mercedes-Benz – From Hardware to Car Control
  17. Virtually Private Networks
  18. Plundervolt – Flipping Bits from Software without Rowhammer
  19. Operation Chimera – APT Operation Targets Semiconductor Vendors
  20. A Framework for Evaluating and Patching the Human Factor in Cybersecurity
  21. NoJITsu – Locking Down JavaScript Engines
  22. Hiding Process Memory via Anti-Forensic Techniques
  23. EtherOops – Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks
  24. Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa
  25. Industrial Protocol Gateways Under Analysis
  26. When Lightning Strikes Thrice – Breaking Thunderbolt 3 Security
  27. Beyond Root – Custom Firmware for Embedded Mobile Chipsets
  28. Superman Powered by Kryptonite – Turn the Adversarial Attack into Your Defense Weapon
  29. Lamphone – Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps
  30. Emulating Samsung’s Baseband for Security Testing
  31. Hacking the Voter – Lessons from a Decade of Russian Military Operations
  32. Detecting Access Token Manipulation
  33. Escaping Virtualized Containers
  34. Ruling StarCraft Game Spitefully — Exploiting the Blind Spot of AI-Powered Game Bots
  35. Practical Defenses Against Adversarial Machine Learning
  36. Reverse Engineering the Tesla Battery Management System to increase Power Available
  37. Needing the DoH – The Ongoing Encryption and Centralization of DNS
  38. Policy Implications of Faulty Cyber Risk Models and How to Fix Them
  39. A Little Less Speculation, a Little More Action – Deep Dive into Fuchsia’s Mitigations for CPU Side
  40. Kr00k – Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices
  41. Experimenting with Real-Time Event Feeds
  42. Black-Box Laser Fault Injection on a Secure Memory
  43. Portable Document Flaws 101
  44. Breaking VSM by Attacking SecureKernel
  45. TiYunZong Exploit Chain to Remotely Root Modern Android Devices – Pwn Android Phones from 2015-2020
  46. I calc’d Calc – Exploiting Excel Online
  47. Reversing the Root – Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
  48. Breaking Brains, Solving Problems – Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros
  49. Room for Escape – Scribbling Outside the Lines of Template Security
  50. Breaking Samsung’s Root of Trust – Exploiting Samsung S10 Secure Boot
  51. IoT Skimmer – Energy Market Manipulation through High-Wattage IoT Botnets
  52. Improving Mental Models of End-to-End Encrypted Communication
  53. Exploiting Kernel Races through Taming Thread Interleaving
  54. Fooling Windows through Superfetch
  55. Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
  56. Dive into Apple IO80211FamilyV2
  57. HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges
  58. Demigod – The Art of Emulating Kernel Rootkits
  59. Spectra – Breaking Separation Between Wireless Chips
  60. Stealthily Access Your Android Phones – Bypass the Bluetooth Authentication
  61. An Unauthenticated Journey to Root – Pwning Your Company’s Enterprise Software Servers
  62. You have No Idea Who Sent that Email – 18 Attacks on Email Sender Authentication
  63. Carrying our Insecurities with Us – The Risks of Implanted Medical Devices in Secure Spaces
  64. How I Created My Clone Using AI – Next-Gen Social Engineeringg
  65. Multiple Bugs in Multi-Party Computation – Breaking Cryptocurrency’s Strongest Wallets
  66. Detecting Fake 4G Base Stations in Real Time
  67. iOS Kernel PAC, One Year Later
  68. Web Cache Entanglement – Novel Pathways to Poisoning
  69. Heroku Abuse Operations – Hunting Wolves in Sheep’s Clothing
  70. A Decade After Stuxnet’s Printer Vulnerability – Printing is Still the Stairway to Heaven
  71. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
  72. Engineering Empathy – Adapting Software Engineering Principles and Process to Security
  73. Healthscare – An Insider’s Biopsy of Healthcare Application Security
  74. Stopping Snake Oil with Smaller Healthcare Providers – Addressing Security with Actionable Plans
  75. Discovering Hidden Properties to Attack the Node.js Ecosystem
  76. Repurposing Neural Networks to Generate Synthetic Media for Information Operations
  77. The Paramedic’s Guide to Surviving Cybersecurity
  78. OTRazor – Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts
  79. Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices
  80. When TLS Hacks You
  81. The Dark Side of the Cloud – How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis
  82. Whispers Among the Stars – A Practical Look at Perpetrating Satellite Eavesdropping Attacks
  83. FASTCash and INJX_Pure – How Threat Actors Use Public Standards for Financial Fraud
  84. EdTech – The Ultimate APT
  85. Election Security – Securing America’s Future
  86. Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors’ Firmwares
  87. Hacking Public Opinion
  88. Mind Games – Using Data to Solve for the Human Element
  89. Stress Testing Democracy Election Integrity During A Global Pandemic
  90. The Devils in the Dependency Data Driven Software Composition Analysis
  91. We Went to Iowa and All We Got were These Felony Arrest Records

Huzaifa bin mudasir

Huzaifa Bin Mudassair, a seasoned Website Developer with 5 years of professional experience, adeptly merges creative vision with technical prowess to deliver dynamic and impactful online solutions. Specializing in web development, I bring a proven track record of crafting engaging and functional websites that elevate brands and user experiences. Let's collaborate to transform your digital aspirations into reality.

0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *