How to influence security technology in kiwi underpants
Panel Discussion - At a Glance: Information Security
IRS, HR, Microsoft and your Grandma: What they all have in common
I Can Be Apple, and So Can You
Invoke-EmpireHound - Merging BloodHound & Empire for Enhanced Red Team Workflow
The History of the Future of Cyber-Education
Red Teaming gaps and musings
A Process is No One: Hunting for Token Manipulation
#LOLBins - Nothing to LOL about!
From Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It
When Macs Come Under ATT&CK
State of Win32k Security: Revisiting Insecure design
Fuzz your smartphone from 4G base station side
Clippy for the Dark Web: Looks Like You’re Trying to Buy Some Dank Kush, Can I Help You With That?
Everything Else I Learned About Security I Learned From Hip-Hop
Abusing IoT Medical Devices For Your Precious Health Records
Offensive Browser Extension Development
Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework
Escoteric Hashcat Attacks
Hackers, Hugs, & Drugs: Mental Health in Infosec
The Unintended Risks of Trusting Active Directory
Detecting WMI exploitation
Protect Your Payloads: Modern Keying Techniques
NOOb OSINT in 30 Minutes or less!
RFID Luggage Tags, IATA vs Real Life
Android App Penetration Testing 101
Lessons Learned by the WordPress Security Team
Jump Into IOT Hacking with the Damn Vulnerable Habit Helper Device
#LOL They Placed Their DMZ in the Cloud: Easy Pwnage or Disruptive Protection
Maintaining post-exploitation opsec in a world with EDR
Draw a Bigger Circle: InfoSec Evolves
Instant Response: Making IR faster than you thought possible!
In-Memory Persistence: Terminate & Stay Resident Redux
Hey! I found a vulnerability – now what?
Foxtrot C2: A Journey of Payload Delivery