Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
All the 4G modules Could be Hacked
Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs
No Mas – How One Side-Channel Flaw Opens Atm, Pharmacies and Government Secrets Up to Attack
A Hacker Guide To Deep-Learning Based Side Channel Attacks
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
Surveillance Detection Scout - Your Lookout on Autopilot
Breaking The Back End! It Is Not Always A Bug. Sometimes, It Is Just Bad Design!
Information Security in the Public Interest
Hacking Your Thoughts - Batman Forever meets Black Mirror
Why You Should Fear Your “mundane” Office Equipment
Tag-side attacks against NFC
Zero bugs found? Hold my Beer AFL! How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets
State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin
Confessions of an Nespresso Money Mule: Free Stuff & Triangulation Fraud
Go NULL Yourself or: How I Learned to Start Worrying While Getting Fined for Other’s Auto Infractions
Hacking WebAssembly Games with Binary Instrumentation
Exploiting Qualcomm WLAN and Modem Over The Air
HTTP Desync Attacks: Smashing into the Cell Next Door
Owning The Cloud Through Server-Side Request Forgery
The Ether Wars: Exploits, counter-exploits and honeypots on Ethereum