DC 18 Movie Night - GET LAMP
SIE Passive DNS and the ISC DNS Database
Cloud Computing, a Weapon of Mass Destruction?
How Unique Is Your Browser?
Token Kidnapping's Revenge
Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing
Tales from the Crypto
Exploiting WebSphere Application Server's JSP Engine
Hacking Oracle From Web Apps
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Hacking and Protecting Oracle Database Vault
Exploiting SCADA Systems
Kim Jong-il and Me: How to Build a Cyber Army to Defeat the U.S.
Cyber[Crime|War] Charting Dangerous Waters
The Power of Chinese Security
Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios
SCADA and ICS for Security Experts: How to Avoid Cyberdouchery
The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks
Cyberterrorism and the Security of the National Drinking Water Infrastructure
The Chinese Cyber Army - An Archaeological Study from 2001 to 2010
An Examination of the Adequacy of the Laws Related to Cyber Warfare
Industrial Cyber Security
Multiplayer Metasploit: Tag-Team Penetration and Information Gathering
Balancing the Pwn Trade Deficit
Powershell...omfg
Build Your Own Security Operations Center for Little or No Money
Seccubus - Analyzing vulnerability assessment data the easy way...
Toolsmithing an IDA Bridge, Case Study For Building A Reverse Engineering Tool"
You Spent All That Money And You Still Got Owned...
SHODAN for Penetration Testers