Working together to keep the Internet safe and secure
Licensed to Pwn: The Weaponization and Regulation of Security Research
Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars
How to Hack a Tesla Model S
Low-cost GPS simulator – GPS spoofing by SDR
Harness: Powershell Weaponization Made Easy (or at least easier)
I Will Kill You
Fun with Symboliks
Drinking from LETHE: New methods of exploiting and mitigating memory corruption vulnerabilities
One Device to Pwn Them All
ThunderStrike 2: Sith Strike
Machine vs. Machine: Inside DARPA’s Fully Automated CTF
F*ck the attribution, show us your .idb!
Angry Hacking - the next generation of binary analysis
Remote Exploitation of an Unaltered Passenger Vehicle
Hacking Electric Skateboards: Vehicle Research For Mortals
I want these * bugs off my * Internet
Security Necromancy: Further Adventures in Mainframe Hacking
Ask the EFF: The Year in Digital Civil Liberties
Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You
Canary: Keeping Your Dick Pics Safe(r)
Pivoting Without Rights – Introducing Pivoter
Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts
Let's Talk About SOAP, Baby. Let's Talk About UPNP