Shooting Phish in a Barrel and Other Fish Related Puns
Don’t Laugh - I Dare You!
Marketers are Friends - Not Food
Blue Team Starter Kit
Simplified SIEM Use Case Management
Bypassing 2Factor Auth with Android Trojans
Putting the Management into Vulnerability Management (or - YOU’VE GOT BEARS!!!)
Moving Target Defense - Learning from Hackers
Malfunction’s Functions : Automated Static Malware Analysis Using Function Level Signatures
We Owe You Nothing
Backdooring Git
Detecting Phishing Attacks with DNS Reconnaissance
Hacking Web Apps
Sticky Honey Pots
Top Ten is Old Skool - Meet the New Age of AppSec
Cryptography and You
Stacking the Virtual Deck: Attacks by Predicting RNGs
Homebrewing for Hackers
Stealthy and Persistent Back Door for Z- Wave Gateways
Building a Better Honeypot Network
Surveillance Using Spare Stuff
Crypto 101: An Intro to Real-World Crypto
Practical Attacks Against Multifactor
Hacking the Next Generation
The Human Interface Device Attack Vector: Research and Development
A Survey of Powershell Enabled Malware
Tool Drop: Free as in Beer
Tactical Diversion-Driven Defense
Windows 10 Defense in Depth
Latest Tools in Automotive Hacking
Ansible. And Why it Works for Me.
Learning Mainframe Hacking: Where the Hell Did All My Free Time Go?
Intercepting USB Traffic for Attack and Defense
Geeks Need Basements!
Intro to x86
Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage
Voltron: Defender of Your Inferiors
Malware is Hard. Let’s Go Shopping!
The Pentesters Framework
Hack My Derby