Incoming Threats At the Speed of Retail
Browser and Environment Hardening
Complete Application Ownage via Multi-POST XSRF
Breaking Access Controls with BLEKey
Drug Pump and Medical Device Security
Hijacking Arbitrary .NET Application Control Flow
Effective Ways to Tackle Vulnerability Remediation
Breaking and Fixing Python Applications
Learning To Love Your Attackers