CANtact: Open Source Automotive Tools
How to build a malware classifier [that doesn’t suck on real-world data]
Securing Network Communications: An Investigation into Certificate Authorities on Mobile
WiFi Exploitation: How passive interception leads to active exploitation
Making sense of a million samples per day: Behavior-based Methods for Automated, Scalable Malware Analysis
The State of SCADA on the Internet
Practical Static Analysis for Continuous Application Security
Jihadism and Cryptography, from internet to softwares
[Ab]using TLS for defensive wins
EventID Field Hunter (EFH) – Looking for malicious activities in your Windows events
Crash Course in Kubernetes & Security
Hack Microsoft by using Microsoft signed binaries
Utilizing Memory and Network Forensics for Scalable Threat Detection and Response
Control system security, are we living on luck?
How To Secure Serverless Applications
AirBnBeware: short-term rentals, long-term pwnage
RTF Abuse: Exploitation, Evasion and Counter Measures
Purple Teaming the Cyber Kill Chain: Practical Exercises for Management
Open Source Malware Lab
Hiding in Plain Sight – Taking Control of Windows Patches
Lessons Learned Hunting IoT Malware