The Chrome Crusader
Active Directory Password Blacklisting
Anatomy of NTLMv1/NTLMv1-SSP
Fighting Fraud in the Trenches
The Effect of Constraints on the Number of Viable Permutations of Passwords
Using Lockpicking to Teach Authentication Concepts
How I Met Your Password
Abusing Password Reuse at Scale: Bcrypt and Beyond
Deploying WebAuthn at Dropbox Scale: Second Factor and Beyond
Guardians of GitHub
Ransombile, yet another reason to ditch SMS