Similar Tracks
#HITB2024BKK #COMMSEC D1: Design and Development of a Multi-Tenant SIEM Using Security Onion
Hack In The Box Security Conference
Adversary in the Middle (AitM): Post-Exploitation w/ Michael Allen #livestream #infosec #redteam
Black Hills Information Security
#HITB2024BKK #COMMSEC D1: CoralRaider Targets Victims Data and Social Media Accounts
Hack In The Box Security Conference
#HITB2024BKK #COMMSEC D1: Flash Loans: The Blessing or Curse of DeFi
Hack In The Box Security Conference
#HITB2024BKK D2 - Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
Hack In The Box Security Conference
#HITB2024BKK D1 Revealing Microphone Nonlinear Behavior and Building an Ultrasonic Jammer
Hack In The Box Security Conference
DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner
DEFCONConference
#HITB2024BKK #COMMSEC D2: Exploring Vulnerabilities in Flutter Mobile Apps
Hack In The Box Security Conference
#HITB2024BKK #COMMSEC D2: Detecting Botnets via DNS Traffic Analysis Using Machine Learning
Hack In The Box Security Conference
#HITB2024BKK #COMMSEC D2: Breaking Fake Voice Detection with Speaker-Irrelative Features
Hack In The Box Security Conference
#HITB2024BKK D2 - Exposing Critical Threats in Millions of Connected Devices
Hack In The Box Security Conference
#HITB2024BKK D1 - Secret Scanning in Open Source at Scale (in-depth)
Hack In The Box Security Conference
#HITB2024BKK #COMMSEC D2: Leveraging LLMs to Enhance Insider Threat Investigation Capabilities
Hack In The Box Security Conference
KCD Denmark 2024: KubeCapture: Audience Driven Capture the Flag Session - Jonas Felix
Cloud Native Nordics