Mac-ing Sense of the 3CX Supply Chain Attack: Analysis of the macOS Payloads Share: Download MP3 Similar Tracks Becoming a Dark Knight: Adversary Emulation Demonstration for ATT&CK Evaluations Black Hat Breaking the Chain: An Attacker's Perspective on Supply Chain Vulnerabilities and Flaws Black Hat Come to the Dark Side, We Have Apples: Turning macOS Management Evil Black Hat Three New Attacks Against JSON Web Tokens Black Hat On-demand Webinar: Phish kit teardown – how phishing kits evade detection Push Security Understanding Active Directory and Group Policy Kevin Brown CompTIA Network+ Certification Video Course PowerCert Animated Videos Debug7: Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs Black Hat Inside the Apple T2 Black Hat Linked-Out: Security Principles to Break Software Supply Chain Attacks RSA Conference The Final Chapter: Unlimited ways to bypass your macOS privacy mechanisms Black Hat The Basics of Computing Security: Linux & SQL | Google Cybersecurity Certificate Google Career Certificates Privacy Detective: Sniffing Out Your Data Leaks for Android Black Hat HTTPS, SSL, TLS & Certificate Authority Explained Laith Academy Project Zero: Ten Years of 'Make 0-Day Hard' Black Hat What is HTTP? How the Internet Works! #1 FollowAndrew LinkDoor: A Hidden Attack Surface in the Android Netlink Kernel Modules Black Hat 3 Levels of WiFi Hacking NetworkChuck [BSL2024] When Malware Becomes Creative - Dimitrios Valsamaras and José Leitão BSides Lisbon The Hacker that Broke North Korea's Internet Slidebean