Similar Tracks
#HITB2024BKK #COMMSEC D1: Flash Loans: The Blessing or Curse of DeFi
Hack In The Box Security Conference
#HITB2024BKK #COMMSEC D1: CoralRaider Targets Victims Data and Social Media Accounts
Hack In The Box Security Conference
#HITB2024BKK #COMMSEC D2: Leveraging LLMs to Enhance Insider Threat Investigation Capabilities
Hack In The Box Security Conference
#HITB2024BKK #COMMSEC D1: How a Combination of Bugs in KakaoTalk Compromises User Privacy
Hack In The Box Security Conference
#HITB2024BKK #COMMSEC D2: Detecting Botnets via DNS Traffic Analysis Using Machine Learning
Hack In The Box Security Conference
#HITB2024BKK D2 - Exposing Critical Threats in Millions of Connected Devices
Hack In The Box Security Conference
Fake It ‘til We Make It: The Art of Windows User Space Emulation - Maurice Heumann | #NN12ED
Navaja Negra Conference
#HITB2024BKK D1 - Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization
Hack In The Box Security Conference
#HITB2024BKK #COMMSEC D2: Breaking Fake Voice Detection with Speaker-Irrelative Features
Hack In The Box Security Conference
#HITB2024BKK D2 - Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles
Hack In The Box Security Conference
#HITB2024BKK D1 Revealing Microphone Nonlinear Behavior and Building an Ultrasonic Jammer
Hack In The Box Security Conference