Ben Folland - Beacon Harvest: Conquering Cobalt Strike at Scale
Worcester DEFCON Group
Ben Folland - Beacon Harvest: Conquering Cobalt Strike at Scale
58:53
Emma Philpott, CEO of ISAME - Zero to Cyber Hero!
Worcester DEFCON Group
Emma Philpott, CEO of ISAME - Zero to Cyber Hero!
26:50
Tom - Physical Security: The hackers mindset
Worcester DEFCON Group
Tom - Physical Security: The hackers mindset
49:56
Dan Little - Attacking Active Directory 101
Worcester DEFCON Group
Dan Little - Attacking Active Directory 101
41:44
Ugi - Spicy Persistence
Worcester DEFCON Group
Ugi - Spicy Persistence
13:32
Campbell Murray - API Pentesting Demystified
Worcester DEFCON Group
Campbell Murray - API Pentesting Demystified
26:52
Chris Powell - How To Spoof 97% Of Email Accounts
Worcester DEFCON Group
Chris Powell - How To Spoof 97% Of Email Accounts
22:42
Andrew Hughes - PCB Production Today And In The Future
Worcester DEFCON Group
Andrew Hughes - PCB Production Today And In The Future
34:04
Data - Effective Phishing
Worcester DEFCON Group
Data - Effective Phishing
47:58
Toast - API Economy, For Security Professionals
Worcester DEFCON Group
Toast - API Economy, For Security Professionals
18:54
Emma Kocik - OSINT For Cyber Threat Hunting
Worcester DEFCON Group
Emma Kocik - OSINT For Cyber Threat Hunting
31:32
Andrew Blyth - IoT Forensics
Worcester DEFCON Group
Andrew Blyth - IoT Forensics
27:03
Danny Dresner - The Anthropotechnicon - In Cyber Security There Is No Such Thing As Human Error
Worcester DEFCON Group
Danny Dresner - The Anthropotechnicon - In Cyber Security There Is No Such Thing As Human Error
59:24
Joel Snape - Inside IcedID: Anatomy Of An Infostealer
Worcester DEFCON Group
Joel Snape - Inside IcedID: Anatomy Of An Infostealer
41:12
Chris Powell - Hacking The Grid With Firmware
Worcester DEFCON Group
Chris Powell - Hacking The Grid With Firmware
37:35
Rob Newby - So You Want To Be A CISO
Worcester DEFCON Group
Rob Newby - So You Want To Be A CISO
24:00
AtomicNicos - Dissecting The ENISA Baseline Recommendations For IoT Security
Worcester DEFCON Group
AtomicNicos - Dissecting The ENISA Baseline Recommendations For IoT Security
58:07
Deaths Pirate - How To Reign In The Cloud
Worcester DEFCON Group
Deaths Pirate - How To Reign In The Cloud
57:41
Stuart Peck - Diving Head First Into The Wonderful world Of OSINT And Social Engineering
Worcester DEFCON Group
Stuart Peck - Diving Head First Into The Wonderful world Of OSINT And Social Engineering
42:16
Paolo Di Prodi - Data Mining Open Samba The Pandora Box Is Opened Once Again!
Worcester DEFCON Group
Paolo Di Prodi - Data Mining Open Samba The Pandora Box Is Opened Once Again!
46:50
Campbell Murray - How To Love The Jobs You Hate
Worcester DEFCON Group
Campbell Murray - How To Love The Jobs You Hate
43:08
BeeFaauBee - Vulnerability Hunting & Responsible Disclosure
Worcester DEFCON Group
BeeFaauBee - Vulnerability Hunting & Responsible Disclosure
23:54
Nicola Whiting - Pwning Your Mind
Worcester DEFCON Group
Nicola Whiting - Pwning Your Mind
29:13
Max Kamper - Introduction To Linux Heap Exploitation
Worcester DEFCON Group
Max Kamper - Introduction To Linux Heap Exploitation
1:24:09
Andy Pannell - 50 Million Downloads And All I Got Was Malware
Worcester DEFCON Group
Andy Pannell - 50 Million Downloads And All I Got Was Malware
25:39
Toast - AI On Edge Devices
Worcester DEFCON Group
Toast - AI On Edge Devices
23:14
Ian Thornton-Trump - Black Market Data
Worcester DEFCON Group
Ian Thornton-Trump - Black Market Data
51:56