this post was submitted on 11 Oct 2023
2 points (75.0% liked)

Security CPE

369 readers
1 users here now

Video and audio media that count towards your CPE (Continuing Professional Education) requirements for GIAC, CISSP, CISM, CRISC, CCSP, CompTIA certs.

Mostly conference talks and podcasts.

FAQ

founded 2 years ago
MODERATORS
 

TROOPERS23 - 35 talks

(WINDOWS) HELLO FROM THE OTHER SIDE Dirk-jan Mollema

ALL YOUR PARCEL ARE BELONG TO US Dennis Kniel

ATTACKING ULTRA-WIDEBAND: SECURITY ANALYSIS OF UWB APPLICATIONS IN SMARTPHONES Jiska Classen Alexander Heinrich

BEYOND JAVA: OBFUSCATING ANDROID APPS WITH PURELY NATIVE CODE Laurie Kirk

CAT & MOUSE - OR CHESS? Fabian Mosch

DAS IT-SECURITY-LAGEBILD AUS HEISE-SICHT Jürgen Schmidt aka ju

DETECTION AND BLOCKING WITH BPF VIA YAML Kev Sheldrake

DUMPING NTHASHES FROM AZURE AD Nestori Syynimaa

EVERYONE KNOWS SAP, EVERYONE USES SAP, EVERYONE USES RFC, NO ONE KNOWS RFC: FROM RFC TO RCE 16 YEARS LATER Fabian Hagg

FACT BASED POST EXPLOITATION - OFFICE365 EDITION Melvin Langvik

FAULT INJECTION ATTACKS ON SECURE AUTOMOTIVE BOOTLOADERS Nils Weiss Enrico Pozzobon

FORENSIC EXAMINATION OF CEPH Florian Bausch

FORENSIC ANALYSIS ON REAL INCIDENTS INSIDE MICROSOFT REMOTE DESKTOP SERVICES Catarina de Faria Cristas

GPT-LIKE PRE-TRAINING ON UNLABELED SYSTEM LOGS FOR MALWARE DETECTION Dmitrijs Trizna Luca Demetrio

HIDDEN PATHWAYS: EXPLORING THE ANATOMY OF ACL-BASED ACTIVE DIRECTORY ATTACKS AND BUILDING STRONG DEFENSES Jonas Bülow Knudsen Alexander Schmitt

HOMOPHONIC COLLISIONS: HOLD ME CLOSER TONY DANZA Justin Ibarra Reagan Short

HORROR STORIES FROM THE AUTOMOTIVE INDUSTRY Thomas Sermpinis

INTERNAL SERVER ERROR: EXPLOITING INTER-PROCESS COMMUNICATION IN SAP’S HTTP SERVER Martin Doyhenard

JUPYSEC: AUDITING JUPYTER TO IMPROVE AI SECURITY Joe Lucas

MONITORING SOLUTIONS: ATTACKING IT INFRASTRUCTURE AT ITS CORE Stefan Schiller

OAUTH AND PROOF OF POSSESSION - THE LONG WAY ROUND Dominick Baier

OOPSSEC - THE BAD, THE WORST AND THE UGLY OF APT’S OPERATIONS SECURITY Tomer Bar

PRIORITY FOR EFFECTIVE ACTION - A PRACTICAL MODEL FOR QUANTIFYING THE RISK OF ACTIVE DIRECTORY ATTACKS Mars Cheng Dexter Chen

REAL WORLD DETECTION ENGINEERING IN A MULTI-CLOUD ENVIRONMENT Aaron Jewitt

REPORTLY - KEEP YOUR HEAD IN THE CLOUDS. A NEW AZURE VISUALIZATION TOOL FOR ANALYZING USER ACTIVITIES. Sapir Federovsky

SAP (ANTI-)FORENSICS: DETECTING WHITE-COLLAR CYBER-CRIME Yvan Genuer

SECURITY HEROES VERSUS THE POWER OF PRIVACY Avi D Kim Wuyts

SO YOU PERFORMED A FOREST RECOVERY. HOW DO YOU RECONNECT YOUR AD AGAIN WITH AZURE AD? Jorge de Almeida Pinto

SPOOKY AUTHENTICATION AT A DISTANCE Tamas Jos

STAY FIT: HACK A JUMP ROPE Axelle Apvrille

TESTING AND FUZZING THE KUBERNETES ADMISSION CONFIGURATION Benjamin Koltermann Maximilian Rademacher

THE ANATOMY OF WINDOWS TELEMETRY PART 2 Tillmann Oßwald Dominik Phillips Maximilian Winkler

THE POWER OF COERCION TECHNIQUES IN WINDOWS ENVIRONMENTS Martin Grottenthaler

THE WIRE ON FIRE: THE SPIES WHO LOVED TELCOS Aleksandar Milenkoski

VULNERABILITIES IN THE TPM 2.0 REFERENCE IMPLEMENTATION CODE Francisco Falcon

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here