Cybersecurity | Cloud | DevelopmentDEF CON 30 – Kenneth Geers – Computer Hacks in the Russia-Ukraine War January 31, 2025 video CONconference speakersDC30DEFDEF CONDEF CON 30DEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferencesecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentDEF CON 31 – Azure B2C 0Day – An Exploit Chain from Public Keys to Microsoft Bug Bounty – John Novak January 5, 2025 video CONconference speakersDEFDEF CONDEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferencesecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentDEF CON 25 – James Langevin, Will Hurd – DC to DEF CON Q&A November 11, 2024 video computer securityconference speakersDC to DEF CONDc-25DC25DEF CONDEF CON 25DEFCONhackhackershackingI am the CavalryJames Langevinq&asecurity conferenceWill Hurd
Cybersecurity | Cloud | DevelopmentDEF CON 29 – Sagi Sheinfeld, Eyal Karni, Yaron Zinar – Using M(achine)ITM to Attack Active Directory September 16, 2024 video Active DirectoryCONconference speakersDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONEyal karnihacker conferencehackershackinghacking videosinformation securityinformation security conferenceMITMsagi sheinfeldsecurity conferencesecurity researchYaron Zinar
Cybersecurity | Cloud | DevelopmentHackers Find Missing People For Fun July 29, 2024 video AmazingBSidescold casescomputer forensicscrimeCrowdsourcingDEFCONdigital footprintdigital footprintsdiy internetdiy ispdocumentaryfree thinkfreethinkfreethink codedfreethink diy sciencefreethink mediafreethink superhumanhackerhacker conferencehackersinnovationinspiringmissing peoplemissing personsmissing persons casesOpen Source IntelligenceOSINTRob Sellsciencesearch and rescuetechtrace labtrace labstracelabstrue crime
Cybersecurity | Cloud | DevelopmentDEF CON 29 Cloud Village – Michael Raggo – Identifying Toxic Combinations of Permissions June 18, 2024 video Cloud VillageCONconference speakersDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferenceMichael Raggosecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentDEF CON 29 Cloud Village – Igal Flegmann – I know who has access to my cloud, do you June 6, 2024 video Cloud VillageCONconference speakersDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONhacker conferencehackershackinghacking videosIgal Flegmanninformation securityinformation security conferencesecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentOWASP AppSecUSA 2011 Why do developers make these dangerous software errors May 18, 2024 video AlliterationApplicationsArchitecturearmAssemblyBinariesblackblackhatBusinesscentosComputercomputingdebianDEFCONengineeringenvironmentExploitsfirewallshackerhackingintroductioniphoneLinuxmodemsnetworknetworkingredhatreverseRootkitsroutersschooconSecuritysoftwareswitchesTrustedvistaWindowsxp
Cybersecurity | Cloud | DevelopmentDEF CON 29 Adversary Village – Sergey Chubarov – From OnPrem to the Cloud: Hybrid AD Attack Path April 29, 2024 video AdversaryAdversary Villageazure adCONconference speakersDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferencesecurity conferencesecurity researchSergey Chubarov
Cybersecurity | Cloud | DevelopmentDEF CON 31 – Private Keys in Public Places – Tom Pohl January 23, 2024 video CONconference speakersDEFDEF CONDEF CON 31DEFCONencryptionhacker conferencehackershackinghacking videosinformation securityinformation security conferencesecurity conferencesecurity researchTom Pohl