Bestsellers in the Underground Economy - Measuring Malware Popularity by Forum
Examining DES-based Cipher Suite Support within the TLS Ecosystem
Satellite Vulnerabilities 101
Analyzing user decision making on phishing sites - using mouse data and keyboard dynamics
Broken Arrow: applying InfoSec and Forensic practices to escape domestic abuse
The Human API: Evolving End Users From Authorized Adversaries Into Our Best Defense.
Burpsuite Team Server - Collaborative Web Pwnage
The Resilient Hacker: Growth Mindset, Health Hacks & Powerful Help to Navigate Personal Challenges
So you think you can CHMOD
Building the badge- How you can make small, cheap and custom hardware for function or fashion
Salesforce Data Governance What dark secrets lurk in your instance??
Making your website vulnerable for fun and security awareness
Human Honeypots or: How I Learned to Stop Worrying and Love the Implant
The struggles of teaching automation
The SOC Counter ATT&CK
The drunk colonel and the flipped stone: Game Theory for a Defensive Strategic Advantage
I’m a hunter! But what does that mean?
Breaking the Bodyguards
Cover Your A**
Cyber Deception after Detection: Safe observation environment using Software Defined Networking
Deepfakes, Deep Trouble: Addressing Potential Market Manipulation Caused by Deepfakes
Baited Canaries - Monitoring attackers with active beacons
Securing Fast (and Furious) DevOps pipelines
Please inject me, a x64 code injection