Biometric Authentication Under Threat: Liveness Detection Hacking
The Most Secure Browser? Pwning Chrome from 2016 to 2019
Behind the Scenes of Intel Security and Manageability Engine
Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs
The Cyber Shell Game – War, Information Warfare, and the Darkening Web
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More
GDPArrrrr: Using Privacy Laws to Steal Identities
The Enemy Within: Modern Supply Chain Attacks
Ghidra - Journey from Classified NSA Tool to Open Source
Preventing Authentication Bypass: A Tale of Two Researchers
Everybody be Cool, This is a Robbery!
Command Injection in F5 iRules