SSO Wars: The Token Menace
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
New Vulnerabilities in 5G Networks
MITRE ATT&CK: The Play at Home Edition
Controlled Chaos: The Inevitable Marriage of DevOps & Security
Cybersecurity Risk Assessment for Safety-Critical Systems
Attack Surface as a Service
All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices
DevSecOps : What, Why and How
Behind the scenes of iOS and Mac Security
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers
Attacking iPhone XS Max
How to Detect that Your Domains are Being Abused for Phishing by Using DNS