The Linux Kernel Hidden Inside Windows 10
$hell on Earth: From Browser to System Compromise
Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools
Does Dropping USB Drives in Parking Lots and Other Places Really Work?
Access Keys Will Kill You Before You Kill the Password
Unleash the Infection Monkey: A Modern Alternative to Pen-Tests
BadTunnel: How Do I Get Big Brother Power?
TCP Injection Attacks in the Wild - A Large Scale Study
Investigating DDOS - Architecture Actors and Attribution
When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement
Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions
When Governments Attack: State Sponsored Malware Attacks Against Activists Lawyers and Journalists
Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network