Data Obfuscation: How to hide data and payloads to make them "not exist" (in a mathematically optimal way)
Top 10 2015-2016 compromise patterns observed & how to use non-traditional Internet datasets to detect & avoid them
+1,000,000 -0: Cloning a Game Using Game Hacking and Terabytes of Data
To Catch a Penetration Tester: Top SIEM Use Cases
No Easy Breach: Challenges and Lessons from an Epic Investigation
Hacking Lync (or, 'The Weakest Lync')
AWShit. Pay-as-you-go Mobile Penetration Testing
Tool Drop 2.0 - Free As In Pizza
The Art of War, Attacking the Organization and Raising the Defense
Managed to Mangled: Exploitation of Enterprise Network Management Systems
Garbage in, garbage out: generating useful log data in complex environments
Fuzzing basics...how to break software
Hacking for Homeschoolers: STEM projects for under $20
Need More Sleep? REST Could Help
Body Hacking 101 (or a Healthy Lifestyle for Security Pros)
Hack Yourself: Building A Pentesting Lab
The Advanced Persistent Pentester (All Your Networks Are Belong 2 Us)
Hardware Hacking the Easyware Way
Finding a Weak Link: Attacking Windows OEM Kernel Drivers