Pigs Don’t Fly – Why owning a typical network is so easy, and how to build a secure one.
Finding The Signal in the Noise: Quantifying Advanced Malware
Applying the 32 Zombieland Rules to IT Security
Windows 0wn3d By Default
Android 4.0: Ice Cream “Sudo Make Me a” Sandwich
Hiding @ Depth – Exploring & Subverting NAND Flash memory
Attacking the Next Generation Air Traffic Control System; Hackers, liquor and commercial airliners.
Antivirus Evasion through Antigenic Variation (Why the Blacklisting Approach to AV is Broken)
Hello ASM World: A Painless and Contextual Introduction to x86 Assembly
SQL injection with sqlmap
The Internet of Things: Vulns, Botnets and Detection
The Malware Management Framework, a process you can use to find advanced malware. We found WinNTI with it!
Hack the Hustle!
Emergent Vulnerabilities: What ant colonies, schools of fish, and security have in common.
Operationalizing Security Intelligence in the Enterprise
New Shiny in the Metasploit Framework
Everything you ever wanted to know on how to start a Credit Union, but were afraid to ask.
A developer’s guide to pentesting
Steal All of the Databases.
After SS7 its LTE
Sandboxes from a pen tester’s view
iOS.reverse #=> iPwn Apps
Terminal Cornucopia
Wait; How is All This Stuff Free?!?