Ichthyology: Phishing as a Science
New Adventures in Spying 3G and 4G Users: Locate Track & Monitor
The Active Directory Botnet
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
Protecting Pentests: Recommendations for Performing More Secure Tests
Bot vs. Bot for Evading Machine Learning Malware Detection
'Ghost Telephonist' Link Hijack Exploitations in 4G LTE CS Fallback
Why Most Cyber Security Training Fails and What We Can Do About it
Cyber Wargaming: Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization
Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices)
Lies and Damn Lies: Getting Past the Hype of Endpoint Security Solutions
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!