Keynote | Hacking the Cloud Like an APT

40:43
Modern Adversarial Reconnaissance – Long Live the External

32:57
What I Wish I Knew Before Pentesting AWS Environments

23:15
"APT Attack Techniques in Azure Cloud" by Lina Lau, BSides Canberra 2023

30:59
Unmasking the Iranian APT COBALT MIRAGE

54:48
Using the NIST AI Risk Management Framework // Applied AI Meetup October 2023

37:16
Keynote | Memory Safe Languages Won't Save You

30:20
Are VPNs even safe now? Hacker Explains

55:08