Execution Guardrails & Environmental Keying (Defence Evasion)
6:58
Abusing Screensavers (Persistence)
42:46
How the Best Hackers Learn Their Craft
12:06
Level-up your host-based monitoring with Sysmon
1:14:37
Beginner's Guide to the Bash Terminal
12:53
Demystifying the quantum crypto threat
19:26
¿Cómo funcionaba la Máquina Enigma?
9:28
Can snapshots really save your data from ransomware?
38:59