The XE Files: Trust No Router - James Atack

49:40
🇫🇷 The Red and the Blue: a tale of stealth and detection - Elias ISSA - shadow_gatt

27:48
🇫🇷 Hacking Satellites: From SDR to RCE - Salim LARGO - 2ourc3

5:58
#2 [Korean Lawyer] Can NewJeans Truly Become Independent from HYBE? What Lies Ahead?

52:07
🇫🇷 Trouver sa place dans l’infosec - Charlie BROMBERG - Shutdown

59:18
Fingerprinting at the Frontier: How Edge Cases and Ambiguities can help Digital Attribution 🇬🇧

51:06
Philip Young VSC 2024 Keynote 10 Years of Mainframe Hacking

56:19
🇫🇷 Clés incopiables : contournements, exceptions et paradoxes - MrJack / vidoQ

45:09