Is Your Approach To Pipeline Security Flawed? Rethinking CI/CD Security - Patricia R
33:51
BYOTB: Bring Your Own Trusted Binary - David Kennedy
45:29
The Practical Application Of Indirect Prompt Injection Attacks - David Willis-Owen
44:15
An Introduction To Fault- Injection For Exploiting Bug-Free Code In Embedded Systems - @barsteward
40:22
The Past, Present And Future Of Cloud-Native Security - Emma Yuan Fang
45:31
How To Attack A SIEM - Daniel Crossley
31:50
Elevate Your SSRF Game: Weaponize Internal DNS Records To Expose Hidden Endpoints - Guy Arazi
39:22
Inside The Ransomware Toolbox: How To Beat Cybercriminals At Their Own Game - Will Thomas
24:58