Command-Line Obfuscation: You can run, _and_ you can hide - Wietze Beukema
25:23
How Attackers Can Use KMS to Ransomware S3 Buckets - Bleon Proko
39:04
Hacking the Hackers: Analysis of a Cobalt Strike Remote Command Execution Vulnerability - Rio Sherri
41:25
Command-Line Obfuscation: You Can Run, _and_ You Can Hide - Wietze Beukema
29:46
From Feeding to Learning: Uncovering Hidden Dangers in Smart Devices for Pets and Kids - Roland Sako
29:44
Hexagonal Architecture - Rafal Zowal - December 2024
18:51
OSINT in Cyber Security & Intelligence Communities - Korab Keqekolla
39:40
The Dark Side of Wireless Networks: Intro to Wi-Fi Hacking - Megi Bashi - Ryan Dinnan
37:00