Hacking the Hackers: Analysis of a Cobalt Strike Remote Command Execution Vulnerability - Rio Sherri
39:40
The Dark Side of Wireless Networks: Intro to Wi-Fi Hacking - Megi Bashi - Ryan Dinnan
20:44
Privacy and Risk-based Authentication - Gresa Mjeku
52:58
Command-Line Obfuscation: You can run, _and_ you can hide - Wietze Beukema
21:42
Tools for Continuous Semantic Integration (CSI)
38:24
KCD Denmark 2024: KubeCapture: Audience Driven Capture the Flag Session - Jonas Felix
1:05:25
Misconceptions of physical security - Brian Harris
37:00
Malware, Cats and Cryptography - Zhassulan Zhussupov
18:51