Mac-ing Sense of the 3CX Supply Chain Attack: Analysis of the macOS Payloads
20:24
What Everyone Missed About The Linux Hack
34:50
Breaking the Chain: An Attacker's Perspective on Supply Chain Vulnerabilities and Flaws
17:39
I used a MAC for 30 days, and I’m glad it’s over
10:39
3CX: How this malware almost hacked every business
50:07
Shielding Your Network Devices: Proven Strategies to Defend Against Advanced Attacks
42:54
Becoming a Dark Knight: Adversary Emulation Demonstration for ATT&CK Evaluations
39:37
Come to the Dark Side, We Have Apples: Turning macOS Management Evil
49:41