The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders
![](https://i.ytimg.com/vi/mJ6BQ5eFkG4/mqdefault.jpg)
40:18
Three New Attacks Against JSON Web Tokens
![](https://i.ytimg.com/vi/hXT5J7tfWy0/mqdefault.jpg)
1:00
Business Email Compromise (BEC): Animated | 3 Tips
![](https://i.ytimg.com/vi/PdOP1IchX6Y/mqdefault.jpg)
40:27
Something Rotten in the State of Data Centers
![](https://i.ytimg.com/vi/opW_Q7jvSbc/mqdefault.jpg)
40:33
Weaponizing Plain Text: ANSI Escape Sequences as a Forensic Nightmare
![](https://i.ytimg.com/vi/b5-oTMcBJQ0/mqdefault.jpg)
58:05
Make Malware Analysis FASTER with Binary Emulation
![](https://i.ytimg.com/vi/hlZk0rzdhuo/mqdefault.jpg)
33:41
Day 3 Class #6 - 3C Session 5 - Pycon APAC 2024
![](https://i.ytimg.com/vi/YP2XNAbB_Nw/mqdefault.jpg)
26:02
Evading Logging in the Cloud: Bypassing AWS CloudTrail
![](https://i.ytimg.com/vi/9dNv9tH0dkU/mqdefault.jpg)
32:20