scrt.insomnihack
2.77K subscribers
38:27
An Uninvited House Guest: How PROXYLIB Overstayed Its Welcome On Android Devices - Lindsay Kaye
scrt.insomnihack
133 views • 3 weeks ago
47:56
Operation Triangulation: Attacks On IPhones/iPads - Marco Preuss
scrt.insomnihack
316 views • 3 weeks ago
49:36
Don’t Flatten Yourself: Restoring Malware With Control-Flow Flattening Obfuscation - Geri Revay
scrt.insomnihack
97 views • 3 weeks ago
52:24
Diving Into JumpServer: The Public Key Unlocking Your Whole Network - Oskar Zeino-Mahmalat
scrt.insomnihack
120 views • 3 weeks ago
50:45
ADDS Persistance - Burn It, Burn It All - Charlie "Shutdown" Bromberg & Volker
scrt.insomnihack
135 views • 3 weeks ago
37:20
When Malware Becomes Creative: A Survey Of Android Detection Evasion Tactics - Dimitrios Valsamaras
scrt.insomnihack
106 views • 3 weeks ago
50:44
Standing On The Shoulders Of Giant(Dog)s: A Kubernetes Attack Graph Model - Julien Terriac
scrt.insomnihack
156 views • 3 weeks ago
23:37
Abusing Misconfigured OIDC Authentication In Cloud Environments - Christophe Tafani-Dereeper
scrt.insomnihack
126 views • 3 weeks ago
38:56
Secret Web Hacking Knowledge: CTF Authors Hate These Simple Tricks - Philippe Dourassov
scrt.insomnihack
2.3K views • 3 weeks ago
1:00:13
How (Not) To Implement Secure Digital Identity:A Study Of Poland's Digital ID System - Szymon Chadam
scrt.insomnihack
208 views • 3 weeks ago
21:09
Microsoft 365's BEC-Detection Engineering Challenges And Opportunities - Eliraz Levi
scrt.insomnihack
83 views • 3 weeks ago
43:16
You Gotta Fight For Your Right To Third-Party - Mat Caplan
scrt.insomnihack
177 views • 3 weeks ago
54:46
Threats And Mitigations Landscape In The Age Of Generative AI - Andrei Kucharavy
scrt.insomnihack
175 views • 3 weeks ago
44:10
Hijacking The Java Virtual Machine And Bypassing Runtime Application Self-Protection - Mouad Kondah
scrt.insomnihack
91 views • 3 weeks ago
50:34
FuzzyAI: Attacking LLMs With Coverage-Guided Fuzzing - Eran Shimony & Mark Cherp
scrt.insomnihack
263 views • 3 weeks ago
42:32
Beating The Sanitizer: Why You Should Add MXSS To Your Toolbox - Paul Gerste & Yaniv Nizry
scrt.insomnihack
350 views • 3 weeks ago
28:59
Smart Toy Vulnerabilities Can Put Your Child At Risk Of Abuse By Strangers - Nikolay Frolov
scrt.insomnihack
41 views • 3 weeks ago
44:00
Uncommon Process Injection Pattern - Yoann Dequeker
scrt.insomnihack
115 views • 3 weeks ago
53:14
Patch Different On *OS - John McIntosh
scrt.insomnihack
71 views • 3 weeks ago
43:26
Current Affairs: IoT Security 101 - Iana Peix
scrt.insomnihack
306 views • 3 weeks ago
44:53
Living Off The Land And Attacking Operational Technology With Surgical Precision - Ric Derbyshire
scrt.insomnihack
127 views • 3 weeks ago
30:45
Your NVMe Had Been Syz'ed - Alon Zahavi
scrt.insomnihack
205 views • 3 weeks ago
51:31
Meet The Latest Innovations And Startups In Cybersecurity And How To Become A Cyber Entrepreneur?
scrt.insomnihack
39 views • 3 weeks ago
34:46
MFT: Malicious Fungible Tokens - Mauro Eldritch
scrt.insomnihack
80 views • 3 weeks ago
50:09
Enhancing AWS Security: A Holistic Approach To Organization Management - Bogdan Nicorici
scrt.insomnihack
196 views • 3 weeks ago
52:20
The Accessibility Abyss: Navigating Android Malware Waters - Axelle Apvrille
scrt.insomnihack
133 views • 3 weeks ago
1:07:50
It’s Time For (R)evolution - Charl Van Der Walt
scrt.insomnihack
314 views • 3 weeks ago
41:02
Why So Optimized? - Ege Balci
scrt.insomnihack
479 views • 3 weeks ago
43:02
Open Sésame! Example Of Modern Electronic Lockpicking by Thomas Bygodt
scrt.insomnihack
159 views • 3 months ago
54:40
Pentesting By The Numbers: What Data Analysis Tells About What We Do by Charl Van Der Walt
scrt.insomnihack
487 views • 1 year ago
Load More