.s02-poster.(16x9).jpg)
Hackers of CypherCon
2020•NR•53:00
Digital forensics expert Cindy Murphy, M.Sc., will use this session to unpack the myths of digital forensics she has unc...
2020•NR•47:00
In this very informative panel, Joe Cicero examines phishing bait for enterprise protection. Subjects covered are: the r...
2020•NR•51:00
The shift to the cloud is making it more difficult for security teams to control what happens in their organizations and...
2020•NR•47:00
Bug bounties and the Vulnerability Disclosure Program (VDP) are two of the fastest-growing ways for companies to engage ...
2020•NR•23:00
This talk provides an in-depth introduction to using the user-API to automate key functions in Hashtopolis. Topics inclu...
2020•NR•46:00
Amazing new A.I.-based services from Amazon, Google, and Microsoft let organizations rely on automated technology to cra...
2020•NR•20:00
Low-skilled opportunists (script kiddies) and APT (advanced persistent threats) (funded organised crime, nation states) ...
2020•NR•52:00
Wireless pentesting typically requires physical proximity to a target, which requires time, limited resources, and const...
2020•NR•38:00
The university security club had its ups and downs between boring meetings and inaccessibility to newcomers. It improved...
2020•NR•38:00
In this talk, you will learn various tools and techniques that can be used to thoroughly analyze a malicious email attac...
2020•NR•24:00
It only takes a small oversight to cause a vulnerability, even when it comes to severe vulnerabilities. The Buffalo Tera...
2020•NR•47:00
Jim Nitterauer, Senior Security Engineer, discusses how he was able to use some F5 iRule magic on his load balancers com...
2020•NR•43:00
Meltdown/Spectre introduced a "perfect storm" scenario where the vulnerability wasn't easy to fix and the solution broke...
2020•NR•46:00
A mini-tutorial on how the various forms of "bot detection" out there work and how to modify or spoof the necessary clie...
2020•NR•45:00
Let's increase your appetite for becoming a HAM. Whether you have an SDR laying around or a handheld you have had since ...
2020•NR•24:00
What happens with disk, flash, and floppy drives when you drop them off at thrift stores or e-recycling centers? How do ...
2020•NR•25:00
Kris and Chris Silvers, creators of the OSINT CTF, share some lessons they've learned on their journey. They've run into...
2020•NR•39:00
Coinbase has become one of the leading cryptocurrency exchanges in the world. This talk describes how the systems operat...
2020•NR•22:00
In June 2018, Toys "R" Us shut its doors to the public after filing for bankruptcy. While liquidating its assets, everyt...