19:07 Broke but Breached: Secret Scanning at Scale on a Student Budget BSidesLV 53 views - 2 months ago
57:40 Human Attack Surfaces in Agentic Web: How I Learned to Stop Worrying and Love the AI Apocalypse BSidesLV 36 views - 2 months ago
25:51 Rewriting the Playbook: Smarter Vulnerability Management with EPSSv3, CVSSv4, SSVC & VEX Frameworks BSidesLV 48 views - 2 months ago
49:03 Hardening Containers with Seccomp: Hands-On Profiles, Pitfalls, and Real Exploits BSidesLV 22 views - 2 months ago
24:32 PEBKAC Rebooted: A Hacker’s Guide to People‑Patching in 90 Days BSidesLV 27 views - 2 months ago
23:08 Advancing Network Threat Detection Thru Standardized Feature Extraction & Dynamic Ensemble Learning BSidesLV 16 views - 2 months ago
33:45 The Unbearable Weight of Commercial Licensing. Combining Closed Systems with Open Source Defense BSidesLV 9 views - 2 months ago
50:47 RAG Against the Machine: Using Retrieval-Augmented Generation & MCP to Fortify Cybersecurity Defense BSidesLV 28 views - 2 months ago
52:50 Time is Running Out – Tying it All Together – What Will You Do in the Near Term? BSidesLV 9 views - 2 months ago
22:24 XSS is dead – Browser Security Features that Eliminate Bug Classes BSidesLV 21 views - 2 months ago
1:31:50 Setting the Table – WarGames 2027 & Maslow’s Hierarchy of Needs as Hybrid Warfare Nears BSidesLV 2 views - 2 months ago
48:39 eXes & Oauths They Haunt Me: In-Depth Analysis of OAuthOIDC Misconfigurations & Token Replay Attacks BSidesLV 17 views - 2 months ago
45:55 What to Tell Your Developers About NHI Secrets Security and Governance BSidesLV 12 views - 2 months ago
21:09 Keeping Our History Alive: The Hacker’s Guide to Sticker Preservation BSidesLV 5 views - 2 months ago
21:04 Boost Your Career: Get Practical InfoSec Experience in Your Community BSidesLV 4 views - 2 months ago
59:54 End of Life (EOL) Equipment should not mean End of Life (Your Life) BSidesLV 10 views - 2 months ago
31:09 Cracking Hidden Identities: Understanding the Threat Surface of Hidden Identities... BSidesLV 19 views - 2 months ago
17:59 Thwarting Key Extraction and Supply Chain attacks by Detonating GPUs BSidesLV 5 views - 2 months ago
20:43 Risk it for the Biscuit: Crunching the Numbers on Cyber Threats BSidesLV 2 views - 2 months ago
40:05 Shedding Light on Web Isolation Technologies and Their Bypass Techniques... BSidesLV 7 views - 2 months ago
38:39 Detecting, Deobfuscating, and Preventing Obfuscated Script Execution with Tree‑sitter BSidesLV 23 views - 2 months ago
20:42 Poison in the Wires: Interactive Network Visualization of Data Attacks BSidesLV 22 views - 2 months ago
30:11 Neighborhood & Household Resilience – A Month Without External Assistance BSidesLV 6 views - 2 months ago
26:09 Unawakened Wakeup: A Novel PHP Object Injection Technique to Bypass __wakeup() BSidesLV 24 views - 2 months ago
23:37 Lessons from Black Swan Events and Building Anti-Fragile Cybersecurity Systems BSidesLV 9 views - 2 months ago
37:40 Predicting the Lifespans of Internet Services: Falling down the ML Rabbit Hole, and What We Learned BSidesLV 7 views - 2 months ago
50:22 Automating Phishing Infrastructure Development Using AI Agents BSidesLV 41 views - 2 months ago
49:19 Securing AI Infrastructure: Lessons from National Cybersecurity Strategies... BSidesLV 17 views - 2 months ago
47:18 Dungeons & Dragons: The security tool you didn’t know you needed BSidesLV 13 views - 2 months ago