28:03 [CB25]BOOTKITTY: Multi-OS Trust Chain compromise from Bootkit to Rootkit CODE BLUE 80 views - 3 weeks ago
31:12 [CB25]Bypassing Anti-Debugging: A Hybrid Real-Simulated Approach to Rootkit Analysis CODE BLUE 35 views - 3 weeks ago
42:25 [CB25]YAMAGoya: Open Source Threat Hunting Tool using YARA and SIGMA CODE BLUE 57 views - 3 weeks ago
36:08 [CB25]Introduction to CICDGuard - Orchestrating visibility and security of CICD ecosystem CODE BLUE 12 views - 3 weeks ago
37:56 [CB25]Build Your Own Pivoting Lab: A Starting Point for Internal Network Exploration CODE BLUE 26 views - 3 weeks ago
42:51 [CB25]State Sponsored “Cyber Warriors” — North Korean Remote IT Workers CODE BLUE 91 views - 3 weeks ago
42:08 [CB25]The CCEL and the Thin Line Between Cyber Defence and Pre-emption… CODE BLUE 15 views - 3 weeks ago
37:54 [CB25]Invitation Is All You Need! Invoking Gemini for Workspace Agents with a Google Calendar Invite CODE BLUE 34 views - 3 weeks ago
40:54 [CB25]Cloud-Wide Contamination: Chaining SSRFs for Tenant Compromise in Azure (CVE-2025-29972) CODE BLUE 20 views - 3 weeks ago
40:55 [CB25]The Deepfake Supply Chain: Weaponizing Synthetic Media into Modern Cybercrime Operation CODE BLUE 33 views - 3 weeks ago
31:53 [CB25]Dissecting FINALDRAFT: Actionable Intel from a State-Sponsored Multi-Platform Backdoor CODE BLUE 18 views - 3 weeks ago
1:01:48 [CB25]Panel Discussion:The Present and Future of AI and Security CODE BLUE 39 views - 3 weeks ago
40:17 [CB25]PerfektBlue: Universal 1-click Exploit to Pwn Automotive Industry… CODE BLUE 77 views - 3 weeks ago
37:38 [CB25]How to Hack Any Micro-controller with a Raspberry Pi Pico… CODE BLUE 411 views - 3 weeks ago
44:09 [CB25]Breaking the Sound Barrier: Exploiting CoreAudio via Mach Message Fuzzing CODE BLUE 30 views - 3 weeks ago
38:52 [CB25]Cache the Frames, Catch the Vulnerabilities in Kernel Streaming CODE BLUE 30 views - 3 weeks ago
38:23 [CB25]Don't judge an audiobook by its cover: taking over your Amazon account with a Kindle CODE BLUE 50 views - 3 weeks ago
47:20 [CB25]Practical Automation of Penetration Testing with Agentic AI CODE BLUE 128 views - 3 weeks ago
35:56 [CB25]Dancing with Exynos Coprocessor: Pwning Samsung for fun and “profit” CODE BLUE 26 views - 3 weeks ago
32:55 [CB25]AI Accelerated Exploiting: Compromising MTE Enabled Pixel from DSP Coprocessor CODE BLUE 47 views - 3 weeks ago
41:22 [CB25]Keynote:Bend the Machine: The Hacker Path to Autonomy in the Real World CODE BLUE 116 views - 3 weeks ago
38:31 [CB24]Proxying to Kernel:Streaming vulnerabilities from Windows Kernel CODE BLUE 243 views - 10 months ago
38:34 [CB24]Hacking Google - Lessons learned running and growing an internal red team CODE BLUE 216 views - 10 months ago
43:09 [CB24]BullyRAG:A Multi-Perspective RAG Robustness Evaluation Framework CODE BLUE 77 views - 10 months ago
27:23 [CB24]NTLMv1 reversion to NTLM with hashcat and the NTLMv1-multi tool CODE BLUE 98 views - 10 months ago
22:09 [CB24]SBOM and Security Transparency - How it all fits together CODE BLUE 100 views - 10 months ago
35:55 [CB24]Behind Enemy Lines:Engaging and Disrupting Ransomware Web Panels CODE BLUE 115 views - 10 months ago
30:18 [CB24]V for Vendetta:Dissecting a Global Phishing Platform After Being Phished CODE BLUE 71 views - 10 months ago
27:29 [CB24]NGate:Novel Android malware for unauthorized ATM withdrawals via NFC relay CODE BLUE 217 views - 10 months ago
41:25 [CB24]From Snowflake to Snowstorm:Navigating Breaches and Detections CODE BLUE 91 views - 10 months ago
33:42 [CB24]1-Click-Fuzz:Systematically Fuzzing the Windows Kernel Driver with Symbolic Execution. CODE BLUE 645 views - 10 months ago
42:45 [CB24]WebAssembly Is All You Need:Exploiting Chrome and the V8 Sandbox 10+ times with WASM CODE BLUE 1.8K views - 10 months ago
1:05:47 [CB23]International Panel Discussion on 'A Comprehensive Study of Active Cyber Defence' CODE BLUE 238 views - 2 years ago
37:48 [CB23]stelftools: cross-architecture static library detector for IoT malware CODE BLUE 112 views - 2 years ago
35:18 [CB23]Deep-Kernel Treasure Hunt: Finding exploitable structures in the Linux kernel CODE BLUE 428 views - 2 years ago
40:32 [CB23]Power Automate C2: Stealth Living-Off-the-Cloud C2 Framework CODE BLUE 120 views - 2 years ago
27:07 [CB23]Pwning Electron Application : Analysis and Defense of Vulnerabilities in Electron Applications CODE BLUE 151 views - 2 years ago
38:05 [CB23]"filename" in Content-Disposition is a landmine - vulnerability caused by ambiguous requiremen CODE BLUE 189 views - 2 years ago
40:09 [CB23]Digital sovereignty - shaping regulatory responses to technological dominance CODE BLUE 46 views - 2 years ago