21:16 Self-healing K8s : Lessons Learned in Automation of IR by Ross Clarke | BSides CHS 2025 BSidesCHS 34 views - 4 months ago
46:03 Creating a Secure Web Server from 2 Vulnerable Web Servers by Parker Garrison | BSides CHS 2024 BSidesCHS 169 views - 1 year ago
52:59 BSidesCHS 2017: "Poor Usability: The Mother of Invention..." by Christopher Hudel BSidesCHS 112 views - 8 years ago
35:28 BSidesCHS 2018: "Hacking Mobile Apps with Frida" by David Coursey BSidesCHS 350 views - 7 years ago
38:08 Shattering Trust: Live Deepfakes and the Fall of Legacy Verification by Paul Vann | BSides CHS 2024 BSidesCHS 190 views - 1 year ago
22:42 BSides Berlin 2022: Tzouriel Saadoun - Learn To Be a Hacker BSides Berlin 268 views - 3 years ago
48:01 BSidesCHS 2018: "An Introduction to macOS Kernel Exploitation" by Jeffball BSidesCHS 892 views - 7 years ago
39:07 Hunting high-value targets in corporate networks - Patrick Fussell, Josh Stone BSidesLV 720 views - 9 years ago
48:02 Barry White version 100 attack paths breaking into infosec Eve Adams Adrian Crenshaw 546 views - 11 years ago