Detailed program coming soon
How do you trust your open source software?
Stake at the heart : Destroying common security wisdom
Microsoft Defender for Office 365 Evasion – The Story of Confirmed Vulnerability
Adventures in the Underland: Uncommon Hacker’s Persistence Methods and Countermeasures
Hacking Serverless Applications: A Treasure Map for Uncharted Waters
The Modern CISO and the Culture Map: Challenges of Building a Strong Cybersecurity Culture in Global Organizations
How to have visibility and security OF CICD ecosystem
Dig deeper into OWASP Kubernetes
LATMA – Lateral movement analyzer
From On-Premises to Cloud: A Comprehensive Analysis of SAP Security Issues
Hey You! Get Off my Satellite!
A journey into Medical Device Security Research
Save The Environment (Variable): Hijacking Legitimate Applications with a Minimal Footprint
A Tale of Credential Leak of a Popular Cloud Threat Actor
A Deep Dive into Browser Security: Uncovering Security Bugs in Mobile Browsers