20:04
Reserving The Right To Be Wrong by James Bore
181 views • 1 year ago
21:29
Git Those Passwords Out Of Your Repos! by Dan Oates-Lee
46 views • 1 year ago
19:56
Identifying Rogue Android Devices: The World Of Android Attestation by James Stevenson
63 views • 1 year ago
23:22
AI And Pentesting by Dan Canon
66 views • 1 year ago
51:55
Attacking And Defending On-Premises And Cloud-Based Kubernetes Services by Sadi Zane
91 views • 1 year ago
26:02
All Your Firmwares Are Belong To Us: A Guide To Successful Acquisition by Stephen
51 views • 1 year ago
24:40
Reimagining The Intelligence Deliverables Using Structured Threat Content by Gert-Jan Bruggink
25 views • 1 year ago
50:15
Are Politically Motivated Cyberattacks A Threat To Democracy? by Imran Saleem
42 views • 1 year ago
15:45
Using Machine Learning To Detect Phishing Emails by Anthony Saich
439 views • 1 year ago
31:15
Encrypted Client Hello: What Does This Mean, Looking At TLS Connections? by Paul Brears
354 views • 1 year ago
28:45
A Potted History Of British SIGINT by David Abrutat
147 views • 1 year ago
19:15
Closing Remarks by BSides Cheltenham Organizers
29 views • 1 year ago
26:48
From Sales To Social Engineering by James Mason
135 views • 1 year ago
40:17
A Threat A Threat Analysis Of 0ktapus SMS Phishing Campaigns by Will Thomas
1.4K views • 1 year ago
8:32
Welcome And Announcements by BSides Cheltenham Orga
41 views • 1 year ago
43:20
Wargames 2023 by Andrew Peck
82 views • 1 year ago
58:16
Making Your Own Cool Conference Badges! by Simon Gurney
103 views • 1 year ago
47:19
Bypassing Anti-Virus Using BadUSB by Cristian Cornea
182 views • 1 year ago
14:47
The Evolution Of A Cyber Security Product by Lauren Astell
56 views • 1 year ago
40:29
War Stories Of A Social Engineer by Chris Pritchard
102 views • 1 year ago
37:54
AI And Deception In Cyber Security by Boris Taratine
87 views • 1 year ago
38:05
Log4Shell If You Don't Know Any Java by Philipp Krenn
30 views • 1 year ago
28:37
SMBeagle: SMB Share Hunter by Daniel Oates-Lee
115 views • 1 year ago
31:53
Maslow's SOC by Luigi Ritacca
96 views • 1 year ago
32:33
DPFuzzer: A Platform Independent DisplayPort Fuzzer by Simon Vincent And Ross Cuthbertson
303 views • 1 year ago
23:34
Game Theory & Its Applications Across Cyber Security by Ryan Rutan
387 views • 1 year ago
36:19
Binary Exploitation: Android Edition by John D
195 views • 1 year ago
22:38
Long Range WiFi Magic by Alex Farrant
88 views • 1 year ago
21:23
Capture The Fun - Gamified Learning by Andras Borbely
17 views • 1 year ago
21:00
Crowdsourced Information Sharing In IoT Cybersecurity by K. Hooper-Warren, T. Stewart & S. McGurgan
34 views • 1 year ago
Load More