Disobey
3.97K subscribers
46:21
[D24] Circling Dragons: Red Team Lessons From Modern Breaches - Jason Lang
Disobey
1.4K views • 2 weeks ago
23:02
[D24] Smoke and Mirrors: How to hide in Microsoft Azure - Aled Mehta and Christian Philipov
Disobey
261 views • 2 weeks ago
36:16
[D24] I'm a script kiddie, bypassing your antivirus and EDR systems - Anne Hautakangas
Disobey
474 views • 2 weeks ago
44:17
[D24] Creating Monsters - Joona Hoikkala
Disobey
165 views • 2 weeks ago
44:28
[D24] Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare - STÖK
Disobey
237 views • 2 weeks ago
33:06
[D24] How Much Dirty Laundry Are Your Smart Home Devices Airing About You - Jack Fitzsimons
Disobey
199 views • 2 weeks ago
38:36
[D24] Hacking Hearts and Minds - Joakim Tauren
Disobey
219 views • 2 weeks ago
22:29
[D24] How CSPM Can Help to Secure Your Cloud and Avoid Configuration Disasters - Mikael Nilsson
Disobey
200 views • 2 weeks ago
41:54
[D24] Hardware Hacking all the things, on a budget - You can do it too! - Tomi Koski
Disobey
384 views • 2 weeks ago
52:37
[D24] Zero Trust - Dope or Nope - Sami Laiho
Disobey
1.1K views • 2 weeks ago
31:40
[D24] A Two part Saga: Continuing the Journey of Hacking Malware C2s - Vangelis Stykas
Disobey
120 views • 2 weeks ago
27:37
[D24] All Your Frontend Are Belong To Us - Crawling Through Javascript Using ASTs - Matias Huhta
Disobey
325 views • 2 weeks ago
49:32
[D24] Exploring Generative AI’s Threat to Social Justice and Democracy - Maria Bique and Dimitri
Disobey
96 views • 2 weeks ago
46:35
[D24] Wi-Fi Roaming Security and Privacy - Karri Huhtanen
Disobey
100 views • 2 weeks ago
51:06
[D24] EU Hype Decoded CISCO MindX2 Crystal Ball Insights and CFA! - Daria Catalui and Peter Sund
Disobey
45 views • 2 weeks ago
21:33
[D24] I Was Almost a Cybercriminal - Sergey Ichtchenko
Disobey
374 views • 2 weeks ago
43:25
[D24] Securing GenAI? How Far Will Devsecops Take You and How to Go Further - Satu Korhonen
Disobey
71 views • 2 weeks ago
53:02
[D24] Purple Teaming In Action: Beyond the Hype - Tuomo Makkonen
Disobey
125 views • 2 weeks ago
47:15
[D24] Avoid Broken ACLs in Control Planes With Declarative RBAC - Lucas Käldström
Disobey
44 views • 2 weeks ago
24:49
[D24] Integral Theory For Hackers - Sami Kivelä
Disobey
53 views • 2 weeks ago
39:29
[D24] Building Automated System for Deploying Lots of SA Systems for When SHTF - Eero and Henri
Disobey
124 views • 2 weeks ago
25:30
[D24] Cybersecurity in the Gaming Industry - Massimo Nardone
Disobey
166 views • 2 weeks ago
39:45
[D24] The Rising Flame of Community Engagement - Bianca Buznean
Disobey
48 views • 2 weeks ago
21:01
[D24] Identifying Cross-Account Attack Paths in AWS Environments at Scale - Aleksi Kallio
Disobey
73 views • 2 weeks ago
30:43
[D24] Have U Been Invited (episode 2) - MacOS Logic Bugs - Mikko Kenttälä
Disobey
223 views • 2 weeks ago
56:21
[D24] CERT and NCSC 101 - Jussi Eronen
Disobey
93 views • 2 weeks ago
57:38
[Disobey 2023] Hacks of the Future and The Role of Humans and Hackers - Connie McIntosh
Disobey
1K views • 11 months ago
31:52
[Disobey 2023] Cyber Security is everyone's business - Lotta Sandroos
Disobey
418 views • 11 months ago
28:22
[Disobey 2023] IEC62443-4-2-wtf? Operational Technology Device Security - Lauri Paatero
Disobey
291 views • 11 months ago
1:01:43
[Disobey 2023] Exploiting insecure certificate validation in TLS clients - Aapo Oksman
Disobey
1.1K views • 11 months ago
Load More