
Sign up to save your podcasts
Or
Rehan Rishi, Haris Mughees, Fabian Boemer, Karl Tarbe, Nicholas Genise, Akshay Wadia, and Ruiyu Zhu
[Code] [Paper] [Video]
Beyond the Hook: A Technical Deep Dive into Modern Phishing MethodologiesAlexandre Nesic
[Blog]
How to Backdoor Large Language ModelsShrivu Shankar
[Blog] [Code]
Buccaneers of the Binary: Plundering Compiler Optimizations for Decompilation TreasureZion Leonahenahe Basque
[Code] [Video]
Software Screws Around, Reverse Engineering Finds Out: How Independent, Adversarial Research Informs Government RegulationAndy Sellars and Michael A. Specter
[Video] [Website]
Understanding things all the way downPhantomLiDAR: Cross-modality Signal Injection Attacks against LiDARZizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, and Wenyuan Xu
[Paper] [Demo Videos]
Full-stack Reverse Engineering of the Original Microsoft XboxMarkus Gaasedelen
[Video]
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of ChinaShencha Fan, Jackson Sippe, Sakamoto San, Jade Sheffey, David Fifield, Amir Houmansadr, Elson Wedwards, and Eric Wustrow
[Paper]
Scaling software (in)securityLow-Effort Denial of Service with RecursionAlexis Challande and Brad Swain
[Paper] [Video]
Is this memory safety here in the room with us?Thomas Dullien (Halvar Flake)
[Slides] [Video]
How to gain code execution on millions of people and hundreds of popular appsEva
[Blog]
Node is a loaderTom Steele
[Blog]
Mixing up Public and Private Keys in OpenID Connect deploymentsHanno Böck
[Blog] [Code]
Nifty sundriesWill It Run? Fooling EDRs With Command Lines Using Empirical DataWietze Beukema
[Tool site] [Code] [Video]
Homoglyph-Based Attacks: Circumventing LLM DetectorsAldan Creo
[Paper] [Code] [Video]
28 Months Later - The Ongoing Evolution of Russia's Cyber OperationsThe Grugq
[Slides] [Podcast interview]
‘It's Not Paranoia If They're Really After You’: When Announcing Deception Technology Can Change Attacker DecisionsAndrew Reeves and Debi Ashenden
[Paper]
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel AttackZiqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, and Jianping Wu
[Paper] [Code]
5
11 ratings
Rehan Rishi, Haris Mughees, Fabian Boemer, Karl Tarbe, Nicholas Genise, Akshay Wadia, and Ruiyu Zhu
[Code] [Paper] [Video]
Beyond the Hook: A Technical Deep Dive into Modern Phishing MethodologiesAlexandre Nesic
[Blog]
How to Backdoor Large Language ModelsShrivu Shankar
[Blog] [Code]
Buccaneers of the Binary: Plundering Compiler Optimizations for Decompilation TreasureZion Leonahenahe Basque
[Code] [Video]
Software Screws Around, Reverse Engineering Finds Out: How Independent, Adversarial Research Informs Government RegulationAndy Sellars and Michael A. Specter
[Video] [Website]
Understanding things all the way downPhantomLiDAR: Cross-modality Signal Injection Attacks against LiDARZizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, and Wenyuan Xu
[Paper] [Demo Videos]
Full-stack Reverse Engineering of the Original Microsoft XboxMarkus Gaasedelen
[Video]
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of ChinaShencha Fan, Jackson Sippe, Sakamoto San, Jade Sheffey, David Fifield, Amir Houmansadr, Elson Wedwards, and Eric Wustrow
[Paper]
Scaling software (in)securityLow-Effort Denial of Service with RecursionAlexis Challande and Brad Swain
[Paper] [Video]
Is this memory safety here in the room with us?Thomas Dullien (Halvar Flake)
[Slides] [Video]
How to gain code execution on millions of people and hundreds of popular appsEva
[Blog]
Node is a loaderTom Steele
[Blog]
Mixing up Public and Private Keys in OpenID Connect deploymentsHanno Böck
[Blog] [Code]
Nifty sundriesWill It Run? Fooling EDRs With Command Lines Using Empirical DataWietze Beukema
[Tool site] [Code] [Video]
Homoglyph-Based Attacks: Circumventing LLM DetectorsAldan Creo
[Paper] [Code] [Video]
28 Months Later - The Ongoing Evolution of Russia's Cyber OperationsThe Grugq
[Slides] [Podcast interview]
‘It's Not Paranoia If They're Really After You’: When Announcing Deception Technology Can Change Attacker DecisionsAndrew Reeves and Debi Ashenden
[Paper]
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel AttackZiqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, and Jianping Wu
[Paper] [Code]
361 Listeners
626 Listeners
590 Listeners
269 Listeners
7,879 Listeners
15,277 Listeners
43 Listeners