
Sign up to save your podcasts
Or
ThinkstScapes Q4’24
Wins and losses in the Microsoft ecosystemPointer Problems - Why We’re Refactoring the Windows KernelJoe Bialek
[Video]
Defending off the landCasey Smith, Jacob Torrey, and Marco Slaviero
[Slides] [Code]
Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-PremiseYuya Chudo
[Slides] [Code]
From Simulation to Tenant TakeoverVaisha Bernard
[Video]
From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11NiNi Chen
[Slides] [Video]
LLM hype continues, as do the security issuesThings we learned about LLMs in 2024Simon Willison
[Blog]
AI Meets Git: Unmasking Security Flaws in Qodo MergeNils Amiet
[Slides] [Video] [Blog]
Suicide Bot: New AI Attack Causes LLM to Provide Potential “Self-Harm” InstructionsGadi Evron
[Blog]
Diving deep, then diving deeperBreaking NATO Radio EncryptionLukas Stennes
[Paper] [Video]
Exploiting File Writes in Hardened EnvironmentsStefan Schiller
[Blog] [Video]
Hacking yourself a satellite - recovering BEESAT-1PistonMiner
[Video]
IRIS: Non-Destructive Inspection of SiliconAndrew 'bunnie' Huang
[Blog] [Paper] [Video]
SQL Injection Isn't DeadPaul Gerste
[Slides] [Video]
Nifty sundriesWhat Developers Get for Free?Louis Nyffenegger
[Video]
Dialing into the Past: RCE via the Fax Machine – Because Why Not?Rick de Jager and Carlo Meijer
[Video]
Broken isolation - Draining your Credentials from Popular macOS Password ManagersWojciech Reguła
[Slides] [Video]
I'll Be There for You! Perpetual Availability in the A8 MVX SystemAndré Rösti, Stijn Volckaert, Michael Franz, and Alexios Voulimeneas
[Code] [Paper]
Exploring and Exploiting an Android “Smart POS” Payment TerminalJacopo Jannone
[Video]
5
11 ratings
ThinkstScapes Q4’24
Wins and losses in the Microsoft ecosystemPointer Problems - Why We’re Refactoring the Windows KernelJoe Bialek
[Video]
Defending off the landCasey Smith, Jacob Torrey, and Marco Slaviero
[Slides] [Code]
Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-PremiseYuya Chudo
[Slides] [Code]
From Simulation to Tenant TakeoverVaisha Bernard
[Video]
From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11NiNi Chen
[Slides] [Video]
LLM hype continues, as do the security issuesThings we learned about LLMs in 2024Simon Willison
[Blog]
AI Meets Git: Unmasking Security Flaws in Qodo MergeNils Amiet
[Slides] [Video] [Blog]
Suicide Bot: New AI Attack Causes LLM to Provide Potential “Self-Harm” InstructionsGadi Evron
[Blog]
Diving deep, then diving deeperBreaking NATO Radio EncryptionLukas Stennes
[Paper] [Video]
Exploiting File Writes in Hardened EnvironmentsStefan Schiller
[Blog] [Video]
Hacking yourself a satellite - recovering BEESAT-1PistonMiner
[Video]
IRIS: Non-Destructive Inspection of SiliconAndrew 'bunnie' Huang
[Blog] [Paper] [Video]
SQL Injection Isn't DeadPaul Gerste
[Slides] [Video]
Nifty sundriesWhat Developers Get for Free?Louis Nyffenegger
[Video]
Dialing into the Past: RCE via the Fax Machine – Because Why Not?Rick de Jager and Carlo Meijer
[Video]
Broken isolation - Draining your Credentials from Popular macOS Password ManagersWojciech Reguła
[Slides] [Video]
I'll Be There for You! Perpetual Availability in the A8 MVX SystemAndré Rösti, Stijn Volckaert, Michael Franz, and Alexios Voulimeneas
[Code] [Paper]
Exploring and Exploiting an Android “Smart POS” Payment TerminalJacopo Jannone
[Video]
361 Listeners
626 Listeners
590 Listeners
269 Listeners
7,879 Listeners
15,277 Listeners
43 Listeners