49:46Cybersecurity Between Geopolitics And Tech Supremacy - Florian Schütz1ns0mn1h4ck214 views·1 month ago
53:37Livestreaming From North Korea's IT Workers Laptop Farm - Mauro Eldritch & Heiner García Perez1ns0mn1h4ck796 views·1 month ago
50:54SACL The Detection Capability You've Been Ignoring - Wojtek Sochacki & Maroua Lahlouhi1ns0mn1h4ck162 views·1 month ago
54:17A Practical Guide To Your Company’s Post-quantum Cryptography Journey - Florian Widmer1ns0mn1h4ck108 views·1 month ago
46:35A Deep Dive Into 5G Mobile Network Vulnerability Research - Arthur Naullet & Maxime Gautier1ns0mn1h4ck673 views·1 month ago
33:32Guard Me If You Can A Novel Passwordless-to-Password Attack - Yuya Chudo1ns0mn1h4ck139 views·1 month ago
39:14Silo-Binding Uncovering The Ghost In The Silo - Andrei-Marius Muntea & Andrei Mermeze1ns0mn1h4ck116 views·1 month ago
32:11Shift Happens Uncovering Two Built-In Command Injections In Windows Context Menus -@Poda1ns0mn1h4ck1.5K views·1 month ago
34:07Improving SAP Security Tooling For Authorizations And Post-exploitation - Aloïs Colléaux-Le Chêne1ns0mn1h4ck80 views·1 month ago
38:30Zombie Workflows And Other GitHub Actions Horror Stories - Paul Gerste1ns0mn1h4ck62 views·1 month ago
45:50Safety Of LLMs Training Data Attribution And Efficient Search - Anastasiia Kucherenko1ns0mn1h4ck57 views·1 month ago
44:22Gouverner le risque quand on n’a pas les moyens de la sécurité - Fiona Ponzo & Guillaume Fumeaux1ns0mn1h4ck74 views·1 month ago
41:08The Talent (R)Evolution Building A Career In Cybersecurity - Panel1ns0mn1h4ck45 views·1 month ago
42:48How To Become A Cyber Entrepreneur Startup Pitches & Founder Insights - Panel at Insomni'hack1ns0mn1h4ck28 views·1 month ago
47:35Reflecting Your Authentication Look In The Mirror - It’s You - Andrea Pierini1ns0mn1h4ck293 views·1 month ago
39:17PAMdemic How Unauthorized Access Spreads Faster Than You Think - Melina Phillips1ns0mn1h4ck48 views·1 month ago
46:30Shoot For The Galaxies Our Samsung S25 1-click RCE Journey - Yichen Chai & Sacha Kozma1ns0mn1h4ck517 views·1 month ago
26:28Exploring New Embedded Bootloader Exploits For Firmware Extraction - Qais Temeiza1ns0mn1h4ck352 views·1 month ago
46:49Simplify Or Drown Practical Strategies For Streamlining Security Processes - Sebastian Avarvarei1ns0mn1h4ck42 views·1 month ago
30:32AiTM Phishing To Self-Replicating Worms Inside The 2025 Npm Attacks - Christophe Tafani-Dereeper1ns0mn1h4ck277 views·1 month ago