macOS Security Features Bypasses by Example by Jonathan Bar Or (JBO) Date: 07 Feb 2022
hunting <>Android Malware with Importance Of Yara by Shivang DesaiDate: 29 Jan 2022
Impact of log4j by Alvaro Munoz & Joe Slowik Date: 13 Jan 2022
Red, Purple, and Blue team activity using Azure by Suman Tiwari & Sakaldeep Yadav Date: 01 Oct 2021
Bhadra framework: Threat modeling for mobile communication systems by Sid Rao Date: 17 Sep 2021
Technical Breakdown of Magecart - The Digital Bank Robbery by Lavakumar Kuppan Date: 03 Sep 2021
How Information Warfare Shapes Your World by Shivam Shankar Singh and Anand VenkatanarayananDate: 28 Aug 2021
Ransomware Unlocked by Ashwini Siddhi Date: 27 Aug 2021
The 'crash' course, a non-programmer's guide to fuzzing by Rushikesh D. Nandedkar Date: 20 Aug 2021
Charting career paths in Cybersecurity by Bishakha Jain Date: 06 Aug 2021
Migrate Securely From On Prem to Azure Cloud by Aditya Vasekar Date: 23 Jul 2021
Dangling Packages leading to RCE by Prasoon Gupta Date: 16 Jul 2021
Defending enterprise cloud infrastructure : a hacker's perspective by Rashid Feroz Date: 09 Jul 2021
DevSecOps - Automating Security in DevOps by Jovin Lobo Date: 11 Jun 2021
The Achilles heel of a threat actor: Is there any? by Shyam Sundar Ramaswami Date: 26 Feb 2021
Enterprise Security Architecture. Is it time for a booster shot? by Niraj Shukla Date: 19 Feb 2021
Defensive Programming x FinTech by Merab Tato Kutalia Date: 05 Feb 2021
Machine learning for Intrusion Attempt Detections by Varun Kohli Date: 22 Jan 2021
Extract data from damaged Android mobile device. Version: 7.X.X by Teplinsky Maxim Igorevich, Dmitry Semeninov Igorevich & Savchenko Pavel Viktorovich Date: 21 Jan 2021
Exploiting Android Messengers with WebRTC by Natalie Silvanovich Date: 07 Jan 2021
Hacking Modern Desktop apps with XSS and RCE by Abraham Aranguren Date: 23 Oct 2020
Rapid Threat Model Prototyping; threat modeling for Agile and DevOps by Geoffrey Hill Date: 16 Oct 2020
CXO Panel Discussion: Critical Steps Involved In Protecting the Large Scale Infrastructure by Moderator: Eric Eifert Panelists: Manish Tiwari, Eman Al Awadhi Date: 14 Sep 2020
Operationalizing Threat Intelligence for Collective Defense by Avkash Kathiriya Date: 28 Aug 2020
Medical Malware on Android by Axelle Apvrille Date: 21 Aug 2020
The Great (Sandbox) Escape by Vikas Singh Date: 10 Aug 2020
In(security) of smart energy meters – A hardware security perspective by Sulthan Alaudeen Date: 30 Jul 2020
Pushing Private Communication Forward: Engineering at Signal by Jim O’Leary Date: 25 Jul 2020
Security Compliance in the ICS environment by Krishna S Tadimeti Date: 24 Jul 2020
Cyber Insurance: What makes a good fit for you by Ken Pfeil Date: 17 Jul 2020
Assessing the security posture of ICS infrastructure using ISA 62443 standard by Chinkle Umrania and Neeraj Thakur Date: 15 Jul 2020
Securing ICS-SCADA Systems by Dr. Faruk Kazi Date: 04 Jul 2020
Robust Website Fingerprinting Through the Cache Occupancy Channel by Anatoly Shusterman Date: 01 Jul 2020
Building a Security Platform with Elastic Stack: Part 1 by Aravind Putrevu Date: 20 Jun 2020
Securing Microservices at API Gateway using Cloud Native Solutions by Abhisek Datta Date: 06 Jun 2020
Secrets Management using Hashicorp Vault by Rohit Salecha Date: 30 May 2020
HackIM CTF: Do's & Don'ts by Sudhakar Verma Date: 30 Jan 2020
Application Security for developers: A Holistic Approach by Rohit Salecha Date: 16 May 2019
DDoS Mitigation by Anshul Saxena Date: 14 Feb 2019
Guide on setting up IoT testing lab by Arun Magesh Date: 27 Dec 2018
Secure Code Development by Martijn Bogaard Date: 13 Dec 2018
Side-channel Attacks by Stjepan Picek Date: 06 Dec 2018