What would happen if I simply logged in to this internal Microsoft application with my own Microsoft account? Surely that
In this talk, we will introduce the security implications of HTTP/2 server push and signed HTTP exchange (SXG) on the
Supply chain compromises like the 2020 SolarWinds breach have shown how devastating and stealthy these attacks can be. Despite advances
The macOS threat landscape has changed considerably in recent years with the ever-increasing prevalence of macOS malware. In response, Apple
Apple’s on device AI frameworks CoreML, Vision, AVFoundation enable powerful automation and advanced media processing. However, these same capabilities introduce
High-entropy ASLR was supposed to make bypasses of ASLR on Windows virtually impossible – until now! This talk will debut
Network Attached Storage (NAS) devices are indispensable in many corporate and home environments. These devices often live on the network
Browser extensions have become increasingly popular for enhancing the web browsing experience. Common examples are ad blockers, cryptocurrency wallets, and
Just Hacking Training livestream with Andrew Pla! Friday February 20th at 10am PT / 1pm ET. https://justhacking.com/John HammondRead More
Join Black Hat USA Review Board Members for a compelling discussion on the most pressing issues facing the InfoSec community
Apple’s upcoming March 4 media event could include a demo of immersive Formula 1 content on Apple Vision Pro, Daring