You can patch, but you can’t hide. Come find us at DefCamp 2024 and see why

You can patch, but you can’t hide. Come find us at DefCamp 2024 and see why

Hardware Backdooring an e-Scooter at DefCamp 2023Подробнее

Hardware Backdooring an e-Scooter at DefCamp 2023

MFA - No longer the universal answer at DefCamp 2024Подробнее

MFA - No longer the universal answer at DefCamp 2024

Finding Vulnerabilities in Your Codebase Using Open Source Tools at DefCamp 2023Подробнее

Finding Vulnerabilities in Your Codebase Using Open Source Tools at DefCamp 2023

Deep Fakes: The Lies We Can’t See at DefCamp 2024Подробнее

Deep Fakes: The Lies We Can’t See at DefCamp 2024

Nothing To Hide: Privacy-Preserving Cryptographic Authentication In Practice at DefCamp 2023Подробнее

Nothing To Hide: Privacy-Preserving Cryptographic Authentication In Practice at DefCamp 2023

Advanced Multi-Platform Malware for Black-HatПодробнее

Advanced Multi-Platform Malware for Black-Hat

Hunting / Scraping with Favicons at DefCamp 2023Подробнее

Hunting / Scraping with Favicons at DefCamp 2023

Monitoring malware behavior through kernel syscall tracing at DefCamp 2023Подробнее

Monitoring malware behavior through kernel syscall tracing at DefCamp 2023

Very unusual case of C2 over DNS from certain firewalls at DefCamp Cluj-Napoca 2024Подробнее

Very unusual case of C2 over DNS from certain firewalls at DefCamp Cluj-Napoca 2024

MITM on PSTN — novel methods for intercepting phone calls at DefCamp 2023Подробнее

MITM on PSTN — novel methods for intercepting phone calls at DefCamp 2023

DefCamp 2024 OverviewПодробнее

DefCamp 2024 Overview

You Can Run, but You Can't Hide - Finding the Footprints of Hidden ShellcodeПодробнее

You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode

Weaponized AI for cyber attacks at DefCamp 2023Подробнее

Weaponized AI for cyber attacks at DefCamp 2023

A Comprehensive Approach to Achieving a Threat Intelligence-Driven Defense Strategy at DefCamp 2024Подробнее

A Comprehensive Approach to Achieving a Threat Intelligence-Driven Defense Strategy at DefCamp 2024

Abusing GCPW for lateral movement from local to cloud at DefCamp 2023Подробнее

Abusing GCPW for lateral movement from local to cloud at DefCamp 2023

Hacking a magnetic lock - successes and failures at DefCamp 2023Подробнее

Hacking a magnetic lock - successes and failures at DefCamp 2023

Architectural challenges & solutions in creating a dynamic cyber range solution at DefCamp 2023Подробнее

Architectural challenges & solutions in creating a dynamic cyber range solution at DefCamp 2023

Moving Target Defense at DefCamp 2023Подробнее

Moving Target Defense at DefCamp 2023

Новости