April 14th, 2019 📆 | 6969 Views ⚑
Cole Thompson – Using Ancient Math to Speed Up Security Assessments of Windows Executables This is about greatly speeding up
April 8th, 2019 📆 | 3281 Views ⚑
Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram will be presented.
March 18th, 2019 📆 | 5994 Views ⚑
If you are a bug bounty hunter or an application security analyst the ability to automate your web hunting tools
April 25th, 2018 📆 | 2034 Views ⚑
Arkadiy Tetelman – Data Driven Bug Bounty In a single sentence: if you’re not collecting metrics from your bug bounty
April 25th, 2018 📆 | 5692 Views ⚑
Amit Elazari – Hacking the Law: Are Bug Bounties a True Safe Harbor? In the wake of recent media headlines,
March 13th, 2017 📆 | 4710 Views ⚑
Bypassing malware analysis sandboxes is easy, let’s discuss how they are doing it and why it works Have you ever
April 4th, 2016 📆 | 6618 Views ⚑
In today’s age everyone puts everything on the Internet. Not only can this present a personal threat, it can also
Comments