31:09
Demystifying Gootloader: A Deep Dive into Advanced Malware Forensics
IT-S NOW!24
Shared 28/06/2024
33:09
Der Datendiebstahl der keiner war und andere Geschichten aus dem Alltag des A1-CERT Teams
IT-S NOW!24
Shared 28/06/2024
38:52
GPT, ignore the previous instructions! Prompt injection attacks and how to avoid them
IT-S NOW!24
Shared 28/06/2024
44:38
Challenges of Digital Forensics and Incident Response (DFIR) in OT Environments
IT-S NOW!24
Shared 28/06/2024
31:07
AttackMate: A modern open-source tool for automating cyberattacks
IT-S NOW!24
Shared 27/06/2024
46:27
Retten oder Reimplementieren? Security und technische Schulden in Legacy Software
IT-S NOW!24
Shared 27/06/2024
28:42
Let's Get Physical - All you wanted to know about performing Physical Pentests
IT-S NOW!24
Shared 27/06/2024
33:33
From code to connected device: building and maintaining embedded Linux distributions
IT-S NOW!24
Shared 26/06/2024