Insomni'Hack 2019
27 videos • 41 views • by Cooper
1
Growing Hypervisor 0day with Hyperseed by Shawn Denbow (@sdenbow_), Microsoft
scrt.insomnihack
Download
2
The Evolution of Cloud Threats by Paolo Passeri (@paulsparrows), Netskope
scrt.insomnihack
Download
3
Building a flexible hypervisor-level debugger by Mathieu Tarral (@mtarral)
scrt.insomnihack
Download
4
Security Analysis on the Attack Surface of Blockchain Client by Chen Nan & Kame Wang, Tencent
scrt.insomnihack
Download
5
Analyzing a Portable Wireless Storage Device From 0 to RCE by Qinghao Tang & Shuo Yuan, Qihoo 360
scrt.insomnihack
Download
6
Let's hack the IoT Hub with Pwnhub dudes: IoT Hub Exploitation by Jisub Kim (@JisubK), Kanghyun Choi
scrt.insomnihack
Download
7
Attack surfaces of smart medical infrastructure by Denis Makrushin (@difezza)
scrt.insomnihack
Download
8
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarcieri
scrt.insomnihack
Download
9
On the Security of Dockless Bike Sharing Services by Antoine Neuenschwander (@ant0inet)
scrt.insomnihack
Download
10
What every (IT | Security) Professional should know about the dark web by Mischa Peters, IntSights
scrt.insomnihack
Download
11
Keynote - Medieval Castles and Modern Servers by Christian Folini (@ChrFolini)
scrt.insomnihack
Download
12
These are the Droids you are looking for - security research on Android by Elena Kovakina, Google
scrt.insomnihack
Download
13
Vulnerabilities of mobile OAuth 2.0 by Nikita Stupin, Mail.ru
scrt.insomnihack
Download
14
Betrayed by the Android User Interface: Why a Trusted UI Matters by Yanick Fratantonio (@reyammer)
scrt.insomnihack
Download
15
Cryptocurrency mobile malware by Axelle Apvrille (@cryptax), Fortinet
scrt.insomnihack
Download
16
How to investigate iOS devices by Paul Rascagneres (@r00tbsd), Talos
scrt.insomnihack
Download
17
Wake up Neo: detecting virtualization through speculative execution by Innokentii Sennovskii
scrt.insomnihack
Download
18
Sneaking Past Device Guard by Philip Tsukerman (@philiptsukerman), Cybereason
scrt.insomnihack
Download
19
Turning your BMC into a revolving door: the HPE iLO case by Alexandre Gazet, Fabien Perigaud
scrt.insomnihack
Download
20
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard, Riscure
scrt.insomnihack
Download
21
Threat Hunting Research Methodology: A Data Driven Approach by Roberto & Jose Luis Rodriguez
scrt.insomnihack
Download
22
Dear Blue Team: Forensics Advice to Supercharge your DFIR capabilities by Joe Gray (@c_3pjoe)
scrt.insomnihack
Download
23
Exploits in Wetware by Robert Sell (@robertesell)
scrt.insomnihack
Download
24
NSX-T Architecture & Benefits by Erik Bussink, VMware
scrt.insomnihack
Download
25
Digitalisation demands defensive action by Daniel Caduff, FONES
scrt.insomnihack
Download
26
Addressing privacy: GDPR, Cloud, and You by Chris Esquire
scrt.insomnihack
Download
27
From the cloud to the internal network – Offense vs Defense by Snir Ben-Shimol, Varonis
scrt.insomnihack
Download