Telegram's Encryption Controversy Explained | Must Watch!

Telegram is NOT an Encrypted Messaging App, Must-See Documentaries

In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is ...

USENIX Security ’23 – Towards Targeted Obfuscation of Adversarial Unsafe Images Using Reconstruction and Counterfactual Super Region Attribution Explainability

Authors/Presenters: Mazal Bethany, Andrew Seong, Samuel Henrique Silva, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment ...
DEF CON 31

DEF CON 31 War Stories – Paz Hameiri’s ‘CON Trolling The Weather’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
DEF CON 31

DEF CON 31 – Daniel Avinoam’s ‘Staying Undetected Using The Windows Container Isolation Framework’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
A spreadsheet list of integration commands you can use to build a phishing playbook using Office 365, CrowdStrike, Active Directory, Checkpoint, and Recorded Future

How to Build a Phishing Playbook Part 1: Preparation

Automating response to phishing attacks remains one of the core use-cases of SOAR platforms. In 2022, the Anti-Phishing Working Group (APWG) logged ~4.7 million phishing attacks. Since 2019, the number of phishing ...
DEF CON 31

DEF CON 31 – Tracy Mosley’s ‘War Stories – Nuthin’ But A G Thang Evolution of Cellular Networks’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
DEF CON 31

DEF CON 31 – Farzan Karimi’s, Xuan Xing’s, Eugene Rodionov’s, Xiling Gong’s – ‘Attacking And Securing the Pixel Modem’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
DEF CON 31

DEF CON 31 – Christopher Wade’s ‘Physical Attacks Against Smartphones’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
DEF CON 31

DEF CON 31 Policy – Panel : A Global Approach to Tackling Software Resilience

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
DEF CON 31

DEF CON 31 Policy – Panel: All Your Vulns Are Belong To Terms And Conditions

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...

Application Security Check Up