TROOPERS IT Security Conference
5.71K subscribers
23:11
TROOPERS23: TR23 Badge - A RETROspective
TROOPERS IT Security Conference
155 views • 6 months ago
57:14
TROOPERS23: Fault Injection Attacks on Secure Automotive Bootloaders
TROOPERS IT Security Conference
1.4K views • 7 months ago
56:41
TROOPERS23: Monitoring Solutions: Attacking IT Infrastructure at its Core
TROOPERS IT Security Conference
455 views • 8 months ago
41:56
TROOPERS23: Horror Stories from the Automotive Industry
TROOPERS IT Security Conference
575 views • 9 months ago
35:00
TROOPERS23: The Wire on Fire: The Spies Who Loved Telcos
TROOPERS IT Security Conference
252 views • 9 months ago
1:00:35
TROOPERS23: Vulnerabilities in the TPM 2.0 reference implementation code
TROOPERS IT Security Conference
177 views • 9 months ago
1:02:04
TROOPERS23: Beyond Java: Obfuscating Android Apps with Purely Native Code
TROOPERS IT Security Conference
147 views • 9 months ago
25:17
TROOPERS23: Reportly - keep your head in the clouds.
TROOPERS IT Security Conference
429 views • 9 months ago
45:29
TROOPERS23: OAuth and Proof of Possession - The long way round
TROOPERS IT Security Conference
385 views • 9 months ago
24:04
TROOPERS23: Homophonic Collisions: Hold me closer Tony Danza
TROOPERS IT Security Conference
56 views • 9 months ago
47:43
TROOPERS23: GPT-like Pre-Training on Unlabeled System Logs for Malware Detection
TROOPERS IT Security Conference
265 views • 9 months ago
51:44
TROOPERS23: Detection And Blocking With BPF Via YAML
TROOPERS IT Security Conference
122 views • 9 months ago
42:51
TROOPERS23: Forensic analysis on real incidents inside Microsoft Remote Desktop Services
TROOPERS IT Security Conference
298 views • 9 months ago
56:10
TROOPERS23: Testing and Fuzzing the Kubernetes Admission Configuration
TROOPERS IT Security Conference
305 views • 9 months ago
53:48
TROOPERS23: Everyone knows SAP, everyone uses SAP, everyone uses RFC, no one knows RFC
TROOPERS IT Security Conference
752 views • 9 months ago
44:42
TROOPERS23: The Anatomy of Windows Telemetry Part 2
TROOPERS IT Security Conference
224 views • 9 months ago
50:05
TROOPERS23: Dumping NTHashes from Azure AD
TROOPERS IT Security Conference
2.5K views • 9 months ago
47:06
TROOPERS23: The Power of Coercion Techniques in Windows Environments
TROOPERS IT Security Conference
558 views • 9 months ago
44:32
TROOPERS23: Hidden Pathways
TROOPERS IT Security Conference
713 views • 9 months ago
55:19
TROOPERS23: Priority for Effective Action
TROOPERS IT Security Conference
188 views • 9 months ago
57:09
TROOPERS23: (Windows) Hello from the other side
TROOPERS IT Security Conference
1.5K views • 9 months ago
50:22
TROOPERS23: So You Performed A Forest Recovery. How Do You Reconnect Your AD Again With Azure AD?
TROOPERS IT Security Conference
224 views • 9 months ago
1:02:40
TROOPERS23: Spooky authentication at a distance
TROOPERS IT Security Conference
288 views • 9 months ago
44:37
TROOPERS23: Security Heroes versus the Power of Privacy
TROOPERS IT Security Conference
319 views • 9 months ago
44:41
TROOPERS23: SAP (Anti-)Forensics: Detecting White-Collar Cyber-Crime
TROOPERS IT Security Conference
187 views • 9 months ago
59:44
TROOPERS23: Das IT-Security-Lagebild aus Heise-Sicht
TROOPERS IT Security Conference
159 views • 9 months ago
53:38
TROOPERS23: Real world detection engineering in a multi-cloud environment
TROOPERS IT Security Conference
2.3K views • 9 months ago
53:58
TROOPERS23: Cat & Mouse - or chess?
TROOPERS IT Security Conference
495 views • 9 months ago
33:13
TROOPERS23: Jupysec: Auditing Jupyter to Improve AI Security
TROOPERS IT Security Conference
313 views • 9 months ago
50:54
TROOPERS23: Attacking Ultra-Wideband: Security Analysis of UWB Applications in Smartphones
TROOPERS IT Security Conference
339 views • 9 months ago
Load More