defcon - Tagged - Security Boulevard
CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community

CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community

All organizations must have security awareness training programs to teach basics to end users. Similarly, the technical teams need to be exposed to flexible training that is interesting to them ...
Best of Episode: Interview with Jayson E. Street

Best of Episode: Interview with Jayson E. Street

This week is another best of episode with the man, the myth, the legend, Jayson E. Street! In this episode Jayson shares with us several of his greatest hacking and social engineering ...
Best of Episode: Interview with Rachel Tobac

Best of Episode: Interview with Rachel Tobac

This week is a best of episode with special guest Rachel Tobac, CEO of Social Proof Security. In this episode we discuss social engineering, how to get more women in cybersecurity, and ...

DEF CON 28 Safe Mode – Dylan Ayrey’s And Allison Donovan’s ‘Lateral Movement and Privilege Escalation In GCP: Compromise Any Organization Without Dropping an Implant’

Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...

DEF CON 28 Safe Mode – Ismail Melih’s Tas And Kubilay Ahmet Kucuk’s ‘Practical VoIP/UC Hacking Using Mr.SIP’

Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...

DEF CON 28 Safe Mode – Christopher Wade’s ‘Beyond Root: Custom Firmware For Embedded Mobile Chipsets’

Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...

DEF CON 28 Safe Mode – Ayoub (ayoul3) Elaassal’s ‘Only Takes A Spark – Popping A shell On A 1000 Nodes’

Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...

DEF CON 28 Safe Mode – Mickey Shkatov’s And Jesse Michael’s ‘Bytes In Disguise (⌐■_■)’

Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...

DEF CON 28 Safe Mode – Zhipeng Huo’s And Chuanda Ding’s ‘Evil Printer: How To Hack Windows Machines With Printing Protocol’

Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...