CONFidence
From BlackMatter to BlackCat: Analyzing 2 attacks fr...
Sockbot in GoLand - Linking APT actors with Ransomwa...
Cloud Hacking Scenarios
Sherlock Holmes na tropie cyberzłoczyńców
Redteaming na zapleczu sklepu
CAR-Hacking 2.0 Protocols and Connectors of Modern Cars
Jak nie realizować audytów i jak nie reagować na ...
DRAKVUF Sandbox: Open source, self-hosted malware sa...
Informatyka śledcza w dronach (Drone Forensics)
Dark Vinci powraca czyli hakowanie w stylu wiktoria...
INCONTROLLER: New Malware Developed to Target Indus...
How attackers are adopting Henry Ford principles
How Attackers Abused DNS in 2021/2022
Hitachi Energy New Acquisition CTF
How to find more than 150 vulnerabilities in WordPre...
Pwning AWS Lambdas & GCP Cloud Functions