Sep 28, 2020
Design Considerations for Secure GraphQL APIs
By Jake Miller
Sep 22, 2020
More Important Than a TPS Report: Designing a Realistic CTF for DEF CON Safe Mode
By Barrett Darnell
Sep 15, 2020
Design Considerations for Secure Cloud Deployment
By Jake Miller
Sep 08, 2020
h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)
By Jake Miller
Sep 03, 2020
Music to Hack To: A Bishop Fox Mixtape
By Britt Kemp
Aug 27, 2020
Zamzar API Advisory
By Chris Flanagan
Aug 25, 2020
What Makes a Good Penetration Test?
By Jake Miller
Aug 19, 2020
20 Tips on How to Make the Most of Your Pen Test
By Jake Miller
Aug 18, 2020
8 Recommended Talks From DEF CON 28
By Britt Kemp
Aug 12, 2020
TinyMCE, Version 5.2.1 Advisory
By George Steketee, Chris Davis
Aug 11, 2020
Is This IoT App Safe to Drink?
By Brianne Hughes
Aug 05, 2020
A Look Forward to the DEF CON Red Team Village CTF
By Barrett Darnell
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.