39:38 Collaborative computing technologies How companies can share data without actually sharing it All Hacking Cons
24:01 Investigation of information security incidents caused by employees how to detect and catch All Hacking Cons
27:54 Cyberexercises on Positive Technologies infrastructure How to hack a cybersecurity company All Hacking Cons
17:33 Day three of The Standoff What happened and what lies ahead analysis of cyberbattle All Hacking Cons
17:40 Methodology for assessing the risks of successful social engineering attacks against companies All Hacking Cons
12:29 Detection of phishing domain names and typosquatting by using a string similarity metric All Hacking Cons
33:33 Creating a multipolar world a country's digital independence and digital sovereignty All Hacking Cons
22:04 How to talk about complex technical stuff in simple language What ideas are voiced at TEDx All Hacking Cons
54:24 Detection of anomalies and signs of attacks in network traffic using the TCN autoencoder All Hacking Cons
25:55 Level of protection for companies How quickly attackers can break into an organization All Hacking Cons
40:09 How to bypass data exfiltration detection with malicious cryptography techniques All Hacking Cons
30:46 Discovering C&C in Malicious PDF with obfuscation, encoding, and other techniques All Hacking Cons
26:13 Changes in the distribution market How companies in this market are getting on All Hacking Cons
51:01 Уязвимое мобильное приложение Allsafe глазами аналитика исходного кода с примерами для начинающих All Hacking Cons
40:35 Фишинг на официальном сайте как перейти на сайт компании и отдать пароль хакеру All Hacking Cons