CONFidence


From BlackMatter to BlackCat: Analyzing 2 attacks fr...

Sockbot in GoLand - Linking APT actors with Ransomwa...

Cloud Hacking Scenarios

Sherlock Holmes na tropie cyberzłoczyńców

Redteaming na zapleczu sklepu

CAR-Hacking 2.0 Protocols and Connectors of Modern Cars

Jak nie realizować audytów i jak nie reagować na ...

DRAKVUF Sandbox: Open source, self-hosted malware sa...

Informatyka śledcza w dronach (Drone Forensics)

Dark Vinci powraca czyli hakowanie w stylu wiktoria�...

INCONTROLLER: New Malware Developed to Target Indus...

How attackers are adopting Henry Ford principles

How Attackers Abused DNS in 2021/2022

Hitachi Energy New Acquisition CTF

How to find more than 150 vulnerabilities in WordPre...

Pwning AWS Lambdas & GCP Cloud Functions
