Practical Use Cases of Exploiting MS Exchange in External Penetration Tests
Expert at Positive Technologies
Threat Researcher at Positive Technologies
Stratocaster: How we automated the routine search for unknown malware in the network traffic
CosmicSting: Unveiling one of the Largest E-Commerce Exploit — Vulnerability Discovery, Live Demo and Security Impact
Independent security researcher
Leader of IoT Pentest - VNPT Cyber Immunity
How to Steal a Drone (Drone Hijacking)
Malware analyst at VinCSS Cyber Security Services
Empowering Malware Analysis with IDA AppCall Feature
Hacking BFSI systems: key learnings
Rock (Paper Scissors) Chip: bypassing secure boot on recent RK devices
CEO of Chongluadao. vn and Technical Expert at the National Cyber Security Center (NCSC)
Opening keynote. Hack the Hackers: The Art of Blackhat Counterintelligence