BlackAlps2024 - Aftermovie
BlackAlps CyberSecurityConference
BlackAlps2024 - Aftermovie
1:48
BlackAlps 2023 - Aftermovie
BlackAlps CyberSecurityConference
BlackAlps 2023 - Aftermovie
1:39
BlackAlps 2022 - Aftermovie
BlackAlps CyberSecurityConference
BlackAlps 2022 - Aftermovie
1:49
BlackAlps 2023: Unleash The Engineer Within: Culture Eats Policy For Breakfast - Fred Blaise
BlackAlps CyberSecurityConference
BlackAlps 2023: Unleash The Engineer Within: Culture Eats Policy For Breakfast - Fred Blaise
40:16
BlackAlps 2023: Unraveling The Challenges Of Reverse Engineering Flutter Applications - A. Apvrille
BlackAlps CyberSecurityConference
BlackAlps 2023: Unraveling The Challenges Of Reverse Engineering Flutter Applications - A. Apvrille
38:59
BlackAlps 2023: Defeating VPN Always-On - Maxime Clementz
BlackAlps CyberSecurityConference
BlackAlps 2023: Defeating VPN Always-On - Maxime Clementz
45:08
BlackAlps 2023: Command-line Obfuscation Detection Using Large Language Models - M. Polak V. Outrata
BlackAlps CyberSecurityConference
BlackAlps 2023: Command-line Obfuscation Detection Using Large Language Models - M. Polak V. Outrata
33:26
Black Alps 2023: Needles In The Haystack: A Hueristics-based Approach To Vuln. Discovery
BlackAlps CyberSecurityConference
Black Alps 2023: Needles In The Haystack: A Hueristics-based Approach To Vuln. Discovery
48:34
BlackAlps 2023: Quantum Computing Doomsday Planning: Is Your Organisation Ready?
BlackAlps CyberSecurityConference
BlackAlps 2023: Quantum Computing Doomsday Planning: Is Your Organisation Ready?
32:44
BlackAlps 2023: Ghidriff: Ghidra Binary Diffing Engine - John Mac
BlackAlps CyberSecurityConference
BlackAlps 2023: Ghidriff: Ghidra Binary Diffing Engine - John Mac
46:24
BlackAlps 2023: XORtigate: Zero-Effort, Zero-Expense, 0-Day On Fortinet SSL VPN - Charles Fol
BlackAlps CyberSecurityConference
BlackAlps 2023: XORtigate: Zero-Effort, Zero-Expense, 0-Day On Fortinet SSL VPN - Charles Fol
30:10
Black Alps 2023: Opening Words - Sylvain Pasini
BlackAlps CyberSecurityConference
Black Alps 2023: Opening Words - Sylvain Pasini
13:41
BlackAlps 2023: Infiltrating Kubernetes: A Study Of Attack Scenarios & Security - Magno Logan
BlackAlps CyberSecurityConference
BlackAlps 2023: Infiltrating Kubernetes: A Study Of Attack Scenarios & Security - Magno Logan
39:11
Black Alps 2023: The Express Lane To Catastrophe: Insights From Extensive Security Testing
BlackAlps CyberSecurityConference
Black Alps 2023: The Express Lane To Catastrophe: Insights From Extensive Security Testing
16:59
BlackAlps 2023: A Security Research Journey: How The Mobile Industry Met Hackers In The Middle
BlackAlps CyberSecurityConference
BlackAlps 2023: A Security Research Journey: How The Mobile Industry Met Hackers In The Middle
39:12
BlackAlps 2023: Sideloading Serenade: A Symphony Of .NET Payload Techniques
BlackAlps CyberSecurityConference
BlackAlps 2023: Sideloading Serenade: A Symphony Of .NET Payload Techniques
42:58
BlackAlps 2022: Opening Words by Sylvain Pasini
BlackAlps CyberSecurityConference
BlackAlps 2022: Opening Words by Sylvain Pasini
9:27
BlackAlps 2022: Improving Security Maturity With Bug Bounties by Martina Schwab
BlackAlps CyberSecurityConference
BlackAlps 2022: Improving Security Maturity With Bug Bounties by Martina Schwab
27:33
BlackAlps 2022: The Printer Goes Brrrr by Thomas Jeunet, Mehdi Talbi and Rémi Jullian
BlackAlps CyberSecurityConference
BlackAlps 2022: The Printer Goes Brrrr by Thomas Jeunet, Mehdi Talbi and Rémi Jullian
44:14
BlackAlps 2022: Firmwares Are Weird. A Year Long Journey To Efficient Extraction by Quentin Kaiser
BlackAlps CyberSecurityConference
BlackAlps 2022: Firmwares Are Weird. A Year Long Journey To Efficient Extraction by Quentin Kaiser
43:42
BlackAlps 2022: Benchmarking Memory Allocators by Julien Voisin
BlackAlps CyberSecurityConference
BlackAlps 2022: Benchmarking Memory Allocators by Julien Voisin
18:46
BlackAlps 2022: Hardware Attacks Against SM4 In Practice by Sylvain Pelissier and Nicolas Oberli
BlackAlps CyberSecurityConference
BlackAlps 2022: Hardware Attacks Against SM4 In Practice by Sylvain Pelissier and Nicolas Oberli
39:50
BlackAlps 2022: Generic Remote Exploit Techniques For The PHP Allocator, And 0days by Charles Fol
BlackAlps CyberSecurityConference
BlackAlps 2022: Generic Remote Exploit Techniques For The PHP Allocator, And 0days by Charles Fol
37:46
BlackAlps 2022: The Smart Home I Didn't Ask For by Nils Amiet
BlackAlps CyberSecurityConference
BlackAlps 2022: The Smart Home I Didn't Ask For by Nils Amiet
39:39
BlackAlps 2022: Ghidra Fault Emulation by Roman Korkikian
BlackAlps CyberSecurityConference
BlackAlps 2022: Ghidra Fault Emulation by Roman Korkikian
33:01
BlackAlps 2022: Opening Words (day 2) by Sylvain Pasini
BlackAlps CyberSecurityConference
BlackAlps 2022: Opening Words (day 2) by Sylvain Pasini
1:38
BlackAlps 2022: The Long And Winding Road To Secure Confidential Cloud Computing by Elena Reshetova
BlackAlps CyberSecurityConference
BlackAlps 2022: The Long And Winding Road To Secure Confidential Cloud Computing by Elena Reshetova
43:23
BlackAlps 2022: Some Cracks In The Linux Firewall by Arthur Mongodin
BlackAlps CyberSecurityConference
BlackAlps 2022: Some Cracks In The Linux Firewall by Arthur Mongodin
38:35
BlackAlps 2022: Exploiting Secrets - How Leaked Credentials Can Be Exploited by Mackenzie Jackson
BlackAlps CyberSecurityConference
BlackAlps 2022: Exploiting Secrets - How Leaked Credentials Can Be Exploited by Mackenzie Jackson
42:44
BlackAlps 2022: NTLM Relay: The Attack That Keeps On Giving by Sylvain Heiniger
BlackAlps CyberSecurityConference
BlackAlps 2022: NTLM Relay: The Attack That Keeps On Giving by Sylvain Heiniger
37:27
BlackAlps 2022: CSP, XSS, WTF? by Kevin Guerroudj and Wadeck Follonier
BlackAlps CyberSecurityConference
BlackAlps 2022: CSP, XSS, WTF? by Kevin Guerroudj and Wadeck Follonier
41:45
BlackAlps 2022: A Journey To Pwn And Own The Sonos One Speaker by Berard David
BlackAlps CyberSecurityConference
BlackAlps 2022: A Journey To Pwn And Own The Sonos One Speaker by Berard David
30:16
BlackAlps 2022: Vous N'écrirez Plus De Script Frida by Axelle Apvrille
BlackAlps CyberSecurityConference
BlackAlps 2022: Vous N'écrirez Plus De Script Frida by Axelle Apvrille
43:56
BlackAlps 2019 - Aftermovie
BlackAlps CyberSecurityConference
BlackAlps 2019 - Aftermovie
2:08
BlackAlps 2019: Google Bug Hunters - Eduardo Vela Nava
BlackAlps CyberSecurityConference
BlackAlps 2019: Google Bug Hunters - Eduardo Vela Nava
33:02
BlackAlps 2019: Blockchain Vulnerabilities And Exploitation In Practice - Nils Amiet
BlackAlps CyberSecurityConference
BlackAlps 2019: Blockchain Vulnerabilities And Exploitation In Practice - Nils Amiet
2:33:46
BlackAlps 2019: Fuzzing Java Code With The Help Of JQF - Tobias Ospelt
BlackAlps CyberSecurityConference
BlackAlps 2019: Fuzzing Java Code With The Help Of JQF - Tobias Ospelt
41:50
Black Alps 2019: PatrOwl-Red Flavour Of SOC Automation - Nicolas Mattiocco
BlackAlps CyberSecurityConference
Black Alps 2019: PatrOwl-Red Flavour Of SOC Automation - Nicolas Mattiocco
36:37
BlackAlps 2019: The Inner Guts Of A Connected Glucose Sensor For Diabetes - A Apvrille, T Goodspeed
BlackAlps CyberSecurityConference
BlackAlps 2019: The Inner Guts Of A Connected Glucose Sensor For Diabetes - A Apvrille, T Goodspeed
51:16
BlackAlps 2019: Swisscom Bug Bounty: Retour D'Un Chercheur - Daniel Le Gall
BlackAlps CyberSecurityConference
BlackAlps 2019: Swisscom Bug Bounty: Retour D'Un Chercheur - Daniel Le Gall
48:04
BlackAlps 2019: Ethereum: Taking Control of Smart Contracts - Olivier Kopp
BlackAlps CyberSecurityConference
BlackAlps 2019: Ethereum: Taking Control of Smart Contracts - Olivier Kopp
37:45
BlackAlps 2019: Battle In The Clouds: Attacker Vs. Defender On AWS - Dani Goland and Mohsan Farid
BlackAlps CyberSecurityConference
BlackAlps 2019: Battle In The Clouds: Attacker Vs. Defender On AWS - Dani Goland and Mohsan Farid
45:38
BlackAlps 2019: Computing On Encrypted Data: A Survey - Pascal Junod
BlackAlps CyberSecurityConference
BlackAlps 2019: Computing On Encrypted Data: A Survey - Pascal Junod
51:36
BlackAlps 2019: Hash Collision Exploitation - Ange Albertini
BlackAlps CyberSecurityConference
BlackAlps 2019: Hash Collision Exploitation - Ange Albertini
1:53:53
BlackAlps 2019: Maintaining Cryptographic Library for 11 languages - Anastasiia Voitova
BlackAlps CyberSecurityConference
BlackAlps 2019: Maintaining Cryptographic Library for 11 languages - Anastasiia Voitova
53:40
BlackAlps 2019: How To Find And Prevent Entire Classes Of Security Vulnerabilities - Sam Lanning
BlackAlps CyberSecurityConference
BlackAlps 2019: How To Find And Prevent Entire Classes Of Security Vulnerabilities - Sam Lanning
35:53
BlackAlps 2019: Building Your Own WAF As A Service And Forgetting About False Positives - J. Berner
BlackAlps CyberSecurityConference
BlackAlps 2019: Building Your Own WAF As A Service And Forgetting About False Positives - J. Berner
39:55
BlackAlps 2019: OS X RAM Forensic Analysis-Extracting Encryption Keys And Other Secrets - Léo Cortès
BlackAlps CyberSecurityConference
BlackAlps 2019: OS X RAM Forensic Analysis-Extracting Encryption Keys And Other Secrets - Léo Cortès
40:15
BlackAlps 2019: New Tales Of Wireless Input Devices - Matthias Deeg and Gerhard Klostermeier
BlackAlps CyberSecurityConference
BlackAlps 2019: New Tales Of Wireless Input Devices - Matthias Deeg and Gerhard Klostermeier
41:45
BlackAlps 2019: Opening Words - Sylvain Pasini
BlackAlps CyberSecurityConference
BlackAlps 2019: Opening Words - Sylvain Pasini
13:21
BlackAlps 2018 - Aftermovie
BlackAlps CyberSecurityConference
BlackAlps 2018 - Aftermovie
2:04
BlackAlps 2018: Group123: Korea In The Crosshairs - Paul Rascagneres
BlackAlps CyberSecurityConference
BlackAlps 2018: Group123: Korea In The Crosshairs - Paul Rascagneres
43:01
BlackAlps 2018: How To Provide Security Fixes In A High Constraint Ecosystem? - Wadeck Follonier
BlackAlps CyberSecurityConference
BlackAlps 2018: How To Provide Security Fixes In A High Constraint Ecosystem? - Wadeck Follonier
45:39
BlackAlps 2018: Reversing And Vulnerability Research Of Ethereum Smart Contracts - Patrick Ventuzelo
BlackAlps CyberSecurityConference
BlackAlps 2018: Reversing And Vulnerability Research Of Ethereum Smart Contracts - Patrick Ventuzelo
2:04:31
BlackAlps 2018: Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz
BlackAlps CyberSecurityConference
BlackAlps 2018: Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz
57:47
BlackAlps 2018: Let's Create A Redteam Mission - Alex Kouzmine
BlackAlps CyberSecurityConference
BlackAlps 2018: Let's Create A Redteam Mission - Alex Kouzmine
46:12
BlackAlps 2018 SE: Opening Words - Sylvain Pasini and Yohann Perron
BlackAlps CyberSecurityConference
BlackAlps 2018 SE: Opening Words - Sylvain Pasini and Yohann Perron
3:43
BlackAlps 2018 SE: Challenges Of Our Hospitals When Working With Connected Devices - P.-F. Regamey
BlackAlps CyberSecurityConference
BlackAlps 2018 SE: Challenges Of Our Hospitals When Working With Connected Devices - P.-F. Regamey
22:35
BlackAlps 2018 SE: State Of The Art In Security Applied To An Insulin Pump - Stephan Proennecke
BlackAlps CyberSecurityConference
BlackAlps 2018 SE: State Of The Art In Security Applied To An Insulin Pump - Stephan Proennecke
23:20
BlackAlps 2018 SE: Current Status Of Regulations On Cybersecurity For Medical Devices - Kim Rochat
BlackAlps CyberSecurityConference
BlackAlps 2018 SE: Current Status Of Regulations On Cybersecurity For Medical Devices - Kim Rochat
16:25
BlackAlps 2018 SE: Round Table - Pierre-François Regamey,Stephan Proennecke and Kim Rochat
BlackAlps CyberSecurityConference
BlackAlps 2018 SE: Round Table - Pierre-François Regamey,Stephan Proennecke and Kim Rochat
25:06
BlackAlps 2018: Nail In The JKS Coffin - Tobias Ospelt
BlackAlps CyberSecurityConference
BlackAlps 2018: Nail In The JKS Coffin - Tobias Ospelt
32:56
BlackAlps 2018: Cryptocurrency Mobile Malware - Axelle Apvrille
BlackAlps CyberSecurityConference
BlackAlps 2018: Cryptocurrency Mobile Malware - Axelle Apvrille
44:58
BlackAlps 2018: Unlocking Secrets Of The Proxmark3 RDV4.0 - Christian Herrmann And Kevin Barker
BlackAlps CyberSecurityConference
BlackAlps 2018: Unlocking Secrets Of The Proxmark3 RDV4.0 - Christian Herrmann And Kevin Barker
49:27
BlackAlps 2018: Challenges And Opportunities In Cloud Security - Scott Piper
BlackAlps CyberSecurityConference
BlackAlps 2018: Challenges And Opportunities In Cloud Security - Scott Piper
37:26
BlackAlps 2018: Application Level DDoS The Rise Of CDNs And The End Of The Free Internet - C. Folini
BlackAlps CyberSecurityConference
BlackAlps 2018: Application Level DDoS The Rise Of CDNs And The End Of The Free Internet - C. Folini
52:38
BlackAlps 2018: Dilemmas Everywhere! Get It Right Or Get Pwned - Ethan Schorer
BlackAlps CyberSecurityConference
BlackAlps 2018: Dilemmas Everywhere! Get It Right Or Get Pwned - Ethan Schorer
45:43
BlackAlps 2018: Build Your Own Hardware Implant - Nicolas Oberli
BlackAlps CyberSecurityConference
BlackAlps 2018: Build Your Own Hardware Implant - Nicolas Oberli
47:38
BlackAlps 2018: Switzerland Has Bunkers, We Have Vault - Christophe Tafani-Dereeper
BlackAlps CyberSecurityConference
BlackAlps 2018: Switzerland Has Bunkers, We Have Vault - Christophe Tafani-Dereeper
48:54
BlackAlps 2018: Opening by Sylvain Pasini, president of BlackAlps
BlackAlps CyberSecurityConference
BlackAlps 2018: Opening by Sylvain Pasini, president of BlackAlps
14:18
BlackAlps 2017 - Aftermovie
BlackAlps CyberSecurityConference
BlackAlps 2017 - Aftermovie
1:25
BlackAlps17: From zero to sixty in 3 years by Jad Boutros
BlackAlps CyberSecurityConference
BlackAlps17: From zero to sixty in 3 years by Jad Boutros
47:57
BlackAlps17: Hydrabus: Lowering the entry fee to the IoT bugfest by Benjamin Vernoux
BlackAlps CyberSecurityConference
BlackAlps17: Hydrabus: Lowering the entry fee to the IoT bugfest by Benjamin Vernoux
26:44
BlackAlps17: Snuffleupagus: Killing bug classes in PHP7, virtual patching the rest
BlackAlps CyberSecurityConference
BlackAlps17: Snuffleupagus: Killing bug classes in PHP7, virtual patching the rest
47:15
BlackAlps17: Java JSR 241 and 341-RCE state of mind by Gregory Draperi
BlackAlps CyberSecurityConference
BlackAlps17: Java JSR 241 and 341-RCE state of mind by Gregory Draperi
35:48
BlackAlps17: Fingerprint all the things with scannerl by Adrien Giner
BlackAlps CyberSecurityConference
BlackAlps17: Fingerprint all the things with scannerl by Adrien Giner
38:14
BlackAlps17: Leveraging threat modeling for improved information risk management
BlackAlps CyberSecurityConference
BlackAlps17: Leveraging threat modeling for improved information risk management
38:53
BlackAlps17: Down the rabbit hole: how hackers exploit weak SSH credentials to build DDos botnets
BlackAlps CyberSecurityConference
BlackAlps17: Down the rabbit hole: how hackers exploit weak SSH credentials to build DDos botnets
30:07
BlackAlps17: Parsing JSON is a minefield by Nicolas Seriot
BlackAlps CyberSecurityConference
BlackAlps17: Parsing JSON is a minefield by Nicolas Seriot
47:36
Let's play with WinDBG & .NET by Paul Rascagneres
BlackAlps CyberSecurityConference
Let's play with WinDBG & .NET by Paul Rascagneres
44:28
BlackAlps17: Smoking the Locky ransomware code by Rommel Joven
BlackAlps CyberSecurityConference
BlackAlps17: Smoking the Locky ransomware code by Rommel Joven
49:23
BlackAlps17: Improvements to internet voting in Geneva by Thomas Hofer
BlackAlps CyberSecurityConference
BlackAlps17: Improvements to internet voting in Geneva by Thomas Hofer
46:28
BlackAlps17: Security review of proximity technologies - Beacons and physical web by Renaud Lifchitz
BlackAlps CyberSecurityConference
BlackAlps17: Security review of proximity technologies - Beacons and physical web by Renaud Lifchitz
44:41
BlackAlps17: 16 ans de (Cyber)-Sécurité en Suisse Romande : évolutions, perspectives
BlackAlps CyberSecurityConference
BlackAlps17: 16 ans de (Cyber)-Sécurité en Suisse Romande : évolutions, perspectives
49:53
BlackAlps17: Exploiting Hash Collisions by Ange Albertini
BlackAlps CyberSecurityConference
BlackAlps17: Exploiting Hash Collisions by Ange Albertini
51:37