Shmuel Cohen: The Dark Side of EDR: Repurpose EDR as an Offensive Tool | CONFidence
Raunak Parmar: Hacker's communicative from Reader to Global Admin in Azure | CONFidence
Geri Revay: Don’t flatten yourself: deobfuscating malware with Control-Flow Flattening | CONFidence
Szymon Chadam: Elektroniczny, ale czy bezpieczny? Hackowanie nowego mObywatela 2.0 | CONFidence
Piotr Jabłoński: Istio's safety policy breach | CONFidence
Hiroshi Takeuchi: Beyond Attack Surface Management (ASM) | CONFidence
Rohit Sehgal: Beyond the Kernel: eBPF's Trailblazing function in Reinventing Cloud safety Dynamics
Jakub Strykowski: Reinforcement Learning może zarówno grać w DOOMa, jak i atakować sieci
Krystian Matusiewicz, Daria Danieluk: How many bits of safety do you have? | CONFidence
Alon Leviev: The Pool organization You Will Never Forget | CONFidence