Common attack paths in identifying GHA vulns, how quickly AWS tokens are found by location, resources for red teamers and defenders
Skim >60 talks in ~15min, oodles of IAM tool-dles, all the tools ransomware gangs use
Get up to speed on >60 AI talks in 15 minutes
A list of all of the talks, abstracts, recordings, slides, papers, and tools for the Main Track and >10 villages
A list of all of the talks, abstracts, recordings, slides, papers, and tools from BSidesLV and BlackHat USA
Slides for some solid Vegas talks, threat modeling enterprise AI, open source templates to bootstrap your security programs
Across web security, cloud, supply chain, and AI
How to build a cost-effective, scalable detection engine, have LLMs write detections for you, understanding AWS session token internals
The best context I've found on what happened, an opinionated guide to become an AWS pentester, a new platform for grokking open security detection rules
Big list of q's, how to build a team of security builders, reviewing all PRs with an LLM
Measuring LLM's ability to find vulnerabilities, massive collection of APT reports, how to get started in memory corruption & exploitation
Interview resources, >55 talks on AI and more, a GitHub Action to limit data exfiltration