We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Nullcon Berlin 2024

Search

Clear Expand Collapse

Breaking RSA Authentication & Bitstream Recovery

Arpan Jati reveals critical vulnerabilities in Xilinx's Zynq-7000 SoC platform, demonstrating RSA authentication bypass and encrypted bitstream recovery techniques that impact critical infrastructure security.

Price
Course duration Duration: 40 minutes

EV Charging Stations Security

Join Kaspersky's Stephan Gerling as he explores critical vulnerabilities in EV charging infrastructure, from physical security to OCPP protocol weaknesses and payment system vulnerabilities.

Price
Course duration Duration: 35 minutes

Fault Injection and the Supply Chain

DirectDefense's Nolen Johnson and OSOM's Jan Altensen reveal critical vulnerabilities in Amlogic devices, demonstrating how fault injection attacks can compromise supply chain security through eMMC manipulation.

Price
Course duration Duration: 35 minutes

Hacking Trains

Security engineer Jaden Furtado reveals critical vulnerabilities in modern railway systems, examining control systems, mobile applications and supply chain security concerns in railway infrastructure.

Price
Course duration Duration: 45 minutes

Hi, My Name Is Keyboard

SkySafe's Marc Newlin uncovers Bluetooth keyboard vulnerabilities, demonstrating novel link key extraction techniques and zero-click keystroke injection affecting major operating systems.

Price
Course duration Duration: 35 minutes

How Secure Is Your Stuff in Electronic Lockers?

Security researcher Dennis Giese exposes critical vulnerabilities in Digilog electronic locks, demonstrating rapid PIN extraction and master key cloning techniques that threaten shared-space security systems.

Price
Course duration Duration: 35 minutes

How Things Are Going for APT41 in 2024

Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.

Price
Course duration Duration: 30 minutes

Looking in the Rear View Mirror After 25 Years in the Industry

Agarri Founder Nicolas Grégoire shares 25 years of industry insights, tracing the evolution of vulnerability research, security tools and bug bounty programs from 1999 to 2024.

Price
Course duration Duration: 45 minutes

Printer Hacking Adventures

HAXXIN's Peter Geissler demonstrates advanced printer exploitation techniques, covering firmware analysis, privilege escalation and custom debugging tools for embedded platforms.

Price
Course duration Duration: 45 minutes

Responsible Disclosure & (Legal) Risks for Security Researchers

Join industry experts Jan Tilo Kirchhoff, Andreas Bogk, Diana Nadeborn and Michał Kowalczyk for an insightful discussion on legal frameworks, recent cases and strategies for responsible vulnerability disclosure across Europe.

Price
Course duration Duration: 25 minutes

The Complexity of Reversing Flutter Applications

Fortinet's Axelle Apvrille explores the challenges of analyzing Flutter applications, covering Dart compilation strategies and practical techniques for mobile app security analysis.

Price
Course duration Duration: 40 minutes

The World of Spyware for Rent

Quarkslab Founder Fred Raynal examines the evolution of commercial surveillance tools, from SMS attacks to zero-click exploits, revealing how spyware impacts global security and privacy.

Price
Course duration Duration: 50 minutes

Uncovering IPC Vulnerabilities on MacOS

Dillon Franke of Mandiant/Google demonstrates advanced techniques for identifying IPC vulnerabilities in macOS, covering sandbox-allowed communications and mutation-based fuzzing methodologies.

Price
Course duration Duration: 45 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement