Join us for an evening of relaxed networking, conversation, and connection with the local cyber and tech community. OxCyber Socials are designed to bring together cybersecurity professionals, tech ...
TL;DR Why Discord appeals to attackers Discord has become an attractive tool for attackers not because it’s malicious, but ...
TL;DR What is CHECK, when should you use it, and why? CHECK is NCSC’s assurance scheme for penetration testing. It began as a way for government and critical systems to be tested safely, but any ...
Witness firsthand how an AI tool can be compromised in this revealing and practical demonstration. This 30-minute session will move beyond theoretical discussions, showcasing live exploitation ...
Red teaming has always thrived on creativity, unpredictability, and a touch of chaos. But with AI in the mix, both the red (and blue) teams have to work harder to stay ahead. From automated generation ...
Ken Munro is presenting at 11:45 on Track 1: All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship. Cruise ships are among the most complex environments you’ll ...
If you haven’t read the previous posts, I would recommend them as a primer to the devices, BLE and what we’re doing. In part one, we made a low-cost key finder beep by capturing and replaying BLE ...
This is the next post in our Android 101 series. Today we are looking at broadcast receivers. If you are catching up, start with Android services 101 for background components and scheduling, then ...
In part one we started hacking Bluetooth and made a little £2 key-finder beep using only Android and Linux. If you haven’t read that post, I would recommend it as a primer to the devices, BLE and what ...