-
#INFILTRATE20 Speaker Highlight: Amy Burnett(@itszn13) will be presenting 'Diverting the Exploit Flow: On Browser Mitigation Effectiveness' https://infiltratecon.com/conference/speakers/amy-burnett.html … pic.twitter.com/VQGjzdeOKn
-
We are pleased to announce INFILTRATE 2020 speaker Nitay Artenstein (
@nitayart) presenting: The Promised Band: Winning Android Fragmentation with a MediaTek Baseband RCE https://infiltratecon.com/conference/speakers/nitay-artenstein.html ….#INFILTRATE20 pic.twitter.com/uzbm14Ee5j
-
New training course alert!– Azeria Labs: Advanced IoT Exploit Development for ARM 32-bit. Sign up now before seats sell out!
@Fox0x01#Infiltrate20 https://infiltratecon.com/conference/training/azeria-labs-iot-exploit-development-for-arm-32-bit.html …#Infiltrate20 -
We are pleased to announce our first two INFILTRATE 2020 speakers: Marco Ivaldi (
@0xdea) presenting: The INFILTRATE Effect: 6 Bugs in 6 Months & William Woodruff (@8x5clPW2) presenting: Destroying x86_64 Decoders with Differential Fuzzing. https://infiltratecon.com/conference/speakers.html …#INFILTRATE20 pic.twitter.com/ziybbvySQA
-
We are excited to announce Cristina Cifuentes of Oracle Labs Australia as the keynote speaker for INFILTRATE 2020. https://infiltratecon.com/conference/speakers/cristina-cifuentes.html …
#Infiltrate20 pic.twitter.com/V8EPBdoZHN
-
Unleash your inner reverse engineering dragon with Jeremy Blackthorne's Ghidra Training at
#INFILTRATE20! For more information, visit https://infiltratecon.com/conference/training/reverse-engineering-with-ghidra.html …@0xJeremy -
See you in Miami! This year I’ll talk about how to get from zero to zeroday. Not much information on how to become a vulnerability researcher out there, let’s change that!
#INFILTRATE20 https://twitter.com/InfiltrateCon/status/1220780633363972098 …
-
#INFILTRATE20 Speaker Highlight: Jonathan Afek (@JonathanAfek) will be presenting 'Simplifying iOS Research: Booting the iOS Kernel to an Interactive Bash Shell on QEMU' https://infiltratecon.com/conference/speakers/jonathan-afek.html … pic.twitter.com/V52jvW5hmq
-
#INFILTRATE20 Training Update: Azeria Labs (@Fox0x01): Advanced IoT Exploit Development for ARM 32-bit is officially SOLD OUT! But Jeremy Blackthorne (@0xJeremy): Reverse-Engineering with Ghidra is not. Register today! https://infiltratecon.com/conference/training.html … pic.twitter.com/iDCXC799ec
-
Low Ticket Alert! Azaria Labs (
@Fox0x01): Advanced IoT Exploit Development for Arm 32-bit training class has only 4 seats left.#INFILTRATE20 https://infiltratecon.com/conference/training.html … pic.twitter.com/qYRVg0HPVO
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.