Voice-based biometric security, CRA, intro to database cryptography, debugging features & techniques, etc.
RAT malware, fuzzing in IoT, reversing UK rail e-tickets, side-channel in Django, etc.
Password security, SSRF vulnerabilities in SNI proxies, Bitwarden design flaw, fuzzing cURL’s CLI, etc.
Email security, exploiting URL parsers, migration challenges, USB-based espionage, applied cryptography, etc.
ZKP failures, hacking auto, mobile app development frameworks, secure software supply chains, etc.
Encryption on GitHub, smart contract security audit, Wi-Fi security, memory safe issues in Android, etc.
Threat model examples, subdomain takeovers, FBI cyber fails, foreign adtech threats, etc.
OTP, backdoors in ML systems, building software like a SRE, who controls the internet, etc.
Web browser security, logging at Uber, browser-powered desync attacks, Wi-Fi spy drones, etc.
Zero trust, cryptographic agility, infrastructure as code, Windows 11 post exploitation technique, etc.