Editor's Picks
Best Talks at DEF CON 32 Main Stage
Hand-picked from in-depth reviewer verdicts — the top 12 talks from this conference. Skip the noise, find the signal.
-
1
Breaking Secure Web Gateways for Fun and Profit
Vivek Ramachandran, Jeswin Mathai
In "Breaking Secure Web Gateways for Fun and Profit," Vivek Ramachandran, joined by Dashita (and Jeswin Mathai in spirit), delivered a compelling and critical analysis of **Secure Web Gateways (SWGs)**, a foundational component of enterprise web security. The talk dissects the…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
2
DEF CON Closing Ceremonies & Awards
Unknown
The DEF CON 32 Closing Ceremonies, delivered by an unnamed but clearly central figure in the conference's organization, served as more than just a wrap-up; it was a strategic declaration of intent and a rallying cry for the global cybersecurity community. Under the overarching…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
3
Securing CCTV Cameras Against Blind Spots
Jacob Shams
In the realm of modern surveillance, Artificial Intelligence (AI)-powered object detectors are increasingly deployed in Closed-Circuit Television (CCTV) systems to automate threat detection and enhance security. However, this talk, "Securing CCTV Cameras Against Blind Spots" by…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
4
Sshamble Unexpected Exposures in the Secure Shell
HD Moore, Rob King
In "Sshamble Unexpected Exposures in the Secure Shell," HD Moore and Rob King from runZero delve into the intricate and often overlooked security landscape of the Secure Shell (SSH) protocol. Prompted by the high-profile XZ Utils backdoor (CVE-2024-3094), their research began…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
5
Splitting the email atom exploiting parsers to bypass access controls
Gareth Heyes
In "Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls," Gareth Heyes, a prominent security researcher, delves into the often-overlooked complexities and inherent vulnerabilities within email address parsing. The talk meticulously uncovers how discrepancies…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
6
AMD Sinkclose-Universal Ring2 Privilege Escalation
Enrique Nissim, Krzysztof Okupski
This talk, "AMD Sinkclose-Universal Ring2 Privilege Escalation," delivered by Enrique Nissim and Krzysztof Okupski at DEF CON 32, reveals a critical architectural flaw present in AMD processors for at least 18 years. The presentation details a novel method to achieve **Ring2…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
7
The XZ Backdoor Story: The Undercover Op That Set the Internet on Fire
Thomas Roccia
The XZ Backdoor story represents one of the most sophisticated and alarming supply chain attacks ever uncovered, a testament to the persistent and insidious nature of modern cyber threats. Presented by Thomas Roccia, a Senior Threat Researcher at Microsoft, this talk delves…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
8
Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op
Jon DiMaggio
In a groundbreaking talk at DEF CON 32, cybersecurity expert Jon DiMaggio of Analyst One unveiled an unprecedented methodology for infiltrating one of the world's most prolific ransomware operations: LockBit. Shifting away from traditional technical analysis, DiMaggio detailed…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
9
AWS CloudQuarry: Digging for secrets in public AMIs
Eduard Agavriloae, Matei Josephs
This talk, "AWS CloudQuarry: Digging for secrets in public AMIs," presented by Eduard Agavriloae and Matei Josephs, unveils a widespread security vulnerability stemming from misconfigured public Amazon Machine Images (AMIs). An **AMI** serves as a template for launching Amazon…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
10
Unsaflok: Hacking millions of hotel locks
Lennert Wouters, Ian Carroll
In a groundbreaking presentation at DEF CON 32, security researchers Lennert Wouters and Ian Carroll unveiled "Unsaflok," a critical vulnerability impacting millions of hotel locks manufactured by Dormakaba. Their research exposed a fundamental design flaw in the widely…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
11
Nano Enigma Uncovering the Secrets in eFuse Memories
Michal Grygarek, Martin Petr
In the realm of embedded system security, hardware-based protections are often considered the strongest line of defense. Among these, **eFuse memories** play a critical role, serving as one-time programmable (OTP) storage for immutable configurations such as secure boot keys…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★ -
12
Compromising Electronic Logger & Creating Truck2Truck Worm
Jake Jepson, Rik Chatterjee
Jake Jepson and Rik Chatterjee, master’s students from Colorado State University, presented groundbreaking research at DEF CON 32 detailing the first known wireless drive-by attack on a heavy-duty truck. Their talk, "Compromising Electronic Logger & Creating Truck2Truck Worm,"…
0 Dr. Zero MUST SEE ★★★★★ H Heather Calloway MUST SEE ★★★★★