System
Light
Dark
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Search for "Kay" returned 3681 results
previous page
Sort by
Newest first
Oldest first
Relevance
next page
44 min
Preach it don´t breach it -Cyber Security and Data Protection as partner in crime
Security
44 min
2023-06-10
95
Kerstin Böller
Gulaschprogrammiernacht 21
31 min
OWASP Juice Shop 10th anniversary: Is it still fresh?
OWASP
Saal 1
31 min
2024-11-13
161
Jannik Hollenbach
German OWASP Day 2024
40 min
The World in 24 Hours Revisited
How to re-enact a 1982 network art performance
40 min
2017-08-06
142
Josephine Bosma
SHA2017: Still Hacking Anyway
58 min
Infrastructure review
MCH2022 Curated content
58 min
2022-07-26
1.5k
Bix
and
RFguy
May Contain Hackers 2022
28 min
Cryptography is easy, but no magic. Use it. Wisely.
MCH2022 Curated content
28 min
2022-07-26
505
Lord BugBlue
May Contain Hackers 2022
53 min
Lightning Talks Tuesday
MCH2022 Curated content
53 min
2022-07-26
98
May Contain Hackers 2022
30 min
Where did all the parts go - the 202x component availability trashfire
MCH2022 Curated content
30 min
2022-07-26
1.2k
Kliment
May Contain Hackers 2022
48 min
A Smart Light Hacking Journey
MCH2022 Curated content
48 min
2022-07-26
453
Khaled Nassar
and
Tom "Halcyon" Clement
May Contain Hackers 2022
31 min
Reproducible Builds for Trustworthy Binaries
MCH2022 Curated content
31 min
2022-07-25
128
raboof
May Contain Hackers 2022
42 min
Payment terminals as general purpose (game-)computers
MCH2022 Curated content
42 min
2022-07-25
805
Thomas Rinsma
May Contain Hackers 2022
48 min
TASBot OoT ACE:
How to get the Triforce on an N64 via controller input
MCH2022 Curated content
48 min
2022-07-25
199
dwangoAC
May Contain Hackers 2022
50 min
Tech didn’t cause misinformation, and it won’t solve it (by itself)
MCH2022 Curated content
50 min
2022-07-25
206
Christopher Guess
May Contain Hackers 2022
41 min
Audio networks and their security implications
MCH2022 Curated content
41 min
2022-07-25
211
pcwizz
May Contain Hackers 2022
51 min
Fault Injection on a modern multicore System on Chip
MCH2022 Curated content
51 min
2022-07-24
268
Sergei Volokitin
and
Ronan Loftus
May Contain Hackers 2022
41 min
Finding 0days in Enterprise Web Applications
MCH2022 Curated content
41 min
2022-07-24
425
Shubham Shah
May Contain Hackers 2022
43 min
Building modern and robust Web-Applications in 2021, without writing any JavaScript
MCH2022 Curated content
43 min
2022-07-24
298
Franz Bettag
May Contain Hackers 2022
48 min
Hacking the pandemic's most popular software: Zoom
MCH2022 Curated content
48 min
2022-07-24
502
Thijs Alkemade
and
Daan Keuper
May Contain Hackers 2022
30 min
IRMA and Verifiable Credentials
MCH2022 Curated content
30 min
2022-07-24
99
Daniel Ostkamp
May Contain Hackers 2022
48 min
Taking Action against SLAPPs in Europe
MCH2022 Curated content
48 min
2022-07-23
82
Naomi Colvin
May Contain Hackers 2022
48 min
Lightning Talks Saturday
MCH2022 Curated content
48 min
2022-07-23
257
May Contain Hackers 2022
44 min
OpenRAN – 5G hacking just got a lot more interesting
MCH2022 Curated content
44 min
2022-07-23
5.3k
Karsten Nohl
May Contain Hackers 2022
45 min
M̶a̶y̶ Will Contain Climate Change
MCH2022 Curated content
45 min
2022-07-22
584
Igor Nikolic
May Contain Hackers 2022
36 min
Lightning Talks Friday
MCH2022 Curated content
36 min
2022-07-22
193
May Contain Hackers 2022
45 min
Information Centric Networking
A radically new paradigm for the future internet
45 min
2012-05-19
39
Claudio Imbrenda
sigint12
39 min
Using deployment diagrams to explain architecture and security to everybody
Wonderful creations
Cassiopeia
39 min
2025-08-11
100
Peter van Eijk
What Hackers Yearn 2025
previous page
next page