Exploiting Copilot AI for SharePoint

Social Engineering Dos and Don'ts

Smart male chastity lock cock-up

Breaking Samsung Firmware, or Turning Your S8/S9/S10 into a DIY “Proxmark”

You can't build a great IoT system without a strong foundation

Group sex app leaks locations, pics and personal details. Identifies users in White House and Supreme Court

Pen Testing Ships. A year in review

Drilling open a smart door lock in 4 seconds

Group sex app leaks locations, pics and details. White House and Supreme Court

Burning down the house with IoT

Gone in six seconds? Exploiting car alarms

Hacking a Nerf Assault Tank

Totally Pwning the Tapplock Smart Lock

If you aren't soldering, you probably aren't testing IoT thoroughly

NoT: Taking the ‘Internet’ Out of IoT

Sinking container ships by hacking load plan software

Screwdriving. Locating and exploiting smart adult toys

Breaking Out of Citrix and other Restricted Desktop Environments

Vulnerable Wi-Fi dildo camera endoscope. Yes really

Mitsubishi PHEV hybrid theft alarm only protected by a short, simple WPA2 PSK

Backdoor in DVR firmware sends CCTV camera snapshots to email address in China

Ring Doorbell Vulnerability Exposes Wifi Password