Welcome Note - Antriksh Shah Spreading The Load: Building A Better Hardware Hacking Community - Kate Temkin Strategies To Harden And Neutralize UAV Using RF DEW - José Lopes Esteves The Race To Secure Texas Instruments Graphing Calculators - Brandon Wilson It WISN't Me, Attacking Industrial Wireless Mesh Networks - Erwin Paternotte And Mattijs Van Ommeren There Goes Your PIN - Exploiting Smartphone Sensor Fusion Under Single And Cross User Setting - David Berend Smart Car Forensics And Sensor Warfare - Gabriel Cirlig And Stefan Tanase TLBleed: When Protecting Your CPU Caches Is Not Enough - Ben Gras And Kaveh Razavi CXO Panel - Who Needs IoT Security Certification? - People The Future Of Hardware Security Is In Open Standards - Helena Handschuh The Undercover World Of Reverse-Engineering Based Integrated Circuit Attacks - Olivier Thomas Z-Shave. Exploiting Z-Wave Downgrade Attacks - Andrew Tierney Bitfi - You Wouldn't Steal My Cloins - Andrew Tierney Fault Injection On Automotive Diagnosis Protocols - Santiago Cordoba Black Box Is Dead. Long Live Black Box! - Vladimir Kononovich And Aleksei Stennikov Product Security For IoT: Mission Impossible? - Alex Poschmann Closing Note And Prizes - Hardwear.io Crew
FEATURES
ALTERNATIVES
Syntax, indent, and filetype detection for YARA rule files with auto-indenting and error display in quickfix window.
The OWASP AppSec Europe '16 Conference is a leading gathering in web application security, featuring keynote speakers and in-depth trainings in application security topics.
Certificate Transparency Monitor that alerts you when an SSL/TLS certificate is issued for your domains.
A microservice for string padding to prevent global issues like the left-pad incident.
A visualization tool for uploading and visualizing data as graphs on-the-fly, based on AfterGlow and running on Django.
A company that helps organizations create security-aware teams and produce bug-free software.
PINNED

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

OSINTLeak
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.