Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Data Analysis
Digital Marketing
Medical Neuroscience
Best Practices for Biomedical Research Data Management (HE)
Organic Chemistry 1
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from Black Hat. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore vulnerability research on Google's Titan M security chip, including fuzzing techniques, impact analysis, and mitigation strategies for modern device protection.
Unveils critical API vulnerabilities in 4G/5G networks, exposing risks for AI, MEC, and IoT applications. Explores attack vectors, security misconfigurations, and potential exploits in commercial providers' systems.
Explore new lateral movement techniques in Azure AD joined machines, including Pass-The-Certificate attacks and hunting solutions for enhanced network security.
Learn to build and operate a privacy red team, exploring its unique challenges and benefits for enhancing organizational privacy defenses through offensive techniques and real-world examples.
Explore pre-silicon power simulations to detect cryptographic side channel leakage in hardware designs, with case studies on identifying and mitigating vulnerabilities in software and hardware implementations.
Explore the evolution of bug bounty programs, their impact on cybersecurity, and future directions. Gain insights into challenges, best practices, and alternative solutions for ethical hackers and organizations.
Explore advanced kernel hardening techniques, focusing on CFI and UAF defense. Learn about new approaches to enhance OS security against evolving exploitation methods.
Explore advanced techniques for bypassing Control Flow Guard (CFG) in Chrome, including analysis of previous methods and examination of current vulnerabilities.
Uncover critical Azure Cosmos DB vulnerability allowing unauthorized admin access to thousands of customer databases. Learn about the discovery, exploitation, and implications of this unprecedented cloud security flaw.
Explore TeamTNT's cryptojacking tactics targeting Linux servers, including their attack methods, credential theft, and evolution from Docker instances to Windows systems.
Explore AD CS vulnerabilities, attack vectors, and defense strategies for securing Microsoft's PKI implementation. Learn escalation scenarios, auditing techniques, and incident response.
Explore security concerns in machine learning integration, including data extraction, model evasion, and biased outcomes. Learn operational guidance and tools for addressing these challenges.
Uncover HTTP/2 vulnerabilities and their impact on web security. Learn about implementation flaws, RFC imperfections, and new attack techniques targeting high-profile websites and various server infrastructures.
Explore Windows Defender's undocumented signature format, learn ASR rule implementation, and discover techniques for signature evasion in this comprehensive security analysis.
Explore new attack surfaces in Wi-Fi Mesh networks, focusing on EasyMesh vulnerabilities. Learn about network build and control attacks, and discover MeshFuzzer for identifying security flaws.
Get personalized course recommendations, track subjects and courses with reminders, and more.