Stanislav Kolenkin

»Introduction lstio Service Mesh«


Svyatoslav Login

»OWASP Top-10 A2: Broken Authentication«


Arthur Hil

»Email as an initial attack vector«


Vlad Styran

»Application Threat Modeling«


Kostiantyn Sanduliak

»Subdomain discovering as an essential part of the reconnaissance phase«


Artem Storozhuk

»Building SQL firewall: insights from developers«


Bohdan Lukin

»Web Application Firewall bypass techniques Workshop«