Stanislav Kolenkin

»Introduction lstio Service Mesh«


Bohdan Lukin

»Web Application Firewall bypass techniques Workshop«


Kostiantyn Sanduliak

»Subdomain discovering as an essential part of the reconnaissance phase«


Arthur Hil

»Email as an initial attack vector«


Artem Storozhuk

»Building SQL firewall: insights from developers«


Svyatoslav Login

»OWASP Top-10 A2: Broken Authentication«


Vlad Styran

»Application Threat Modeling«