Secure Development
Secure coding practices, supply chain security, static analysis, threat modeling, countermeasures, SDLC, and DevSecOps
Mobile Security
Mobile development, testing methodologies, and securing mobile web applications
Cloud Security
Offensive and defensive approaches to securing cloud-based applications
Applicative Infrastructure Security
Database security, serverless frameworks, identity management, and container security
Penetration Testing
Techniques, tools, exploit development, and evasion strategies
Emerging Web Technologies
Security challenges in new frameworks and technologies
IoT Security
Securing connected devices and Internet of Things ecosystems
Applied Cryptography
Research, algorithm usage, and cryptographic attacks or defenses
Incident Response
Threat detection, triage, forensics, and malware analysis
OWASP Tools and Projects
Real-world implementations and success stories
Policy and Legal
Privacy, compliance, and high-level security considerations
Fun Hacks and Creative Ideas
Cool exploits, social engineering, and more