This event, part of the broader conference happening in Brno from April 27–29, shifts the focus from back-end server exploits to the vulnerabilities hiding in plain sight on our screens. What to Expect: Beyond the Command Line
While traditional hacking often conjures images of green text on a black terminal, this session explores how attackers manipulate the visual elements we trust. Key topics include:
As we move into an era where even AI-driven platforms like are being targeted through their access points, understanding the GUI is no longer optional for security professionals. This event offers a rare chance to see these "high-stakes, futuristic tech interface" attacks in a controlled, educational environment.
This event, part of the broader conference happening in Brno from April 27–29, shifts the focus from back-end server exploits to the vulnerabilities hiding in plain sight on our screens. What to Expect: Beyond the Command Line
While traditional hacking often conjures images of green text on a black terminal, this session explores how attackers manipulate the visual elements we trust. Key topics include:
As we move into an era where even AI-driven platforms like are being targeted through their access points, understanding the GUI is no longer optional for security professionals. This event offers a rare chance to see these "high-stakes, futuristic tech interface" attacks in a controlled, educational environment.