| 2015-11-25 | The Chinese Cybercriminal Underground in 2015 | ourren | 2844 | |
| 2015-11-24 | Markov Chains as a Keyed Obfuscation Method | tolive | 2343 | |
| 2015-11-21 | The Landscape of Internet Threats | ourren | 2552 | |
| 2015-11-21 | 我的通行你的证:cookie安全 | ourren | 4149 | |
| 2015-11-20 | Best of Oracle Security 2015 | ourren | 2594 | |
| 2015-11-14 | Chinese Conferences Slide | ourren | 3374 | |
| 2015-11-13 | Black Hat EU-15 Day 1 | tolive | 3070 | |
| 2015-11-13 | BadBarcode: How to hack a starship with a piece of paper | ourren | 2919 | |
| 2015-11-12 | OS-X-Security-and-Privacy-Guide | tolive | 8561 | |
| 2015-11-10 | Iranian Cyber-Espionage Group Exposed | ourren | 2350 | |
| 2015-11-08 | Revolver: An Automated Approach to the Detection of Evasive Web-based Malware | tolive | 2488 | |
| 2015-11-07 | 2015 Ruxcon Security Conference Slides | ourren | 2927 | |
| 2015-11-05 | sql-injection-for-microsoft-access | tolive | 2408 | |