{"users":[{"id":2,"username":"rommelfs-gh","name":"Sascha Rommelfangen","avatar_template":"/user_avatar/discourse.ossbase.org/rommelfs-gh/{size}/4_2.png","admin":true,"trust_level":1},{"id":-1,"username":"system","name":"system","avatar_template":"/uploads/default/original/1X/4713f3d4fec85f7513775fc2dd36f548a49f8faa.jpeg","admin":true,"moderator":true,"trust_level":4},{"id":142,"username":"Cookie","name":"Cookie","avatar_template":"/user_avatar/discourse.ossbase.org/cookie/{size}/342_2.png","trust_level":0},{"id":4,"username":"adulau","name":"Alexandre Dulaunoy","avatar_template":"/user_avatar/discourse.ossbase.org/adulau/{size}/6_2.png","admin":true,"moderator":true,"trust_level":2},{"id":100,"username":"decalage","name":"Philippe Lagadec","avatar_template":"/user_avatar/discourse.ossbase.org/decalage/{size}/247_2.png","trust_level":0},{"id":15,"username":"wllm-rbnt","name":"","avatar_template":"/user_avatar/discourse.ossbase.org/wllm-rbnt/{size}/249_2.png","trust_level":2}],"primary_groups":[],"flair_groups":[],"topic_list":{"can_create_topic":false,"more_topics_url":"/c/hack-lu/15?page=1","per_page":30,"top_tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"},{"id":30,"name":"workshop","slug":"workshop"},{"id":32,"name":"training","slug":"training"},{"id":29,"name":"keynote","slug":"keynote"},{"id":31,"name":"training-long","slug":"training-long"}],"topics":[{"fancy_title":"About the hack.lu category","id":124,"title":"About the hack.lu category","slug":"about-the-hack-lu-category","posts_count":1,"reply_count":0,"highest_post_number":1,"image_url":"https://discourse.ossbase.org/uploads/default/optimized/1X/06d88c15d1008280458b3a3824de8f1c3e7c1d72_2_1024x586.jpeg","created_at":"2025-08-25T13:30:14.168Z","last_posted_at":"2025-08-25T13:30:14.182Z","bumped":true,"bumped_at":"2025-08-26T08:33:38.938Z","archetype":"regular","unseen":false,"pinned":true,"unpinned":null,"excerpt":"Hack.lu (and CTI summit) is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society. It’s the 19th edition (21st →&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[],"tags_descriptions":{},"views":5,"like_count":0,"has_summary":false,"last_poster_username":"rommelfs-gh","category_id":15,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"can_vote":false,"posters":[{"extras":"latest single","description":"Original Poster, Most Recent Poster","user_id":2,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Hack your brain — Pauline Bourmeau (Cookie)","id":704,"title":"Hack your brain — Pauline Bourmeau (Cookie)","slug":"hack-your-brain-pauline-bourmeau-cookie","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:56:36.017Z","last_posted_at":"2025-10-31T09:14:29.168Z","bumped":true,"bumped_at":"2025-10-31T09:14:29.168Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 90 min  \nType: Workshop  \nSpeakers: Pauline Bourmeau (Cookie)  \nAbstract \nIf you are done hearing about focus on one side and productivity on the other, you are no&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":30,"name":"workshop","slug":"workshop"}],"tags_descriptions":{},"views":25,"like_count":0,"has_summary":false,"last_poster_username":"Cookie","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":2,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":142,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"How to better identify (weaponized) file formats with ftguess — Philippe Lagadec","id":683,"title":"How to better identify (weaponized) file formats with ftguess — Philippe Lagadec","slug":"how-to-better-identify-weaponized-file-formats-with-ftguess-philippe-lagadec","posts_count":3,"reply_count":1,"highest_post_number":3,"image_url":null,"created_at":"2025-08-26T08:56:04.965Z","last_posted_at":"2025-10-28T09:40:42.059Z","bumped":true,"bumped_at":"2025-10-28T09:40:42.059Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Philippe Lagadec  \nAbstract \nFtguess is an open-source tool designed to identify file formats in a more precise and robust way than&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":102,"like_count":0,"has_summary":false,"last_poster_username":"decalage","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":3,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":null,"description":"Frequent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":100,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"CLI ambush — William Robinet","id":619,"title":"CLI ambush — William Robinet","slug":"cli-ambush-william-robinet","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:54:28.583Z","last_posted_at":"2025-10-28T09:25:12.726Z","bumped":true,"bumped_at":"2025-10-28T09:25:12.726Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: William Robinet  \nAbstract \nIn this talk, I’ll present how I discovered a vulnerability common to various TLS/SSL cryptographic too&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":38,"like_count":0,"has_summary":false,"last_poster_username":"wllm-rbnt","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":2,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":15,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape — Julien Bedel","id":628,"title":"DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape — Julien Bedel","slug":"dcom-turns-20-revisiting-a-legacy-interface-in-the-modern-threatscape-julien-bedel","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:54:41.921Z","last_posted_at":"2025-10-24T14:39:51.718Z","bumped":true,"bumped_at":"2025-10-24T14:39:51.718Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Julien Bedel  \nAbstract \nPart of Windows operating system for over 20 years, DCOM (Distributed Component Object Model) has received&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":30,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":0,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Automotive Security Analyzer for Exploitability Risks: An Automated and Attack Graph-Based Evaluation of On-Board Networks — Martin Salfer","id":672,"title":"Automotive Security Analyzer for Exploitability Risks: An Automated and Attack Graph-Based Evaluation of On-Board Networks — Martin Salfer","slug":"automotive-security-analyzer-for-exploitability-risks-an-automated-and-attack-graph-based-evaluation-of-on-board-networks-martin-salfer","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:48.457Z","last_posted_at":"2025-10-24T14:32:13.814Z","bumped":true,"bumped_at":"2025-10-24T14:32:13.814Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Martin Salfer  \nAbstract \nOur lives depend on automotive cybersecurity, protecting us inside and near vehicles. If vehicles go rogu&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":25,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":0,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations — cocomelonc","id":695,"title":"Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations — cocomelonc","slug":"exploiting-legit-apis-for-covert-c2-a-new-perspective-on-cloud-based-malware-operations-cocomelonc","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:56:22.879Z","last_posted_at":"2025-10-24T14:12:18.697Z","bumped":true,"bumped_at":"2025-10-24T14:12:18.697Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: cocomelonc  \nAbstract \nAs modern security defenses evolve, attackers continue to leverage legitimate cloud services for command-and&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":22,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":1,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Lethal Language Models: From Bit Flip to RCE in Ollama — Paul Gerste","id":621,"title":"Lethal Language Models: From Bit Flip to RCE in Ollama — Paul Gerste","slug":"lethal-language-models-from-bit-flip-to-rce-in-ollama-paul-gerste","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:54:31.453Z","last_posted_at":"2025-10-24T14:11:38.612Z","bumped":true,"bumped_at":"2025-10-24T14:11:38.612Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Paul Gerste  \nAbstract \nAI and LLMs are everywhere, but how are they actually implemented? In this session, we will take a detailed&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":22,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":0,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Russian-speaking underground - changes in the risks, attack surface and modus operandi — Vladimir Kropotov","id":649,"title":"Russian-speaking underground - changes in the risks, attack surface and modus operandi — Vladimir Kropotov","slug":"russian-speaking-underground-changes-in-the-risks-attack-surface-and-modus-operandi-vladimir-kropotov","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:14.192Z","last_posted_at":"2025-10-24T13:18:36.169Z","bumped":true,"bumped_at":"2025-10-24T13:18:36.169Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Vladimir Kropotov  \nAbstract \nCriminal business processes are significantly reshaped in recent years due to appearance and accessib&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":11,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":2,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"From YAML to Root: CI/CD Pipeline Attacks and Countermeasures — Hugo","id":637,"title":"From YAML to Root: CI/CD Pipeline Attacks and Countermeasures — Hugo","slug":"from-yaml-to-root-ci-cd-pipeline-attacks-and-countermeasures-hugo","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:54:55.656Z","last_posted_at":"2025-10-24T13:15:28.565Z","bumped":true,"bumped_at":"2025-10-24T13:15:28.565Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Hugo  \nAbstract \nAs CI/CD pipelines become integral to modern software development through systems like Azure DevOps or GitHub Acti&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":28,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":3,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain — Maxime Escourbiac","id":694,"title":"Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain — Maxime Escourbiac","slug":"palo-alto-globalprotect-remote-full-compromise-exploit-chain-maxime-escourbiac","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:56:21.443Z","last_posted_at":"2025-10-24T11:58:45.058Z","bumped":true,"bumped_at":"2025-10-24T11:58:45.058Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Maxime Escourbiac  \nAbstract \nThis session provides an in-depth analysis of multiple critical vulnerabilities discovered by Micheli&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":25,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":3,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Breaking Android IPC: A Deep Dive into AIDL Fuzzing — Rajanish Pathak","id":664,"title":"Breaking Android IPC: A Deep Dive into AIDL Fuzzing — Rajanish Pathak","slug":"breaking-android-ipc-a-deep-dive-into-aidl-fuzzing-rajanish-pathak","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:36.414Z","last_posted_at":"2025-10-24T09:39:24.615Z","bumped":true,"bumped_at":"2025-10-24T09:39:24.615Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Rajanish Pathak  \nAbstract \nIn this talk, we’ll deep dive inro fuzzing Android’s IPC mechanisms, focusing on the AIDL fuzzing in pa&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":17,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":0,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Practical intro to deeplearning: chihuahuas vs muffins — Pauline Bourmeau (Cookie), William Robinet","id":676,"title":"Practical intro to deeplearning: chihuahuas vs muffins — Pauline Bourmeau (Cookie), William Robinet","slug":"practical-intro-to-deeplearning-chihuahuas-vs-muffins-pauline-bourmeau-cookie-william-robinet","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:54.434Z","last_posted_at":"2025-10-24T08:56:28.797Z","bumped":true,"bumped_at":"2025-10-24T08:56:28.797Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 90 min  \nType: Workshop  \nSpeakers: Pauline Bourmeau (Cookie), William Robinet  \nAbstract \nOnce upon a time, an algorithm’s goal was to make a distinction between &hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":30,"name":"workshop","slug":"workshop"}],"tags_descriptions":{},"views":19,"like_count":1,"has_summary":false,"last_poster_username":"wllm-rbnt","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":1,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":15,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Livewire : remote command execution through unmarshalling — Rémi Matasse (@_remsio_), Pierre Martin (@_Worty), Pierre MARTIN","id":644,"title":"Livewire : remote command execution through unmarshalling — Rémi Matasse (@_remsio_), Pierre Martin (@_Worty), Pierre MARTIN","slug":"livewire-remote-command-execution-through-unmarshalling-remi-matasse-remsio-pierre-martin-worty-pierre-martin","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:06.338Z","last_posted_at":"2025-10-24T06:14:04.862Z","bumped":true,"bumped_at":"2025-10-24T06:14:04.862Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Rémi Matasse (@remsio), Pierre Martin (@_Worty), Pierre MARTIN  \nAbstract \nLivewire is a full-stack framework for Laravel that stre&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":23,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":0,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"2038 is gonna be epoch! — Pedro Umbelino, Trey Darley","id":679,"title":"2038 is gonna be epoch! — Pedro Umbelino, Trey Darley","slug":"2038-is-gonna-be-epoch-pedro-umbelino-trey-darley","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:58.982Z","last_posted_at":"2025-10-24T06:12:44.614Z","bumped":true,"bumped_at":"2025-10-24T06:12:44.614Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Pedro Umbelino, Trey Darley  \nAbstract \n19 January 2038 at 03:14:07 UTC implementations relying on 32-bit signed integer representa&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":26,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":4,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Wyse Management Subversion : Taking over Dell&rsquo;s Wyse Management Suite — Alain Mowat","id":647,"title":"Wyse Management Subversion : Taking over Dell's Wyse Management Suite — Alain Mowat","slug":"wyse-management-subversion-taking-over-dells-wyse-management-suite-alain-mowat","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:11.128Z","last_posted_at":"2025-10-24T06:11:48.630Z","bumped":true,"bumped_at":"2025-10-24T06:11:48.630Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Alain Mowat  \nAbstract \nBy it’s own definition, Dell’s Wyse Management Suite is “a secure hybrid cloud management solution for Dell&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":10,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":0,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"What&rsquo;s New in Suricata 8: Enhanced Detection and Performance — Eric Leblond, Peter Manev","id":622,"title":"What's New in Suricata 8: Enhanced Detection and Performance — Eric Leblond, Peter Manev","slug":"whats-new-in-suricata-8-enhanced-detection-and-performance-eric-leblond-peter-manev","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:54:33.008Z","last_posted_at":"2025-10-24T06:11:13.363Z","bumped":true,"bumped_at":"2025-10-24T06:11:13.363Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Eric Leblond, Peter Manev  \nAbstract \nSuricata is a widely-used high performance, open source network analysis and threat detection&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":11,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":1,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Hacking for hoodies: MISP edition — Jeroen Pinoy","id":635,"title":"Hacking for hoodies: MISP edition — Jeroen Pinoy","slug":"hacking-for-hoodies-misp-edition-jeroen-pinoy","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:54:52.624Z","last_posted_at":"2025-10-24T06:07:14.883Z","bumped":true,"bumped_at":"2025-10-24T06:07:14.883Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Jeroen Pinoy  \nAbstract \nCyber threat information sharing continues to be important. The tools we use for this should be regularly &hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":22,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":2,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Building a pipeline to analyse iOS devices at scale — David Durvaux, Christophe Vandeplas","id":640,"title":"Building a pipeline to analyse iOS devices at scale — David Durvaux, Christophe Vandeplas","slug":"building-a-pipeline-to-analyse-ios-devices-at-scale-david-durvaux-christophe-vandeplas","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:00.179Z","last_posted_at":"2025-10-23T16:28:19.462Z","bumped":true,"bumped_at":"2025-10-23T16:28:19.462Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: David Durvaux, Christophe Vandeplas  \nAbstract \nBuilding a pipeline to analyse iOS devices at scale\nOverview and Abstract\nThis talk&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":20,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":2,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"My other ClassLoader is your ClassLoader: Creating evil twin instances of a class — Dimitrios Valsamaras","id":638,"title":"My other ClassLoader is your ClassLoader: Creating evil twin instances of a class — Dimitrios Valsamaras","slug":"my-other-classloader-is-your-classloader-creating-evil-twin-instances-of-a-class-dimitrios-valsamaras","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:54:57.131Z","last_posted_at":"2025-10-23T16:27:31.852Z","bumped":true,"bumped_at":"2025-10-23T16:27:31.852Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Dimitrios Valsamaras  \nAbstract \nThe class loader is a fundamental component of the Java Virtual Machine, responsible for dynamical&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":8,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":0,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Field guide to physical attacks against full-disk encryption — Edouard D&rsquo;hoedt, Hayk Gevorgyan","id":660,"title":"Field guide to physical attacks against full-disk encryption — Edouard D'hoedt, Hayk Gevorgyan","slug":"field-guide-to-physical-attacks-against-full-disk-encryption-edouard-dhoedt-hayk-gevorgyan","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:30.413Z","last_posted_at":"2025-10-23T16:26:51.032Z","bumped":true,"bumped_at":"2025-10-23T16:26:51.032Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Edouard D’hoedt, Hayk Gevorgyan  \nAbstract \nHow safe is your “encrypted” laptop when someone walks off with it? \nFull-disk encrypti&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":72,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":18,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"One day at the Internet Storm Center — Xavier Mertens","id":636,"title":"One day at the Internet Storm Center — Xavier Mertens","slug":"one-day-at-the-internet-storm-center-xavier-mertens","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:54:54.153Z","last_posted_at":"2025-10-23T12:06:36.954Z","bumped":true,"bumped_at":"2025-10-23T12:06:36.954Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Xavier Mertens  \nAbstract \nBorn in 2001, the Internet Storm Center (or ISC) is a volunteer-driven threat-monitoring and early-warni&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":16,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":1,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Attacking The Developer Environment Through Drive-by Localhost Attacks — Joseph Beeton","id":673,"title":"Attacking The Developer Environment Through Drive-by Localhost Attacks — Joseph Beeton","slug":"attacking-the-developer-environment-through-drive-by-localhost-attacks-joseph-beeton","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:49.999Z","last_posted_at":"2025-10-23T12:05:49.445Z","bumped":true,"bumped_at":"2025-10-23T12:05:49.445Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Joseph Beeton  \nAbstract \nThere is a widespread belief that services that are only bound to localhost are not accessible from the o&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":14,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":0,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Instrumenting software builds to detect stealth backdoors and other curiosities — Hilko Bengen","id":685,"title":"Instrumenting software builds to detect stealth backdoors and other curiosities — Hilko Bengen","slug":"instrumenting-software-builds-to-detect-stealth-backdoors-and-other-curiosities-hilko-bengen","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:56:07.995Z","last_posted_at":"2025-10-23T12:04:59.031Z","bumped":true,"bumped_at":"2025-10-23T12:04:59.031Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Hilko Bengen  \nAbstract \nThe backdoor that had been added to xz-utils by an unknown threat actor (CVE-2024-3094) may be seen as a w&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":8,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":1,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Compromising Threat Actor Communications — Ben (@polygonben)","id":705,"title":"Compromising Threat Actor Communications — Ben (@polygonben)","slug":"compromising-threat-actor-communications-ben-polygonben","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:56:37.448Z","last_posted_at":"2025-10-23T12:03:35.315Z","bumped":true,"bumped_at":"2025-10-23T12:03:35.315Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Ben (@polygonben)  \nAbstract \nThis talk exposes how a simple OPSEC mistake—a threat actor testing malware on his own production sys&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":37,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":5,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Nightmare on NTLM street: Legacy’s Revenge — Marina Bochenkova","id":620,"title":"Nightmare on NTLM street: Legacy’s Revenge — Marina Bochenkova","slug":"nightmare-on-ntlm-street-legacy-s-revenge-marina-bochenkova","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:54:30.012Z","last_posted_at":"2025-10-23T12:02:50.285Z","bumped":true,"bumped_at":"2025-10-23T12:02:50.285Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Marina Bochenkova  \nAbstract \nWe know the world runs on legacy. We know it’s not supposed to. But when vendors or LinkedInfluencers&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":41,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":6,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"In bed with Qubes OS - tips &amp; tricks exchange party — William Robinet","id":663,"title":"In bed with Qubes OS - tips & tricks exchange party — William Robinet","slug":"in-bed-with-qubes-os-tips-tricks-exchange-party-william-robinet","posts_count":3,"reply_count":0,"highest_post_number":3,"image_url":null,"created_at":"2025-08-26T08:55:34.928Z","last_posted_at":"2025-10-23T10:10:45.777Z","bumped":true,"bumped_at":"2025-10-23T10:10:45.777Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 90 min  \nType: Workshop  \nSpeakers: William Robinet  \nAbstract \nI’ve been using Qubes OS in my professional life since 2017 (version 3.2). \nWith this workshop, I w&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":30,"name":"workshop","slug":"workshop"}],"tags_descriptions":{},"views":49,"like_count":0,"has_summary":false,"last_poster_username":"wllm-rbnt","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":3,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":15,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Integrating Zeek With Third-Party Applications — Christian Kreibich","id":651,"title":"Integrating Zeek With Third-Party Applications — Christian Kreibich","slug":"integrating-zeek-with-third-party-applications-christian-kreibich","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:17.103Z","last_posted_at":"2025-10-22T16:57:00.588Z","bumped":true,"bumped_at":"2025-10-22T16:57:00.588Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Christian Kreibich  \nAbstract \nThe Zeek network monitor offers a range of mechanisms to interact with it while up and running. Exam&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":9,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":0,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"What Malware Leaves Behind: Analysing Forensic Traces of Ransomware — Ankshita Maunthrooa","id":653,"title":"What Malware Leaves Behind: Analysing Forensic Traces of Ransomware — Ankshita Maunthrooa","slug":"what-malware-leaves-behind-analysing-forensic-traces-of-ransomware-ankshita-maunthrooa","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:20.079Z","last_posted_at":"2025-10-22T16:56:14.323Z","bumped":true,"bumped_at":"2025-10-22T16:56:14.323Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Ankshita Maunthrooa  \nAbstract \nThis session explores the forensic remnants left behind by ransomware on an infected machine. Throu&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":10,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":1,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]},{"fancy_title":"Security Monitoring and Response in Large Linux Environments — Hendrik Schmidt, Hilko Bengen","id":661,"title":"Security Monitoring and Response in Large Linux Environments — Hendrik Schmidt, Hilko Bengen","slug":"security-monitoring-and-response-in-large-linux-environments-hendrik-schmidt-hilko-bengen","posts_count":2,"reply_count":0,"highest_post_number":2,"image_url":null,"created_at":"2025-08-26T08:55:31.942Z","last_posted_at":"2025-10-22T14:48:30.178Z","bumped":true,"bumped_at":"2025-10-22T14:48:30.178Z","archetype":"regular","unseen":false,"pinned":false,"unpinned":null,"excerpt":"Join us at hack.lu 2025 — Info &amp; Registration \nDuration: 30 min  \nType: Talk  \nSpeakers: Hendrik Schmidt, Hilko Bengen  \nAbstract \nThis talk delves into strategies and practices for large-scale security monitoring of Lin&hellip;","visible":true,"closed":false,"archived":false,"bookmarked":null,"liked":null,"tags":[{"id":21,"name":"hacklu","slug":"hacklu"},{"id":22,"name":"2025","slug":"22-tag"},{"id":28,"name":"talk","slug":"talk"}],"tags_descriptions":{},"views":15,"like_count":0,"has_summary":false,"last_poster_username":"adulau","category_id":16,"op_like_count":0,"pinned_globally":false,"featured_link":null,"has_accepted_answer":false,"vote_count":1,"can_vote":true,"user_voted":null,"posters":[{"extras":null,"description":"Original Poster","user_id":-1,"primary_group_id":null,"flair_group_id":null},{"extras":"latest","description":"Most Recent Poster","user_id":4,"primary_group_id":null,"flair_group_id":null}]}]}}