|
One day at the Internet Storm Center β Xavier Mertens
|
|
1
|
14
|
October 23, 2025
|
|
Attacking The Developer Environment Through Drive-by Localhost Attacks β Joseph Beeton
|
|
1
|
11
|
October 23, 2025
|
|
Instrumenting software builds to detect stealth backdoors and other curiosities β Hilko Bengen
|
|
1
|
7
|
October 23, 2025
|
|
Compromising Threat Actor Communications β Ben (@polygonben)
|
|
1
|
30
|
October 23, 2025
|
|
Nightmare on NTLM street: Legacyβs Revenge β Marina Bochenkova
|
|
1
|
33
|
October 23, 2025
|
|
In bed with Qubes OS - tips & tricks exchange party β William Robinet
|
|
2
|
41
|
October 23, 2025
|
|
Integrating Zeek With Third-Party Applications β Christian Kreibich
|
|
1
|
6
|
October 22, 2025
|
|
What Malware Leaves Behind: Analysing Forensic Traces of Ransomware β Ankshita Maunthrooa
|
|
1
|
9
|
October 22, 2025
|
|
Security Monitoring and Response in Large Linux Environments β Hendrik Schmidt, Hilko Bengen
|
|
1
|
14
|
October 22, 2025
|
|
Digic8 Oracle β laurent clevy
|
|
1
|
14
|
October 22, 2025
|
|
Open source is a virus β Philippe Ombredanne
|
|
1
|
10
|
October 22, 2025
|
|
Smack my LLM up! β Jindrich Karasek
|
|
1
|
26
|
October 22, 2025
|
|
Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign β JiΕΓ Vinopal
|
|
1
|
18
|
October 22, 2025
|
|
Slipping Through the Cracks: How Malicious Emails Evade Detection β Elyssa Boulila
|
|
1
|
47
|
October 22, 2025
|
|
Reversing a Pay Phone for Fun but No Profit β Inbar Raz
|
|
1
|
8
|
October 22, 2025
|
|
Exploring Threats Leveraging Blockchains β Rascagneres Paul
|
|
1
|
24
|
October 22, 2025
|
|
A pragmatic approach to build a threat landscape β Thomas Patzke
|
|
1
|
17
|
October 22, 2025
|
|
Back to basics - Exploring OpenSSH: hands-on workshop for beginners β William Robinet
|
|
3
|
46
|
October 22, 2025
|
|
Threat detection engineering with Suricata β Eric Leblond, Peter Manev
|
|
1
|
18
|
October 22, 2025
|
|
From Achilles to NIS2: Slovakian Lessons on Proactive Cybersecurity and Vulnerability Disclosure β Michal RampΓ‘Ε‘ek, Alexander Valach
|
|
1
|
6
|
October 22, 2025
|
|
Oops, I Hacked It Again: Tales and disclosures β Ignacio Navarro
|
|
1
|
16
|
October 22, 2025
|
|
iOS analysis using the Sysdiagnose analysis framework workshop - advanced session β David Durvaux, Christophe Vandeplas
|
|
3
|
39
|
October 22, 2025
|
|
From Buzzword to Battlefield: The Cybersecurity Challenges of Smart Cities β Marina Bochenkova
|
|
1
|
8
|
October 21, 2025
|
|
Fake Jobs, Real Malware. Uncovering How Cybercriminals are Exploiting the Employment Market β IonuΘ Baltariu
|
|
1
|
21
|
October 21, 2025
|
|
Intelmq.ai - adding ML model support to intelmq β Aaron Kaplan, Sebastian Wagner
|
|
1
|
15
|
October 21, 2025
|
|
No way to enable SSH access to your new router? The vendor might have something to hide β Stanislav Dashevskyi
|
|
1
|
11
|
October 21, 2025
|
|
OverLAPS: Overriding LAPS Logic β Antoine Goichot
|
|
1
|
18
|
October 21, 2025
|
|
Phishing detection using various parts of DNS ecosystem β Piotr BiaΕczak
|
|
1
|
8
|
October 21, 2025
|
|
Anti-Forensics - You are doing it wrong (Believe me, I'm an IR consultant) β Stephan Berger
|
|
1
|
15
|
October 21, 2025
|
|
Confessions of a Linux Drama Queen: Incident Response When Hackers Try to Steal Your Spotlight β Melina Phillips
|
|
1
|
12
|
October 21, 2025
|