|
In bed with Qubes OS - tips & tricks exchange party β William Robinet
|
|
2
|
38
|
October 23, 2025
|
|
Integrating Zeek With Third-Party Applications β Christian Kreibich
|
|
1
|
6
|
October 22, 2025
|
|
What Malware Leaves Behind: Analysing Forensic Traces of Ransomware β Ankshita Maunthrooa
|
|
1
|
9
|
October 22, 2025
|
|
Security Monitoring and Response in Large Linux Environments β Hendrik Schmidt, Hilko Bengen
|
|
1
|
14
|
October 22, 2025
|
|
Digic8 Oracle β laurent clevy
|
|
1
|
13
|
October 22, 2025
|
|
Open source is a virus β Philippe Ombredanne
|
|
1
|
10
|
October 22, 2025
|
|
Smack my LLM up! β Jindrich Karasek
|
|
1
|
26
|
October 22, 2025
|
|
Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign β JiΕΓ Vinopal
|
|
1
|
18
|
October 22, 2025
|
|
Slipping Through the Cracks: How Malicious Emails Evade Detection β Elyssa Boulila
|
|
1
|
46
|
October 22, 2025
|
|
Reversing a Pay Phone for Fun but No Profit β Inbar Raz
|
|
1
|
8
|
October 22, 2025
|
|
Exploring Threats Leveraging Blockchains β Rascagneres Paul
|
|
1
|
24
|
October 22, 2025
|
|
A pragmatic approach to build a threat landscape β Thomas Patzke
|
|
1
|
17
|
October 22, 2025
|
|
Back to basics - Exploring OpenSSH: hands-on workshop for beginners β William Robinet
|
|
3
|
41
|
October 22, 2025
|
|
Threat detection engineering with Suricata β Eric Leblond, Peter Manev
|
|
1
|
18
|
October 22, 2025
|
|
From Achilles to NIS2: Slovakian Lessons on Proactive Cybersecurity and Vulnerability Disclosure β Michal RampΓ‘Ε‘ek, Alexander Valach
|
|
1
|
6
|
October 22, 2025
|
|
Oops, I Hacked It Again: Tales and disclosures β Ignacio Navarro
|
|
1
|
14
|
October 22, 2025
|
|
iOS analysis using the Sysdiagnose analysis framework workshop - advanced session β David Durvaux, Christophe Vandeplas
|
|
3
|
39
|
October 22, 2025
|
|
From Buzzword to Battlefield: The Cybersecurity Challenges of Smart Cities β Marina Bochenkova
|
|
1
|
6
|
October 21, 2025
|
|
Fake Jobs, Real Malware. Uncovering How Cybercriminals are Exploiting the Employment Market β IonuΘ Baltariu
|
|
1
|
20
|
October 21, 2025
|
|
Intelmq.ai - adding ML model support to intelmq β Aaron Kaplan, Sebastian Wagner
|
|
1
|
15
|
October 21, 2025
|
|
No way to enable SSH access to your new router? The vendor might have something to hide β Stanislav Dashevskyi
|
|
1
|
11
|
October 21, 2025
|
|
OverLAPS: Overriding LAPS Logic β Antoine Goichot
|
|
1
|
18
|
October 21, 2025
|
|
Phishing detection using various parts of DNS ecosystem β Piotr BiaΕczak
|
|
1
|
8
|
October 21, 2025
|
|
Anti-Forensics - You are doing it wrong (Believe me, I'm an IR consultant) β Stephan Berger
|
|
1
|
15
|
October 21, 2025
|
|
Confessions of a Linux Drama Queen: Incident Response When Hackers Try to Steal Your Spotlight β Melina Phillips
|
|
1
|
12
|
October 21, 2025
|
|
Containing the Threat: Analyzing cryptomining campaigns β Bogdan Trufanda, Mihai Vasilescu
|
|
1
|
12
|
October 21, 2025
|
|
LOLBlue : Living Off the Land with Blue Team tools β Maxence Fossat, Antoine C
|
|
1
|
20
|
October 21, 2025
|
|
Kunai: From Zero to Ninja β Quentin JEROME
|
|
1
|
19
|
October 21, 2025
|
|
Call for Failures @ hack.lu 2025 β Because We All Break Things
|
|
0
|
23
|
October 17, 2025
|
|
iOS analysis using the Sysdiagnose analysis framework workshop - beginners guide β David Durvaux, Christophe Vandeplas
|
|
1
|
26
|
October 6, 2025
|