Most recent
Conferences
For organizers
The rig
Buy me a Mate
Search
Fundraiser
Bluesky
Note: These are the most recently filmed vids that have been released.
For the most recently released vids, check
my BlueSky.
.
►
OWASP BeNeLux Day 2024
AI: The New Beginning? A Lighthearted Talk About Our End Of Days
- Rob Van Der Veer
►
OWASP BeNeLux Day 2024
From Code To Cloud: Securing The Stack With Open-Source Tools
- Mackenzie Jackson
►
OWASP BeNeLux Day 2024
The Dawn Of The Emerging Tech Hero
- Tiago Teles
►
OWASP BeNeLux Day 2024
Supercharging OAuth 2.0 Security
- Philippe De Ryck
►
OWASP BeNeLux Day 2024
Are You Ready To Be Regulated? How The EU Cyber Resilience Act Will Change The Software Industry Forever
- Olle E. Johansson
►
OWASP BeNeLux Day 2024
Shifting Further Left: A Novel Way To Integrate Security Through AI In Software Design
- Spandan Chandra
►
OWASP BeNeLux Day 2024
How To Use OWASP Security Champions Guide For Your Security Champions Program
- Irfaan Santoe & Robin Van Loon
►
OWASP BeNeLux Day 2024
Opening Keynote
- Jim Manico
►
BSides Munich 2024
Closing
- BSides Munich Orga
►
BSides Munich 2024
Empowering Pentesters: Strategies For Team Motivation, Purpose And Success
- Bettina Haas
►
BSides Munich 2024
Help, My Application Is Vulnerable, But How Bad Is It? Practical Vulnerability Analysis For Development Teams
- Michael Helwig and Alvaro Martinez
►
BSides Munich 2024
Z/OS For GenZ - Hack The Mainframe
- Jonathan Prince
►
BSides Munich 2024
Becoming The Evil Maid: Hacking Android Disk Encryption For Fun And Profit
- David Gstir
►
BSides Munich 2024
Let's Get Physical: Stories From Behind Your Company's Gate
- Moritz Thomas and Firat Acar
►
BSides Munich 2024
Beyond Manual: Enhancing And Scaling Security With Automation
- Christian Bauer
►
BSides Munich 2024
Demystifying Cloud Infrastructure Attacks
- Alexander
►
BSides Munich 2024
Reverse Engineering And Control Flow Analysis With Intel Processor Trace
- Hagen Paul Pfeifer
►
BSides Munich 2024
Some Thoughts On Penetration Test Reports
- Hans-Martin Muench
►
BSides Munich 2024
Kobold Letters And Other Mischief: How Emails Can Deceive You
- Konstantin Weddige
►
BSides Munich 2024
A Security Champion's Journey: How To Make Things A Bit More Secure Than Yesterday Every Day
- Lisi Hocke
►
BSides Munich 2024
Mystical Vulnerabilities: Exploring The Oddities In Cybersecurity
- Massimo Morello
►
BSides Munich 2024
Ground Control To Major Threat: Hacking The Space Link Extension Protocol
- Andrzej Olchawa
►
BSides Munich 2024
From Boot To Root: Identifying And Mitigating Security Issues In Bootloaders
- Richard Weinberger
►
BSides Munich 2024
Building And Leading Advanced Red Teams
- Bjoern Trappe
►
BSides Munich 2024
Demystifying The First Few Minutes After Compromising A Container
- Stuart McMurray
►
BSides Munich 2024
/proc For Security Analysts: Unveiling Hidden Threats And Forensic Treasures
- Stephan Berger and Asger Strunk
►
BSides Munich 2024
Real-Time Threat Intelligence With ML Feedback Loops
- Tomer Doitshman
►
BSides Munich 2024
Leaking Kakao: How I Found A 1-Click Exploit In Korea's Biggest Chat App
- Dawin Schmidt
►
BSides Munich 2024
8 Bits Wisdom To Secure The Code Of Life
- Desiree Sacher-Boldewin
►
BSides Munich 2024
Welcome
- BSides Munich Orga
►
IRISSCon 2024
Cyber Burnout
- Eleanor Dallaway
►
IRISSCon 2024
Cybersecurity and AI
- Craig Balding
►
IRISSCon 2024
Phishing characterization and mitigation across ccTLDs
- Sebastián Castro
►
IRISSCon 2024
The Ransomware Threat
- Dick O’Brien
►
IRISSCon 2024
It's not you, it's me: Breaking up with panic mode
- Rik Ferguson
►
IRISSCon 2024
Javvad Malik’s Emporium of Cybersecurity Awareness Wonders and Bad Advice
- Javvad Malik
►
IRISSCon 2024
The Rise of the Clones
- Jake Moore
►
IRISSCon 2024
Update on the Network Information Security Directive 2 (NIS2)
- Paul Stanley
►
IRISSCon 2024
Adversary uses of AI & why the technology will hurt them more than help them
- Robert McArdle
►
IRISSCon 2024
Cybercrime: A Group Effort.
- DSI Michael Mullen
►
IRISSCon 2024
Cybersecurity in the C-Suite: Leadership Strategies for Managing Cyber Risks in Emerging Technologies
- Onur Korucu
►
IRISSCon 2024
Digital Doomsday: Building Resilience for Cyber Black Swans
- Dave Lewis & Rich Mogull
►
IRISSCon 2024
Security Through a Data Breach Lens – Utilising Verizon’s Data Breach Investigations Report
- Phillip Larbey
►
IRISSCon 2024
Conference Opening
- Gordon Smith
►
WICCON 2024
Who Watches The Watchmen? Stealing Credentials From Policy-as-Code Engines (And Beyond)
- Shelly Raban
►
WICCON 2024
A Glimpse Into The World Of ICS Monitoring
- Dominika Rusek Jonkers
►
WICCON 2024
IR To CTI - The Other Side Of The Coin
- Daniela
►
WICCON 2024
Building An Appsec Program From Scratch
- Mireia Cano
►
WICCON 2024
Abacus: Software For Secure And Transparent Voting Results
- Marjolein Tamis and Ellen Van Leeuwen
►
WICCON 2024
Charting The Course: Navigating Maritime Cybersecurity
- Anna Prudnikova
►
WICCON 2024
Build Your Own Role-playing Game: The Business Continuity Drill
- Janna Brummel
►
WICCON 2024
When Artificial Becomes Authentic, How Do I Prove I Am Me?
- Nicole Van Der Meulen
►
WICCON 2024
Mission: Impossible - Chatcontrol
- Helma De Boer
►
WICCON 2024
From Galactic Hacker Party 1989 To WHY2025: The History, Future And Importance Of Dutch Hacker Camps
- Boekenwuurm
►
WICCON 2024
How To Navigate The Cyber Resilience Act
- Raluca Viziteu
►
WICCON 2024
Metrics Matter In Effective Human Risk Management
- Gerine Lodder
►
WICCON 2024
AirDrop Forensics
- Kinga Kieczkowska
►
WICCON 2024
Turning Neurodiversity Into A Strength
- Tirza Dijkstra
►
WICCON 2024
Inside Job: Tackling Insider Risk From All Angles
- Diana Makienko and Lucile Renhas
►
WICCON 2024
Hacking The Vote: Why The Paper Trail Matters In Elections
- Fleur Van Leusden
►
WICCON 2024
Opening
- Jaimy Thepass
►
Hack.lu 2024
CTF Prizegiving Ceremony
- Hack.lu
►
Hack.lu 2024
Disconnecting Games With A Single Packet: An Unreal Untold Story
- Hugo Bertin
►
Hack.lu 2024
Mercator: Mapping The Information System
- Didier Barzin
►
Hack.lu 2024
Detection And Response For Linux Without EDR
- Hilko Bengen
►
Hack.lu 2024
Reverse Engineering Android Apps With ACVTool
- Aleksandr Pilgun
►
Hack.lu 2024
Internal Domain Name Collision 2.0
- Philippe Caturegli
►
Hack.lu 2024
Luks Full Disk Encryption Upside-Down
- Michael Hamm
►
Hack.lu 2024
Learn Anything - Reload
- Pauline Bourmeau (Cookie)
►
Hack.lu 2024
Pentests Using LLMs
- Al Mochkin
►
Hack.lu 2024
AIL Project: Secrets In Squares - QR Codes
- Aurelien Thirion
►
Hack.lu 2024
Sigma Unleashed: A Realistic Implementation
- Mathieu Le Cleach
►
Hack.lu 2024
New Features In The Zeek Network Monitor
- Christian Kreibich
►
Hack.lu 2024
The XE Files: Trust No Router
- James Atack
►
Hack.lu 2024
The Ouroboros Of Cybercrime: Witnessing Threat Actors Go From Pwn To Pwn'd
- Estelle Ruellan & Stuart Beck
►
Hack.lu 2024
Understanding File Type Identifiers & Scanners
- Ange Albertini
►
Hack.lu 2024
Keys To The City: The Dark Trade-Off Between Revenue And Privacy In Monetizing SDKs
- Dimitrios Valsamaras
►
Hack.lu 2024
SQL Injection Isn't Dead: Smuggling Queries At The Protocol Level
- Paul Gerste
►
Hack.lu 2024
Ghosts'n'Gadgets: Common Buffer Overflows That Still Haunt Our Networks
- Stanislav Dashevskyi
►
Hack.lu 2024
Making IOT Great Again
- David Durvaux & Marc Durvaux
►
Hack.lu 2024
Quantum Cybersecurity: Pioneering A Secure Future
- Samira Chaychi & Sharif Shahini
►
Hack.lu 2024
MISP Playbooks, Proving The Value Of Cyber Threat Intelligence And ICS-CSIRT.io
- Koen Van Impe
►
Hack.lu 2024
Vulnerability Lookup
- Cédric Bonhomme
►
Hack.lu 2024
Analysis And Forecasting Of Exploits With AI
- Roman Graf
►
Hack.lu 2024
Future Of Websites Without DDoS
- Lukáš Kršek
►
Hack.lu 2024
Using LLM Locally
- Pauline Bourmeau (Cookie)
►
Hack.lu 2024
Running Circles Around Threat Actor Tooling Using Javascript Data Visualisation
- Chris Horsley
►
Hack.lu 2024
From 0 To Millions: Protecting Against AitM Phishing At Scale
- Jacob Torrey
►
Hack.lu 2024
Scam As A Service Powered By Telegram
- Aurimas Rudinskis
►
Hack.lu 2024
The Good, The Bad, And The Ugly: Microsoft Copilot
- Inbar Raz & Michael Bargury