Most recent
Conferences
For organizers
The rig
Buy me a Mate
Search
Fundraiser
Twitter
Note: These are the most recently filmed vids that have been released.
For the most recently released vids, check
my Twitter
.
►
44CON 44CON Hootenanny 2019
DeepFake Cyber Security Threats And Opportunities
- Matt Lewis
►
44CON 44CON Hootenanny 2019
HeapLab Taster: GLIBC Heap Exploitation
- Max Kamper
►
BSides Cheltenham 2019
Hunting Pastebin For Fun And For Profit
- Kevin Breen
►
BSides Cheltenham 2019
We Take Your Privacy And Security Seriously - An Analysis Of Norsk Hydro's Cyber Incident Communications
- Jon Lorains
►
BSides Cheltenham 2019
The Art Of The Scam
- Graeme Simpson
►
BSides Cheltenham 2019
What Is Threat Simulation And How To It For Free*
- Toby Rose
►
BSides Cheltenham 2019
Kerberos Delegation Attack How To Abuse Machine Account To Gain Local Admin Privilege
- Sadi Zane
►
BSides Cheltenham 2019
Profiling The Attacker: Using Natural Language Processing To Predict Crime
- James Stevenson
►
BSides Cheltenham 2019
Introduction To Cyber Threat Intelligence
- Matthew Haynes
►
BSides Lisbon 2019
Pentest Deep Dive: Anatomy Of A Weaponized Remote Code Execution Flaw
- Robert Kugler
►
BSides Lisbon 2019
Auth Gone South
- César Silva
►
BSides Lisbon 2019
Lets Get Physical: Physical Access Controls Security
- Luis Catarino and Pedro Sousa Rodrigues
►
BSides Lisbon 2019
The Internet Is Talking To You, But Do You Listen?
- Tiago Henriques and Florentino Bexiga
►
BSides Lisbon 2019
How To Fit Threat Modelling Into Continuous Security
- Irene Michlin
►
BSides Lisbon 2019
A Special Class Of Stream Cipher Backdooring Techniques
- Eric Filiol
►
BSides Lisbon 2019
Responsible Research
- Daniel Cuthbert
►
BSides Lisbon 2019
Sprinkling Wireguard With Vault And Marshmallows
- Sergio Serrano and Marcelo Almeida
►
BSides Lisbon 2019
A Novel SIEM Solution That Doesn't Cost An Arm And A Leg
- Philip Gardner And Alek
►
BSides Lisbon 2019
Hacking With Hardware
- Pedro Umbelino
►
BSides Lisbon 2019
There's Magic In The Madness, Just Ask Alice
- Leigh-Anne Galloway
►
IRISSCon 2019
Conference Closing
- Gordon Smith
►
IRISSCon 2019
Trust And Bonfire Of The Profanities
- Dave Lewis
►
IRISSCon 2019
A Social Engineers Guide To Deception: Understanding How Humans Lie
- Jenny Radcliffe
►
IRISSCon 2019
State Of Cybersecurity Report: Extended Play
- Dan Raywood
►
IRISSCon 2019
They're All Wan&*ers - A Look At The Role Of Masturbation In Online Offending - NSFW
- Mick Moran
►
IRISSCon 2019
Patches Will Fail Us. The Future Of IT Defence
- Kirils Solovjovs
►
IRISSCon 2019
Are Humans A Vulnerability?
- Emma Heffernan
►
IRISSCon 2019
A Step By Step Guide To Cooking Crab
- Raj Samani
►
IRISSCon 2019
Security And Privacy In Healthcare The Good, The Bad And The Ugly
- Jelena Milosevic
►
IRISSCon 2019
Not All Cyber Criminals Are Evil Geniuses
- Graham Cluley
►
IRISSCon 2019
Technology Ireland ICT Skillnet
- Carmel Somers
►
IRISSCon 2019
IRISSCERT Year In Review And Key Threats To Ireland
- Brian Honan
►
IRISSCon 2019
Conference Opening
- Gordon Smith
►
GreHack 2019
Closing Speech
- Xarkes
►
GreHack 2019
Rump Session: Aperi'Solved
- Various
►
GreHack 2019
Rump Session: Access Granted
- Various
►
GreHack 2019
Rump Session: Solving 'The Grid' In Three Different Ways
- Various
►
GreHack 2019
Corrupted Memories Requiem
- *Anonymous Pwners*
►
GreHack 2019
IOT Security: Hack The Damn Vulnerable IoT Device
- Arnaud Courty
►
GreHack 2019
The Rise Of Evil HID Devices
- Franck Bitsch and Arthur Villeneuve
►
GreHack 2019
Wombat: One More Bleichenbacher Attack Toolkit
- Olivier Levillain and Aina Toky Rasoamanana
►
GreHack 2019
VBA For The Masses
- Jonas Zaddach
►
GreHack 2019
Hunting For Bugs, Catching Dragons
- Nicolas Joly
►
GreHack 2019
Oh! Auth: Implementation Pitfalls Of OAuth 2.0 And The Auth Providers Who Have Fell In It
- Samit Anwer
►
GreHack 2019
Optimize Your Way To RCE Chakra
- Bruno Keith
►
GreHack 2019
Opening Speech
- Roland Groz
►
Black Alps 2019
Fuzzing Java Code With The Help Of JQF
- Tobias Ospelt
►
Black Alps 2019
PatrOwl-Red Flavour Of SOC Automation
- Nicolas Mattiocco
►
Black Alps 2019
Battle In The Clouds: Attacker Vs. Defender On AWS
- Dani Goland and Mohsan Farid
►
Black Alps 2019
The Inner Guts Of A Connected Glucose Sensor For Diabetes
- Axelle Apvrille and Travis Goodspeed
►
Black Alps 2019
Swisscom Bug Bounty: Retour D'Un Chercheur
- Daniel Le Gall
►
Black Alps 2019
Maintaining Cryptographic Library For 11 Languages: Fun Stories And Epic Bugs
- Anastasiia Voitova
►
Black Alps 2019
No More Whack-a-Mole: How To Find And Prevent Entire Classes Of Security Vulnerabilities
- Sam Lanning
►
Black Alps 2019
Building Your Own WAF As A Service And Forgetting About False Positives
- Juan Berner
►
Black Alps 2019
Blockchain Vulnerabilities And Exploitation In Practice
- Nils Amiet
►
Black Alps 2019
Hash Collision Exploitation
- Ange Albertini
►
Black Alps 2019
OS X RAM Forensic Analysis-Extracting Encryption Keys And Other Secrets
- Léo Cortès
►
Black Alps 2019
Computing On Encrypted Data: A Survey
- Pascal Junod
►
Black Alps 2019
New Tales Of Wireless Input Devices
- Matthias Deeg and Gerhard Klostermeier
►
Black Alps 2019
Ethereum: Taking Control Of Smart Contracts
- Olivier Kopp
►
Black Alps 2019
Google Bug Hunters
- Eduardo Vela Nava
►
Black Alps 2019
Opening Words
- Sylvain Pasini
►
BSides Belfast 2019
Closing Note
- BSides Belfast Crew
►
BSides Belfast 2019
Closing Keynote
- Wendy Nather
►
BSides Belfast 2019
Signed, Sealed, Compromised: The Past, Present, And Future Of Supply Chain Attacks
- Edmund Brumaghin and Nick Biasini
►
BSides Belfast 2019
A Year Hunting In A Bamboo Forest
- Sebastien Larinier
►
BSides Belfast 2019
How To Investigate IOS Devices
- Paul Rascagneres
►
BSides Belfast 2019
Demystifying QBot Banking Trojan
- Nick Summerlin and Jorge Rodriguez
►
BSides Belfast 2019
Nudging Security Awareness Towards Harm Reduction
- Michelle Stella
►
BSides Belfast 2019
Compliance As Code With Open Policy Agent
- John McCabe
►
BSides Belfast 2019
Nice One, Dad: Dissecting A Rare Malware Used By Leviathan
- Brian Bartholomew
►
BSides Belfast 2019
State Of Cybersecurity Report: Extended Play
- Dan Raywood
►
BSides Belfast 2019
Operation Tripoli
- Aseel Kayal
►
BSides Belfast 2019
Ticket To Ride: New Attacks On The MIFARE DESFire EV1 Smartcard Used In Public Transportation
- Rory Flynn
►
BSides Belfast 2019
Offensive Ansible For Red Teams (Attack, Build, Learn)
- Leo McCavana
►
BSides Belfast 2019
Building The Best Team To Hunt The Biggest Threats
- Martin Lee
►
BSides Belfast 2019
Titanics Of Security: Users Aren't The Only Problem
- Jason Halley
►
BSides Belfast 2019
It's Never DNS... It Was DNS: How Adversaries Are Abusing Network Blind Spots
- Edmund Brumaghin and Earl Carter
►
BSides Belfast 2019
The Joule Thief: A Look Into The Activity Of "The Cryptominer Champion" Rocke
- Joakim Kennedy
►
BSides Belfast 2019
Opening Keynote
- Brian Honan
►
BSides Belfast 2019
Welcome Note
- BSides Belfast Crew
►
BSides Luxembourg 2019
What You Most Likely Did Not Know About Sudo
- Peter Czanik
►
BSides Luxembourg 2019
Where's Wally? Hands-On Thread Hunting In Elasticsearch Using EE-Outliers
- Daan Raman
►
BSides Luxembourg 2019
Telecom Security And A Usecase In SMS Phishing
- Dr. Cu D. Nguyen and Alexandre De Oliveira
►
Att&ck Community 2019
Generating MITRE ATT&CK DNA For Groups Of Actors
- Sergey Polzunov
►
Att&ck Community 2019
Visualizing ATT&CK Data In Maltego
- Christophe Vandeplas
►
BSides Luxembourg 2019
(Identify) | Protect | Detect | Respond A Deep Dive Into A High Visibility 2017 Breach
- James Nemetz
►
Att&ck Community 2019
Breakdown Of The Pre-Attack Framework
- Stijn Vande Casteele
►
BSides Luxembourg 2019
A Walk Through Logs Hell
- Xavier Mertens
►
BSides Luxembourg 2019
Syslog-ng: Getting Started, Parsing Messages, Storing In Elasticsearch
- Peter Czanik