Most recent
Conferences
For organizers
The rig
Buy me a Mate
Search
Fundraiser
Twitter
Note: These are the most recently filmed vids that have been released.
For the most recently released vids, check
my Twitter
.
►
OWASP BeNeLux Day 2022
When hackers and cats help - Redesigning security during a crisis
- Brenno de Winter
►
OWASP BeNeLux Day 2022
Assessing the state of practice of threat modeling in Dutch organizations
- Koen Yskout
►
OWASP BeNeLux Day 2022
Are your APIs rugged?
- Colin Domoney
►
OWASP BeNeLux Day 2022
INCONTROLLER - New Malware Developed to Target Industrial Control Systems
- Daniel Kapellmann Zafra & Ken Proska
►
OWASP BeNeLux Day 2022
Security by Meme - Less FUD, more FUN
- Bram Patelski
►
OWASP BeNeLux Day 2022
Social engineering and physical entry, a Red Teamer's toolbox
- Ben Brucker
►
OWASP BeNeLux Day 2022
CTF Kickoff with OWASP WrongSecrets
- Jeroen Willemsen & Ben De Haan
►
OWASP BeNeLux Day 2022
100x your AppSec Program
- Grant Ongers
►
GreHack 2022
Closing
- GreHack Orga
►
GreHack 2022
GreHack22
- Pascal Lafourcade
►
GreHack 2022
CTF Cafe
- Oscar Gomez (Raxo)
►
GreHack 2022
BlueTeam vs SMB
- Florian Martin
►
GreHack 2022
BPF
- Tristan Pourcelot
►
GreHack 2022
RUMP REDOCS
- Pascal Lafourcade
►
GreHack 2022
Online Voting System Used For Primary Elections For The French Presidential, Must Be Secure, Right?
- Emmanuel Leblond
►
GreHack 2022
Quokka: A Fast And Accurate Binary Exporter
- Alexis Challande,Robin David and Guénaël Renault
►
GreHack 2022
Crossing The Event Horizon: Intergalactic Travels Of A Ransomware Crew
- James Niven and Lindsay Kaye
►
GreHack 2022
Reverse Engineering Of Advanced RISC-V MCU With USB3 & High Speed Peripherals
- Benjamin Vernoux
►
GreHack 2022
WHID Elite II - Keystroke Injection Over GPRS
- Cyprien De La Vergne De Cerval
►
GreHack 2022
Generic Remote Exploit Techniques For The PHP Allocator, And 0days
- Charles Fol
►
GreHack 2022
Custom Php Introspection Applied To 0-Day Research
- Louka Jacques-Chevallier and Maxime Coutant
►
IRISSCon 2022
Conference Closing
- Gordon Smith and Brian Honan
►
IRISSCon 2022
Adversarial Risk In The Age Of Ransomware
- Éireann Leverett
►
IRISSCon 2022
Overview Of The Threat Landscape And Capacity Building
- Josepth Stephens and James Caffrey
►
IRISSCon 2022
Digital Forensics Incident Readiness
- Colm Gallagher
►
IRISSCon 2022
SMEs: Boost Awareness On Cybersecurity ENISA Tools And Guidance
- Georgia Bafoutsou
►
IRISSCon 2022
The DevSecOps Approach Cloud Native Threat Detection And Response
- Rich Mogull
►
IRISSCon 2022
Cyber - The Irish Landscape
- Gerard Doyle
►
IRISSCon 2022
The Increasing Diversification Of The eCrime Ecosystem
- Christian Heggen
►
IRISSCon 2022
Cybersecurity And Quantum Readiness
- Jaya Baloo
►
IRISSCon 2022
Tracking The Adversary
- Raj Samani
►
IRISSCon 2022
Ransomware: The Security Debt Collector
- Dave Lewis
►
IRISSCon 2022
If It’s Smart, It’s Vulnerable
- Mikko Hyppönen
►
IRISSCon 2022
Conference Opening
- Gordon Smith and Brian Honan
►
Hardwear.io 2022
Closing Note & Prize Ceremony
- Hardwear.io
►
Hardwear.io 2022
An Overview Of The Security Of Some Hardware FIDO(2) Tokens
- Victor Lomne
►
Hardwear.io 2022
HandPwning: Security Pitfalls Of Hand-geometry recognition-based Access Control Systems
- Luca Bongiorni
►
Hardwear.io 2022
Blackbox Fuzzing With Side Channels
- Sergei Volokitin
►
Hardwear.io 2022
Bypass NXP LPC-Family Debug Check with Voltage Fault Injection
- Waleed AlZamil and Bandar Alharbi
►
Hardwear.io 2022
Hardware Attacks Against SM4 In Practice
- Sylvain Pelissier and Nicolas Oberli
►
Hardwear.io 2022
Practical Invasive Attacks, How The Hardware is Hacked For Compatible Product Creation?
- Thomas Olivier
►
Hardwear.io 2022
How Can We Make Hardware Bug Bounties Better?
- Panel
►
Hardwear.io 2022
Using A Magic Wand To Break The IPhone's Last Security Barrier
- Tihmstar
►
Hardwear.io 2022
Assessing The Security Of An SMM Supervisor
- Ilja Van Sprundel
►
Hardwear.io 2022
Rethinking Trusted Execution Environments In The Age Of Reconfigurable Computing
- Sérgio Pereira and Dr. Sandro Pinto
►
Hardwear.io 2022
How To Tame Your Robot
- Jiska Classen and Fabian Freyer
►
Hardwear.io 2022
Using EMC Testing Equipment As A New Side Channel Acquisition Technique
- Nicolas Oberli and Benjamin Vernoux
►
Hardwear.io 2022
Popping Locks, Stealing Cars, And Breaking A Billion Other Things: Bluetooth LE Link Layer Relay Attacks
- Sultan Qasim Khan
►
Hardwear.io 2022
Reverse Engineering Is Good For Soul
- Travis Goodspeed
►
CTIS-Summit 2022
Community Orchestration Via Cerebrate
- Andras Iklody
►
CTIS-Summit 2022
WHIDS Update
- Quentin Jerome
►
CTIS-Summit 2022
The Holy Grail For STIX And MISP Format - Misp-stix
- Christian Studer
►
CTIS-Summit 2022
CTI Operational Procedures With Jupyter Notebooks And MISP
- Koen Van Impe
►
CTIS-Summit 2022
DocIntel: A Context-Centric Threat Intelligence Platform
- Antoine Cailliau
►
CTIS-Summit 2022
LT: News From The Automation Department
- Sascha Rommelfangen
►
CTIS-Summit 2022
LT: iocmite
- Sebastien Larinier
►
CTIS-Summit 2022
LT: Ransomlook.io
- Alexandre Dulaunoy
►
CTIS-Summit 2022
LT: TLP, PAP, Just The Two Of Us
- Olivier Memin
►
CTIS-Summit 2022
LT: Hardware Keylogger Forensics: Are There Any Potential IoCs?
- Michael
►
CTIS-Summit 2022
LT: MISP-Guard
- Luciano
►
CTIS-Summit 2022
Webshells In 2022
- Paul Rascagneres & Robert Jan Mora
►
CTIS-Summit 2022
How To Meet Operational Challenges When Working With MISP On An Air-gapped Network
- Olivier Memin & Victor Barrault
►
CTIS-Summit 2022
Why Does Strategic Threat Intelligence Matter?
- Louise Taggart
►
CTIS-Summit 2022
How To Fail Your CTI Usage
- Paul Jung
►
CTIS-Summit 2022
Communities – The Underestimated Super Power Of Cyber Threat Intelligence
- Markus Ludwig
►
CTIS-Summit 2022
Exploring Internet Services: Exposing Vulnerabilities And Misconfigurations At Scale
- Gregory Boddin
►
CTIS-Summit 2022
Scaling MISP With The Cloud
- Mikesh Nagar
►
CTIS-Summit 2022
MISP Web Scraper
- Koen Van Impe
►
CTIS-Summit 2022
Sharing IOC With Customers And Partners
- Cyril Bras
►
CTIS-Summit 2022
What's HOT In MISPland: Latest Development And Roadmap Update
- Andras Iklody
►
CTIS-Summit 2022
HZ Rat Goes China: Following The Tail Of An Unknown Backdoor
- Axel Wauer
►
CTIS-Summit 2022
LT: AIL-Framework New Version
- Aurel
►
CTIS-Summit 2022
LT: ATAK
- JL
►
CTIS-Summit 2022
LT: Typosquatting-finder: Overview And Demo
- David Cruciani
►
CTIS-Summit 2022
MISP Workflow: An Improved Way To Support Your CTI Pipelines
- Sami Mokaddem
►
CTIS-Summit 2022
What Can Time Based Analysis Say In Ransomware Cases?
- David Rufenacht and Jorina Baron
►
CTIS-Summit 2022
Visualize The Potential: MISP To Power BI
- Robert Nixon
►
CTIS-Summit 2022
In Curation We Trust: Generating Contextual And Actionable Threat Intelligence
- Robert Nixon
►
CTIS-Summit 2022
Ethical Internet Scanning In 2022
- Patrice Auffret
►
OWASP NL Chapter Meetings 2022-09-15
Digitally Securing The Netherlands... Or Convincing Others To Do It
- Koen Sandbrink
►
OWASP NL Chapter Meetings 2022-09-15
The Red Cross Of The Internet
- Shairesh Algoe
►
BSides Newcastle Upon Tyne 2022
Don't turn your back on Ransonware
- Erik Heskes
►
BSides Newcastle Upon Tyne 2022
MFA - A Golden Attack Vector
- Parth Shukla
►
BSides Newcastle Upon Tyne 2022
Your Red Team Is Missing The Point
- Zibby Kwecka
►
BSides Newcastle Upon Tyne 2022
ShoDAN, Featuring Lisa Forte
- Lisa Forte,Dan Card and Dan Conn
►
BSides Newcastle Upon Tyne 2022
Subdomain Takeovers
- Simon Gurney
►
BSides Newcastle Upon Tyne 2022
Why Pen Testing Is The Last Thing You Should Do
- James Bore
►
Hack In The Box - GSec HITB2022SIN
Exploiting Race Condition Vulnerabilities In Web Applications
- Javan Rasokat
►
Hack In The Box - GSec HITB2022SIN
Getting Clear Text Passwords From An IdP & More: Our Research Methodology
- Gal Diskin
►
Hack In The Box - GSec HITB2022SIN
Can A Fuzzer Match A Human
- Bhargava Shastry