Most recent
Conferences
For organizers
The rig
Buy me a Mate
Search
Fundraiser
Bluesky
Note: These are the most recently filmed vids that have been released.
For the most recently released vids, check
my BlueSky.
.
►
Insomni'hack 2026
Honey Well Done: Aged Vulnerabilities In The Equipment Of A Major Industrial Vendor
- Kirill Kutaev
►
Insomni'hack 2026
Low Hanging Apples: Red Teaming MacOS
- Waleed Barakat & Paul Montgomery
►
Insomni'hack 2026
From Code To Compromise: Turning Modern Day IDEs Into Attack Vectors Via Malicious Extensions
- Debjeet Banerjee
►
Insomni'hack 2026
From AiTM Phishing To Self-Replicating Worms: Inside The 2025 Npm Attacks
- Christophe Tafani-Dereeper
►
Insomni'hack 2026
Many Roads Lead To Flash: Exploring New Embedded Bootloader Exploits For Firmware Extraction
- Qais Temeiza
►
Insomni'hack 2026
Keypocalypse
- Emilien Le Jamtel
►
Insomni'hack 2026
Shoot For The Galaxies: Our Samsung S25 1-click RCE Journey
- Yichen Chai & Sacha Kozma
►
Insomni'hack 2026
Simplify Or Drown: Practical Strategies For Streamlining Security Processes
- Sebastian Avarvarei
►
Insomni'hack 2026
Reflecting Your Authentication: Look In The Mirror - It’s You
- Andrea Pierini
►
Insomni'hack 2026
PAMdemic: Privileged Account Management And How Unauthorized Access Could Spread Faster Than You Think
- Melina Phillips
►
Insomni'hack 2026
Nightmare On NTLM Street: Legacy's Revenge
- Marina Bochenkova
►
Insomni'hack 2026
What Are SIM Farms?
- Keven Hendricks
►
Insomni'hack 2026
The Architecture Of Insecurity
- Anastasija Collen
►
Insomni'hack 2026
Introduction
- Raphaël Conz
►
Insomni'hack 2026
Improving SAP Security: Tooling For Authorizations And Post-exploitation
- Aloïs Colléaux-Le Chêne
►
Insomni'hack 2026
I Tried Reverse Engineering A Solana Smart Contract And It Drove Me To Insanity. Here's Why
- Luca Di Bartolomeo
►
Insomni'hack 2026
How To Become A Cyber Entrepreneur: Startup Pitches & Founder Insights
- Panel
►
Insomni'hack 2026
Shift Happens: Uncovering Two Built-In Command Injections In Windows Context Menus
- Remi Gascou
►
Insomni'hack 2026
Safety Of Large Language Models: Training Data Attribution And Efficient Search
- Anastasiia Kucherenko
►
Insomni'hack 2026
The Talent (R)Evolution: Building A Career In Cybersecurity
- Panel
►
Insomni'hack 2026
Silo-Binding Uncovering The Ghost In The Silo
- Andrei-Marius Muntea & Andrei Mermeze
►
Insomni'hack 2026
Zombie Workflows And Other GitHub Actions Horror Stories
- Paul Gerste
►
Insomni'hack 2026
Other CISOs Say We Made Very Weird Choices In Our Cyber Security. Of Course We Did!
- Olivier Martinet
►
Insomni'hack 2026
Guard Me If You Can: A Novel Passwordless-to-Password Attack
- Yuya Chudo
►
Insomni'hack 2026
Pruning Garden Paths In AWS
- Evan Perotti
►
Insomni'hack 2026
Cybersécurité Sous Contraintes: Gouverner Le Risque Quand On N’a Pas Les Moyens De La Sécurité
- Fiona Ponzo & Guillaume Fumeaux
►
Insomni'hack 2026
Core-ruption: A Deep Dive Into 5G Mobile Network Vulnerability Research
- Arthur Naullet & Maxime Gautier
►
Insomni'hack 2026
Meetings You Didn’t Plan, But We Did
- Inés Martín
►
Insomni'hack 2026
Smile, You're On Camera! Livestreaming From North Korea's IT Workers Laptop Farm
- Mauro Eldritch & Heiner García Perez
►
Insomni'hack 2026
SACL: The Detection Capability You've Been Ignoring
- Wojtek Sochacki & Maroua Lahlouhi
►
Insomni'hack 2026
A Practical Guide To Your Company’s Post-quantum Cryptography Journey
- Florian Widmer
►
Insomni'hack 2026
Cybersecurity Between Geopolitics And Tech Supremacy
- Florian Schütz
►
BSides London 2025
Closing Remarks
- BSides London Orga
►
BSides London 2025
Bridging LAN And Cloud: Actionable Security Tips For Every Defender
- @CloudWhistler
►
BSides London 2025
EmailShell - A War Story On Leveraging Server Side Template Injection (SSTI) To Hack Into GCP
- Filip
►
BSides London 2025
Amadey Malware Analysis: How Digital Forensics And A Batch Script Helped Me Unlock The Mystery Of The Infection Chain
- Ataur Rahman
►
BSides London 2025
Why Bother? Regulating Operational Technology Beyond Critical National Infrastructure
- Owen
►
BSides London 2025
How Not To Become A Red Teamer
- Neil Lines
►
BSides London 2025
You Scored 46
- David McKenzie
►
BSides London 2025
Governments' Guide To Social Engineering
- Mario Khawam
►
BSides London 2025
Hacking Humans: A Nurses Perspective
- Emma
►
BSides London 2025
From Startup Speed To Security Mindset: My Shift From Dev To Infosec
- Keleigh Berenger
►
BSides London 2025
When Java Plays Unsafe: How A Single Mistake Can Break Memory Safety
- Thomas Leplus
►
BSides London 2025
Applying Cybersecurity To Cognitive Defense: Too Much Information, Noise, Critical Ignoring, And Bullshit
- Winn Schwartau
►
BSides London 2025
Your Board's Perspective On Cyber
- Jessica Figueras
►
BSides London 2025
From Pipelines To Problems: My Early DevOps Lessons In Security Culture
- Prevail Uzodinma
►
BSides London 2025
Is AI Ready For AML In DeFi? A Look Into Transaction-Level Risk Analysis
- Yash Nimbalkar
►
BSides London 2025
ClientAuth Certificates Everywhere: When Your CA Becomes The Attack Surface
- Ben Lintern
►
BSides London 2025
SAPPIN’ The Enterprise: Breaking What No One Else Pentests
- Jonathan Pake
►
BSides London 2025
Anyone Can Hack APIs: A Crash Course For Pentesters And Bug Bounty Hunters
- Alex Olsen
►
BSides London 2025
THICC Clients - No Admin, No Permissions, No Problem! Reverse Engineering Your Way To Application Admin
- Harry Williams
►
BSides London 2025
Does The Fog Ever Stop? Testing Without All The Answers
- Ehren Osborne
►
BSides London 2025
Disability And Accessibility In Cyber Security
- Deepan Shah
►
BSides London 2025
Persistence Pays: From Flames To Firewalls
- Oliver Ellis
►
BSides London 2025
Open Sesame: All Your Doors Are Belong To Us
- KevTheHermit & Benything
►
BSides London 2025
Using LLMs For Vulnerability Discovery: Hacking Like Humans (Without Humans)
- Jeevan Jutla
►
BSides London 2025
Sorry, Did You Say Millions Of Sessions? How Cheap Kits Fuel AiTM Attacks On Microsoft 365
- Joshua Rawles
►
BSides London 2025
Making Malware Analysis Less Scary
- Resetti
►
BSides London 2025
Cloud & Containers: The Security Puzzle That Locks Tight
- Ashley Barker
►
BSides London 2025
Breaking DNA: Cooking Malware In The Lab
- Ram
►
BSides London 2025
Where Did The Organiser Go? When The Conference Doesn't Run As Planned
- Cooper
►
BSides London 2025
Hunt At Scale: Fingerprinting Threat Actors Across The Web
- Stephen Doyle
►
BSides London 2025
Phish And Chips: Tactics, Tales And Takeaways
- Stefan Bargan
►
BSides London 2025
Google Pay, Drug Bots, And SIM Swaps: How Old Leaks Power New Attacks
- Sarit Yerushalmi & Ron Masas
►
BSides London 2025
Playing Peekaboo With Runtime In CI/CD Pipelines
- Patricia R
►
BSides London 2025
Phishing, Upgraded - TokenFlare: The Little Serverless AiTM Framework That Could
- Sunny Chau
►
BSides London 2025
Breaking In, Standing Tall: A Rookie’s Guide To Confidence In GRC
- Funke Omolere
►
BSides London 2025
Residential Proxies And The Line Between Use And Abuse
- Sandra Cantero
►
BSides London 2025
An Off-The-Cuff Filler Talk
- The Mentor Of @CloudWhistler
►
BSides London 2025
When Incidents Get Physical: A View Of Incident Response In Critical Infrastructure
- Akash Sandhu
►
BSides London 2025
Digital ID: A Success Story Or Dystopian Nightmare?
- Kinga Kaiserin
►
BSides London 2025
Self Pwning
- Sam Macdonald
►
BSides London 2025
Tracking North Korean hreat Actor Infrastructure
- Will Thomas
►
BSides London 2025
If I Can Do It, So Can They: Lessons From Building A Phishing Simulation Tool And The Rise Of Phishing-as-a-Service
- Ada Domanska
►
BSides London 2025
Talking Cyber To The Boardroom: What I Wish I Knew Sooner
- Lee Ward
►
BSides London 2025
Beginner’s Guide To Malicious Browser Extensions
- Kush Pandya
►
BSides London 2025
Tap, Pay, And Pray
- Praneeth
►
BSides London 2025
From Chaos To Calm: Mastering InfoSec Audits
- Sadik Miah
►
BSides London 2025
TryHackingMy Way From Cyber Sales To Cyber SOC (Rookie)
- R4ck4tt4ck
►
BSides London 2025
A Technical Evaluation Of Real-World Passkey Security: Why They’re The Best Chance We Have
- Dave C - NCSC UK
►
BSides London 2025
5 Gaps Exposed In 30+ Real-World Tabletop Exercises
- Ashu Savani
►
BSides London 2025
Living On The Edge: Abuse Of Microsoft Edge For Persistence
- Alex Brown
►
BSides London 2025
Opening Remarks
- BSides London Orga
►
WICCON 2025
Unsafe Code Lab: How Modern Web Frameworks Fail (And How To Fix Them)
- Irina Iarlykanova
►
WICCON 2025
When Nostalgia Hacks Back: A Forensic Autopsy Of A Trojanized Flash Game
- Ankshita Maunthrooa
►
WICCON 2025
We've Gathered 4000 Hackers On A Field And Here's What Happened
- Nancy Beers
►
WICCON 2025
Crack, Communicate, Change: Turning Password Failures Into Security Wins
- Nynke Damstra
►
WICCON 2025
Hooray, I Failed!
- Tess Sluijter-Stek
►
WICCON 2025
Embedded AI: Evolving Attack Surface And Ways To Defend Them
- Prithvi Bhat
►
WICCON 2025
Breaking In: A Journey Through The Cybersecurity Hiring Maze
- Lianne Klaver