-
Welcome and Opening Remarks
- BSides Dublin Orga
-
No Patch For Human Regret!
Breaking People to Break into Networks
- Jayson E. Street
-
Hacking RF: Breaking What We Can’t See Demonstrations
- Grant Colgan
-
The evolution of Emotet - from an ordinary trojan to Malware-as-a-Service
- Sneha Shekar
-
Using SOCMINT In Threat Intelligence
Tracking Iranian Threat Actors Across Social Media
- Matthias Wilson
-
Digging The Attack Surface Of Microsoft Rich Text Format Files - An OLE Perspective
- Chintan Shah
-
INJ3CTOR3 Operation – Leveraging Asterisk Servers For Monetization
- Omer Ventura and Ido Solomon
-
Hop The Fences, Steal The Cars
- Ciarán McNally
-
Offensive Azure Security
- Sergey Chubarov
-
AI In A Minefield: Learning From Poisoned Data
- Itsik Mantin
-
Cyber Espionage Reloaded
- Derek Middlemiss
-
Sour Mint - The Case Of Malicious Advertisement
SDK Affecting Thousands Of Mobile Apps
- Kirill Efimov
-
Introduction To Fileless Malware
- Juan Araya
-
Threat Modeling Wins for Agile AppSec
- Rahul Raghavan
-
No More Hoodies: An Art History Lesson In Communicating Computer Security
- Catherine Chapman
-
Securing The Human As Your Greatest Vulnerability
- Jennifer Cox
-
A Glance at Interpreted Language Bytecode Trickery
- Chris Lyne
-
Fight The Fight – Orchestrating And Automating Your Incident Response
- Peter Morin
-
Egregor Awakens: Taking A Tour Of A Threat Actor’s New Digs
- Lindsay Kaye
-
Hacking The Planet: An Intro to Avionics Security
- Caitlin Long
-
Homomorphic Encryption
- Rob Slade
-
Weaponizing Systems Administration:
Leveraging IT Skills In Penetration Testing
- Jayme Hancock
-
The Stratification Of Cybercrime:
Using Divergent TTPs To Inform Defensive Strategies
- Chester Wisniewski
-
Moving Away From Exploit Kits:
The State Of Drive-By Downloads
- Krishnan Subramanian
-
I Was Promised a Jetpack
- Dave Lewis
-
Closing Remarks & CTF Prize-Giving
- BSides Dublin Orga