• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2019
Edition logo

BSides London 2023

2023-12-09
  • Thumbnail for the video - click to play

    ►

    Welcome
    - David Zilberberg
  • Video will not be published
    Unearthing The Secrets Of Securing A 160-Year-Old Railway: Beyond The Basics!
    - Pete G
  • Thumbnail for the video - click to play

    ►

    Security Is Key: The Vulnerabilities Of API Security
    - Joe Wrieden
  • Thumbnail for the video - click to play

    ►

    Your Friendly Neighbourhood Penguin: Using Linux And WSL To Stay Under The Radar
    - Idan Ron and Max De Lacey
  • Thumbnail for the video - click to play

    ►

    XS-Leaks: Client-Side Attacks In A Post-XSS World
    - Zeyu (Zayne) Zhang
  • Thumbnail for the video - click to play

    ►

    The Simple Approach To Security Risk Management
    - Asher Selman
  • Thumbnail for the video - click to play

    ►

    Exploring The Dark Web: Forums, Markets, And Scam Insights
    - Stefan Bargan
  • Thumbnail for the video - click to play

    ►

    "Open, Sesame!" - Unlocking Bluetooth Padlocks With Polite Requests
    - Miłosz Gaczkowski and Alex Pettifer
  • Thumbnail for the video - click to play

    ►

    Breaking Bad Multifactor: MFA Bypasses And How To Assess The Risks
    - Chester Wisniewski
  • Thumbnail for the video - click to play

    ►

    Connected Chaos: Uncovering Router Vulnerabilities Via Cloud API Connections
    - Vangelis Stykas
  • Thumbnail for the video - click to play

    ►

    A Talk About Cross-Site Scripting (XSS) In 2023? The Mitigated Unmitigated Vulnerability.
    - Val Resh
  • Thumbnail for the video - click to play

    ►

    In Space; Everyone Can Hear Your Downlink
    - Minus
  • Thumbnail for the video - click to play

    ►

    Red Teaming On Critical Infrastructure
    - Granit Beka
  • Thumbnail for the video - click to play

    ►

    Game Of Codes: QR Thrones, Image Battles, And The Quest For Initial Access
    - Josh Kamdjou
  • Thumbnail for the video - click to play

    ►

    Oh My Phish!
    - Theram and Dhruv Bisani
  • Thumbnail for the video - click to play

    ►

    An Abridged History Of Malware
    - Olivia Betts
  • Thumbnail for the video - click to play

    ►

    Cloudy With A Chance Of Security
    - Sascha Bharath
  • Thumbnail for the video - click to play

    ►

    Wires Gone Rogue: IoT Security At The Cable Level
    - Aunart Grajqevci
  • Thumbnail for the video - click to play

    ►

    The (Non)Inclusivity Of InfoSec: My Experience
    - Dan Ogleby
  • Thumbnail for the video - click to play

    ►

    The Internet Never Forgets: OSINT'ing Myself To Uncover 30 Years Of Data Leakage
    - Thomas Preece
  • Thumbnail for the video - click to play

    ►

    Elevate & Conquer: A Journey Into Kernel Exploitation
    - Tijme Gommers
  • Thumbnail for the video - click to play

    ►

    Soc Adventurez In TiETW
    - Luke Jones
  • Thumbnail for the video - click to play

    ►

    Exploring Retail’s Cyber Threat Landscape
    - Alexandra Forsyth
  • Thumbnail for the video - click to play

    ►

    Game Hackers And You: Knowledge Extraction From Toxic Places
    - Morgan Brazier
  • Thumbnail for the video - click to play

    ►

    Abusing RWX-S Binaries For Post-exploitation
    - At0m
  • Thumbnail for the video - click to play

    ►

    Anti-forensics Techniques Used By Threat Actors In The Wild
    - Hela Lucas
  • Thumbnail for the video - click to play

    ►

    Decentralization: Mo' Systems, Mo' Bridges, Mo' Comms, ... Mo' Problems?
    - Maya Boeckh
  • Thumbnail for the video - click to play

    ►

    Breaking The Cloud: A Tale Of 3 Breaches!
    - Ashish Rajan
  • Video will not be published
    ASR Fatigue Reduction: Managing Attack Surface Reduction Rules
    - James Stewart
  • Thumbnail for the video - click to play

    ►

    The Art Of Cyber Deception
    - Joshua Wardle
  • Thumbnail for the video - click to play

    ►

    Off The Hinge: Dating With OSINT
    - Taylor Rhoades
  • Thumbnail for the video - click to play

    ►

    Physical Intrusion - Access Un-Controlled
    - Iain Parkes
  • Thumbnail for the video - click to play

    ►

    Scaling Detection And Response Teams: Enabling Efficient Investigations
    - James Dorgan
  • Thumbnail for the video - click to play

    ►

    Slightly SOSL'ed: Locating And Testing SOSL Injection
    - Nick Dunn
  • Thumbnail for the video - click to play

    ►

    Ethical Hacking: Navigating The Modern Ethical And Moral Landscape
    - Muhammed Aanish Butt
  • Thumbnail for the video - click to play

    ►

    Cyber Resilience In Industry 4.0: Strengthening Standards And Embracing Emerging Tech
    - Shaza Al-Haddad
  • Thumbnail for the video - click to play

    ►

    Bugs Are Shallow: Finding Vulnerabilities In Top GitHub Projects
    - Laurence Tennant
  • Thumbnail for the video - click to play

    ►

    Beyond The Code / SBOM: Supply Chain Security
    - Anant Shrivastava
  • Thumbnail for the video - click to play

    ►

    Automated Wargaming Of A Chemical Plant
    - Martyn
  • Thumbnail for the video - click to play

    ►

    Of Microchips And Mammals
    - Elliott Nash
  • Thumbnail for the video - click to play

    ►

    DevSecOps On A Budget: Building A Secure Development Pipeline Without Breaking The Bank
    - Robbie Thandi
  • Thumbnail for the video - click to play

    ►

    Closing
    - Brian Whelton