• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2019
Edition logo

BSides London 2024

2024-12-14
  • Thumbnail for the video - click to play

    ►

    Welcome
    - BSides London
  • Thumbnail for the video - click to play

    ►

    MITRE ATLAS: Exploring AI Vulnerabilities
    - Arthur Frost
  • Thumbnail for the video - click to play

    ►

    An Introduction To Patient Medication Records
    - Darren
  • Thumbnail for the video - click to play

    ►

    BYOTB: Bring Your Own Trusted Binary
    - David Kennedy
  • Thumbnail for the video - click to play

    ►

    Unmasking APT Malware Activity: Real-World Malware Campaign Tracking Using Big Data Analytics And Machine Learning Clustering
    - Daniel Johnston
  • Thumbnail for the video - click to play

    ►

    Using The OWASP Top 10 To Save The Astronauts From HAL
    - Nick Dunn
  • Thumbnail for the video - click to play

    ►

    Adopt Or Risk: Why Zero Trust Is Key To Modern Cyber Defence
    - Meletius Igbokwe
  • Thumbnail for the video - click to play

    ►

    Can You SEE!! A Risk Approach To SIEM
    - Richard Kirk
  • Thumbnail for the video - click to play

    ►

    Commanding Heights: Unmasking COM-Based UAC Bypass Techniques
    - Amankumar Badhel
  • Thumbnail for the video - click to play

    ►

    Is AI The New Big Brother?
    - Tom
  • Thumbnail for the video - click to play

    ►

    The Practical Application Of Indirect Prompt Injection Attacks: From Academia To Industry
    - David Willis-Owen
  • Video will not be published
    To You Its A Black Swan, To Me Its A Tuesday
    - David V.
  • Video will not be published
    Healthcare’s Anatomy: Dissection Of Dicom, A Protocol To Nmap Your Body!
    - 0xSeeker
  • Thumbnail for the video - click to play

    ►

    From Zero To Cyber Hero: A Non-Techie's Guide To Breaking Into Cybersecurity
    - Egonna Anaesiuba-Bristol
  • Thumbnail for the video - click to play

    ►

    LLM Security: Attacks And Controls
    - Nazeef Khan
  • Thumbnail for the video - click to play

    ►

    Robert Redford Made Me Do It: Physical Security Stories And Tips
    - Matthew Steed
  • Thumbnail for the video - click to play

    ►

    From Molecules To Malware: Visualising TLS Fingerprints With TMAP To Hunt Malicious Domains
    - Amanda Thomson
  • Video will not be published
    CyberHUMINT: Recruit, Deceive, Exploit
    - Tony Gee & Hugo Page-Turner
  • Thumbnail for the video - click to play

    ►

    Software Security Issues For Small IoT SoCs
    - Stephen Cravey
  • Thumbnail for the video - click to play

    ►

    Explaining ICS To A Fool Of A Took
    - halfling
  • Video not yet published
    It's Been A Good Run: Why I Stopped Doing OSINT CTFs
    - Alan O'Reilly
  • Thumbnail for the video - click to play

    ►

    A Minimal Talk On Distroless Containers
    - Will Dollman
  • Thumbnail for the video - click to play

    ►

    Password Hell: Accessibility Challenges In Cyber Security
    - Ana Maia
  • Thumbnail for the video - click to play

    ►

    Quantum Safe Cryptography: A Buzzword Or Something More Serious?
    - Suketu
  • Thumbnail for the video - click to play

    ►

    Elevate Your SSRF Game: Weaponize Internal DNS Records To Expose Hidden Endpoints
    - Guy Arazi
  • Thumbnail for the video - click to play

    ►

    What’s Inside The Open Directory From 96 Different Threat Actors?
    - Alana Witten
  • Thumbnail for the video - click to play

    ►

    CV Workshop
    - Samira Ali
  • Thumbnail for the video - click to play

    ►

    Continuous Threat Modelling Using Large Language Models
    - Gurunatha Reddy G & Pranay Sahith Bejgum
  • Thumbnail for the video - click to play

    ►

    Disabling Drones: Disruption And Forensic Data Analysis
    - Paavai Aram
  • Thumbnail for the video - click to play

    ►

    Storytelling For SOC Analysts: Effective Investigation Notetaking And Report Writing (Without ChatGPT!)
    - Han O’Connor
  • Video will not be published
    Gamihackation: Learning The Gaming Attack Surface
    - Alex Villegas
  • Video will not be published
    The Psychology Of Cyber: Navigating A Crisis Like A Pilot
    - George Chapman
  • Thumbnail for the video - click to play

    ►

    Do Loop Back In Anger
    - Shane Bourne
  • Thumbnail for the video - click to play

    ►

    Inside The Ransomware Toolbox: How To Beat Cybercriminals At Their Own Game
    - Will Thomas
  • Thumbnail for the video - click to play

    ►

    Is Your Approach To Pipeline Security Flawed? Rethinking CI/CD Security
    - Patricia R
  • Thumbnail for the video - click to play

    ►

    Post-Quantum Cryptography For 2025
    - Andy Smith
  • Thumbnail for the video - click to play

    ►

    BrakRPi: Crashing Bluetooth Communications On Raspberry Pi With Braktooth
    - Ilias
  • Video will not be published
    What Happens After A Business Email Compromise (BEC)
    - Umair Qamar
  • Thumbnail for the video - click to play

    ►

    Unmasking The Deepfake Threat: Detection, Prevention, And Navigating The Future
    - Onyedikachi Ugwu
  • Thumbnail for the video - click to play

    ►

    The Trustworthiness Of Generative AI In Real-Time Decision-Making For IoT Devices
    - Meet Bhorania and Yash Akbari
  • Thumbnail for the video - click to play

    ►

    From Garden To Grid: Lessons From Gardening For A Resilient Cybersecurity Strategy
    - Becky Hall
  • Thumbnail for the video - click to play

    ►

    Roll Your Own Vulnerabilities; An Introduction To Fault- Injection For Exploiting Bug-Free Code In Embedded Systems
    - @barsteward
  • Thumbnail for the video - click to play

    ►

    When The Hunter Becomes The Hunted: Using Minifilters To Disable EDRs
    - Tom Philippe
  • Thumbnail for the video - click to play

    ►

    Threat Analysis In Minutes And Other AI Super Powers
    - Bailey Williams
  • Thumbnail for the video - click to play

    ►

    Memoryless Peripherals And Secure Notebooks
    - Kai
  • Thumbnail for the video - click to play

    ►

    VEXatious Vulnerabilities: CVE Management For The Overwhelmed Security Engineer
    - Feroz Salam
  • Thumbnail for the video - click to play

    ►

    Turning To The Dark Side: Utilizing Offensive Techniques In Incident Response
    - Archie Essien
  • Thumbnail for the video - click to play

    ►

    Inside The Phish Tank: A Guide To Compromising Phishing Infrastructure
    - Vangelis Stykas & Felipe Solferini
  • Thumbnail for the video - click to play

    ►

    Cybersecurity’s New Imperative: Defending Enterprise And National Cognitive Infrastructures (By Strengthening The Mental Immune System)
    - Winn Schwartau
  • Thumbnail for the video - click to play

    ►

    Let’s Phish: How To Scam Everyone, Everywhere, All At Once
    - Dita Pesek
  • Thumbnail for the video - click to play

    ►

    Securing Embedded Devices In Robotics And IoT: Bridging The Gap Between Innovation And Security
    - Victor Oriakhi Nosakhare
  • Thumbnail for the video - click to play

    ►

    MSSP, MDR, MFA - So Why Isn't Incident Response Solved?
    - Tim Haynes
  • Thumbnail for the video - click to play

    ►

    OWASP Honeypot Threat Intelligence Project
    - Kartik Adak
  • Thumbnail for the video - click to play

    ►

    Building The ATT&CK Pipeline For Linux
    - Tim Wadhwa-Brown
  • Thumbnail for the video - click to play

    ►

    The Past, Present And Future Of Cloud-Native Security
    - Emma Yuan Fang
  • Thumbnail for the video - click to play

    ►

    How To Attack A SIEM
    - Daniel Crossley
  • Thumbnail for the video - click to play

    ►

    Closing Bits, Raffle And Prize Awards
    - BSides London