• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2019
  • 2018
  • 2017
Edition logo

BSides Munich 2024

2024-11-11
  • Thumbnail for the video - click to play

    ►

    Welcome
    - BSides Munich Orga
  • Thumbnail for the video - click to play

    ►

    8 Bits Wisdom To Secure The Code Of Life
    - Desiree Sacher-Boldewin
  • Thumbnail for the video - click to play

    ►

    Real-Time Threat Intelligence With ML Feedback Loops
    - Tomer Doitshman
  • Thumbnail for the video - click to play

    ►

    Leaking Kakao: How I Found A 1-Click Exploit In Korea's Biggest Chat App
    - Dawin Schmidt
  • Thumbnail for the video - click to play

    ►

    Demystifying The First Few Minutes After Compromising A Container
    - Stuart McMurray
  • Thumbnail for the video - click to play

    ►

    /proc For Security Analysts: Unveiling Hidden Threats And Forensic Treasures
    - Stephan Berger and Asger Strunk
  • Video will not be published
    EDR Analysis: An Introduction To Reversing Sophisticated Detection
    - Daniel Feichter
  • Thumbnail for the video - click to play

    ►

    Building And Leading Advanced Red Teams
    - Bjoern Trappe
  • Thumbnail for the video - click to play

    ►

    Ground Control To Major Threat: Hacking The Space Link Extension Protocol
    - Andrzej Olchawa
  • Thumbnail for the video - click to play

    ►

    From Boot To Root: Identifying And Mitigating Security Issues In Bootloaders
    - Richard Weinberger
  • Thumbnail for the video - click to play

    ►

    A Security Champion's Journey: How To Make Things A Bit More Secure Than Yesterday Every Day
    - Lisi Hocke
  • Thumbnail for the video - click to play

    ►

    Mystical Vulnerabilities: Exploring The Oddities In Cybersecurity
    - Massimo Morello
  • Thumbnail for the video - click to play

    ►

    Some Thoughts On Penetration Test Reports
    - Hans-Martin Muench
  • Thumbnail for the video - click to play

    ►

    Kobold Letters And Other Mischief: How Emails Can Deceive You
    - Konstantin Weddige
  • Thumbnail for the video - click to play

    ►

    Demystifying Cloud Infrastructure Attacks
    - Alexander
  • Thumbnail for the video - click to play

    ►

    Reverse Engineering And Control Flow Analysis With Intel Processor Trace
    - Hagen Paul Pfeifer
  • Thumbnail for the video - click to play

    ►

    Let's Get Physical: Stories From Behind Your Company's Gate
    - Moritz Thomas and Firat Acar
  • Thumbnail for the video - click to play

    ►

    Beyond Manual: Enhancing And Scaling Security With Automation
    - Christian Bauer
  • Thumbnail for the video - click to play

    ►

    Becoming The Evil Maid: Hacking Android Disk Encryption For Fun And Profit
    - David Gstir
  • Video will not be published
    NIS2 And CRA: From Legislation To Execution
    - Sneha Rajguru & Jennifer Janesko
  • Thumbnail for the video - click to play

    ►

    Help, My Application Is Vulnerable, But How Bad Is It? Practical Vulnerability Analysis For Development Teams
    - Michael Helwig and Alvaro Martinez
  • Thumbnail for the video - click to play

    ►

    Z/OS For GenZ - Hack The Mainframe
    - Jonathan Prince
  • Thumbnail for the video - click to play

    ►

    Empowering Pentesters: Strategies For Team Motivation, Purpose And Success
    - Bettina Haas
  • Thumbnail for the video - click to play

    ►

    Closing
    - BSides Munich Orga