-
Welcome
- Martin Hron
-
Securing Our Post-Quantum Future
- Jaya Baloo
-
A Two-part Saga: Continuing The
Journey Of Hacking Malware C2S
- Vangelis Stykas
-
AWS AI Services That
Boost Your DevSecOps Game
- Marek Šottl
-
Industrial Robots And
Machines Under Attack
- Marco Balduzzi
-
The Tail Of John And His Journey
From A Cyber Novice To A Cyber Knight
- Hung Ngo
-
GPT-like Pre-Training On Unlabeled
System Logs For Malware Detection
- Dmitrijs Trizna
-
Uncovering The Bad Duck:
"Ducktail" Incident Response Case
- B4nd1t0
-
Digital Scorched Earth:
Understanding APT-Driven Cyber Destruction
- Or Chechik
-
Using, And Mis-using Kubernetes
Dynamic Admission Control
- Richard Finlay Tweed
-
File Infectors Are (Not) Dead:
What's Spreading And How To Detect It Using YARA
- Ladislav Zezula
-
Hack To The Future: Using LLMs As
Attacking Agents In Real Networks
- Maria Rigaki & Sebastian Garcia
-
SIEM Slam: Tricking Modern SIEMs
With Fake Logs And Confusing Blue Teams
- Özgün Kültekin
-
Unmask The Bastards:
Malice And Fraud In Mobile Ads
- Abdullah Joseph
-
Closing
- Martin Hron