-
Opening Speech
- BSides Prishtina
-
Red Teaming Reimagined:
War Stories, AI, And Innovation At Scale
- Evan Pena
-
CloudTail: Making Heads Or Tails Of Selectively
Retaining Multi-Cloud Logs (w/o A SIEM!)
- Ela Dogjani
-
Building Penetration Testing Dropboxes
- Chris Carlis
-
(|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n)
(De-Obfuscation &:=De*te)(!c=tion))
- Daniel Bohannon
-
PERSEPTOR: Automating Detection Rule
Generation With AI-Driven Threat Intelligence
- Fatih Erdogan & Aytek Aytemur
-
Vishing In 2025:
How We Get Your Interns To Download Our Malware
- Adin Drabkin
-
The Code You Didn’t Write:
Why Your Dependencies Might Betray You
- Ryan Dinnan & Shkurte Marevci
-
License Plate Readers (LPRs):
Back To Basic Hacking
- Khalid Halloumi
-
2nd Day Welcome Speech
- BSides Prishtina
-
Double Fetch Vulnerabilities In C And C++
- Nick Dunn
-
Server-Side Cross-Site Scripting
- Balazs Bucsay
-
Web Security:
Exploiting Race Condition Vulnerabilities
- Armend Binaku
-
Cutting Through Cloud Policy
Obfuscation With SkyScalpel
- Abian Morina & Daniel Bohannon
-
The Hidden Battlefield: Navigating
The Legal Gray Zones Of Cyber Conflict
- Alba Thaqi & Rrezearta Thaqi
-
BEC Unmasked: Real-World Attacks,
Tactics & Lessons Learned
- Andi Ahmeti
-
Exploiting Legit APIs For Covert C2:
A New Perspective On Cloud-based Malware Operations
- Zhassulan Zhussupov
-
Closing Speech / CTF & Raffle Winners
- BSides Prishtina