• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
Edition logo

BSides Dublin 2025

2025-05-24
  • Video will not be published
    Welcome & Opening Remarks
    - BSides Dublin
  • Thumbnail for the video - click to play

    ►

    SaaSquatch Hunters: Threat Detection In The Wild Of SaaS
    - Julie Agnes Sparks
  • Thumbnail for the video - click to play

    ►

    When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts
    - Michelle Simpson
  • Thumbnail for the video - click to play

    ►

    Threat Modeling Meets Model Training: Web App Security Skills for AI
    - Breanne Boland
  • Video will not be published
    Right to Repair: Tractors, Hackers, And Property Rights
    - Ciaran Conliffe
  • Thumbnail for the video - click to play

    ►

    Hackers with Radios: Security and the Physical Layer
    - Mark Megarry
  • Video will not be published
    Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots
    - Allyn Stott
  • Thumbnail for the video - click to play

    ►

    From Quantum Threats to Quantum Shields A Comprehensive Guide to Post-Quantum Cryptography
    - Panagiotis (Panos) Vlachos
  • Thumbnail for the video - click to play

    ►

    Dungeons & Dragons: The security tool you didn't know you needed
    - Klaus Agnoletti
  • Video will not be published
    The Human Factor: Quantifying Human Risk
    - Sara Anstey
  • Thumbnail for the video - click to play

    ►

    I Am Not Who I Am: Bypassing Biometric Authentication Systems
    - Oluwasefunmi Alabi
  • Video will not be published
    You Shall Not Pass! (Without Proper Attribution): Untangling a Complex Attribution Case
    - Asli Koksal
  • Video will not be published
    Exploiting the Web with Charsets
    - Cillian Collins
  • Thumbnail for the video - click to play

    ►

    A Deep Dive into the Triad Nexus Pig Butchering & Money Laundering Network
    - Kasey Best and Zach Edwards
  • Thumbnail for the video - click to play

    ►

    Death by Metrics: How Numbers Can Kill Your Security
    - Valentine Mairet
  • Video will not be published
    Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework
    - Stefania Lauciello
  • Thumbnail for the video - click to play

    ►

    One Bug, Two Bug, Red Bug, Blue Bug
    - Lea Snyder and Patrick Fitzgerald
  • Thumbnail for the video - click to play

    ►

    Is Your Phone Spying on You? An In-Depth of Vulnerabilities in Cisco VoIP Phones
    - Balazs Bucsay
  • Video will not be published
    Attacking LLM Detectors with Homoglyph-Based Attacks
    - Aldan Creo
  • Thumbnail for the video - click to play

    ►

    Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
    - Juho Jauhiainen
  • Thumbnail for the video - click to play

    ►

    Performing a 0-click Token Heist in Microsoft Teams Meetings
    - Evan Grant
  • Video will not be published
    Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit?
    - Rebecca Martin
  • Thumbnail for the video - click to play

    ►

    Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines
    - Domagoj Klasic
  • Thumbnail for the video - click to play

    ►

    Is malware getting smarter? Exploring AI-driven threats and solutions
    - Candid Wuest
  • Video will not be published
    Start covering your bases & Stop chasing APT headlines
    - Avishay Zawoznik
  • Thumbnail for the video - click to play

    ►

    Breaching a Bank: Mission Impossible Style
    - Ridhwan Roshan
  • Thumbnail for the video - click to play

    ►

    The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response Efforts
    - Giorgio Perticone
  • Video will not be published
    Restless Guests: From Subscription to Backdoor Intruder
    - Simon Maxwell-Stewart
  • Thumbnail for the video - click to play

    ►

    The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones
    - Katie Colgan
  • Thumbnail for the video - click to play

    ►

    Demistifying the First Few Minutes After Compromising a Container
    - Stuart McMurray
  • Thumbnail for the video - click to play

    ►

    Locknote: On (Un)Natural Selection: The Evolution of Malware
    - Lena Yu
  • Video will not be published
    Closing Remarks
    - BSides Dublin