• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2019
Edition logo

BSides London 2022

2022-12-10
  • Video will not be published
    Attacking And Defending On-Premises And Cloud-Based Kubernetes Services
    - Sadi Zane
  • Video will not be published
    Stalking The Stalkers.
    - Vangelis Stykas and Felipe Solferini
  • Video will not be published
    My Experience Using OSINT To Aid In Finding Missing People
    - Ahmed Rashwan
  • Thumbnail for the video - click to play

    ►

    Won't Somebody Please Think Of The Maintenance
    - Martin McCloskey
  • Thumbnail for the video - click to play

    ►

    How Low Can You Go? - Minimising Container Attack Surface For Security And Performance
    - Ollie Cuffley-Hur
  • Video will not be published
    Introducing Varc: Volatile Artifact Collector
    - Matt Muir and Paul Scott
  • Thumbnail for the video - click to play

    ►

    Cloud Chatter: Defending Against Cloud C2
    - Dagmawi Mulugeta
  • Thumbnail for the video - click to play

    ►

    Exploiting Linux Capabilities
    - Yannis Folias
  • Video will not be published
    Scammers Who Scam Scammers, Hackers Who Hack Hackers: A Hidden Sub-Economy On Criminal Marketplaces, And Why It Matters
    - Matt Wixey
  • Thumbnail for the video - click to play

    ►

    Patterns, Trends And Practises In Software Security
    - Elisa Cavatorta
  • Thumbnail for the video - click to play

    ►

    Everybody Loves TAXII
    - Alexander Darby
  • Thumbnail for the video - click to play

    ►

    Rainbow Road: The Game Behind Cyber's Colour Theory
    - Ana Vijay
  • Video will not be published
    "GIFShell" — Covert Attack Chain And C2 Utilizing Microsoft Teams GIFs
    - Bobby Rauch
  • Thumbnail for the video - click to play

    ►

    Hacking Serverless Applications: A Treasure Map For Uncharted Waters
    - Chen Alon
  • Thumbnail for the video - click to play

    ►

    Getting Started With Threat Hunting: How To Introduce Proactive Security In Your Team
    - Wiktor Wielento
  • Thumbnail for the video - click to play

    ►

    Fangxiao, A Chinese Phishing Threat Actor
    - Emily Dennison and Alana Witten
  • Thumbnail for the video - click to play

    ►

    Introduction To Bug Hunting
    - Hasan Elisert
  • Video will not be published
    Sculpting A University-Level Web App Hacking Curriculum
    - Jamie O'Hare
  • Thumbnail for the video - click to play

    ►

    Evil Neighbour Attacks On SaaS Platforms Cloudflare, Bitbucket, Etc
    - Yash Kadakia
  • Thumbnail for the video - click to play

    ►

    Hacking Brains: The Security Of Brain-Computer Interfaces
    - Julia Wilk
  • Thumbnail for the video - click to play

    ►

    Honeypots, I Shrunk The Data
    - Oscar Williamson
  • Video will not be published
    Three Surprising Kubernetes Networking "Features" And How To Defend Against Them
    - James Cleverley-Prance
  • Thumbnail for the video - click to play

    ►

    Detection At Scale
    - Troy Defty
  • Thumbnail for the video - click to play

    ►

    Where Do You Draw The Line?
    - Patricia R
  • Thumbnail for the video - click to play

    ►

    The Rise Of RaaS
    - Ellis Casey
  • Thumbnail for the video - click to play

    ►

    DLP Without GOD Keys A Journey In Maths
    - Mick Vaites
  • Video will not be published
    What3Words: The Emperors Knew Cloves
    - Andrew Tierney and Nicky Bloor
  • Thumbnail for the video - click to play

    ►

    The Office Of Danger: A Choose Your Own Adventure Story!
    - Phil Eveleigh