• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2026
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2019
Edition logo

BSides London 2025

2025-12-13
  • Thumbnail for the video - click to play

    ►

    Opening Remarks
    - BSides London Orga
  • Thumbnail for the video - click to play

    ►

    From Chaos To Calm: Mastering InfoSec Audits
    - Sadik Miah
  • Thumbnail for the video - click to play

    ►

    TryHackingMy Way From Cyber Sales To Cyber SOC (Rookie)
    - R4ck4tt4ck
  • Thumbnail for the video - click to play

    ►

    A Technical Evaluation Of Real-World Passkey Security: Why They’re The Best Chance We Have
    - Dave C - NCSC UK
  • Thumbnail for the video - click to play

    ►

    5 Gaps Exposed In 30+ Real-World Tabletop Exercises
    - Ashu Savani
  • Thumbnail for the video - click to play

    ►

    Living On The Edge: Abuse Of Microsoft Edge For Persistence
    - Alex Brown
  • Thumbnail for the video - click to play

    ►

    Beginner’s Guide To Malicious Browser Extensions
    - Kush Pandya
  • Thumbnail for the video - click to play

    ►

    Tap, Pay, And Pray
    - Praneeth
  • Thumbnail for the video - click to play

    ►

    If I Can Do It, So Can They: Lessons From Building A Phishing Simulation Tool And The Rise Of Phishing-as-a-Service
    - Ada Domanska
  • Thumbnail for the video - click to play

    ►

    Talking Cyber To The Boardroom: What I Wish I Knew Sooner
    - Lee Ward
  • Thumbnail for the video - click to play

    ►

    Digital ID: A Success Story Or Dystopian Nightmare?
    - Kinga Kaiserin
  • Thumbnail for the video - click to play

    ►

    Self Pwning
    - Sam Macdonald
  • Thumbnail for the video - click to play

    ►

    Tracking North Korean hreat Actor Infrastructure
    - Will Thomas
  • Thumbnail for the video - click to play

    ►

    An Off-The-Cuff Filler Talk
    - The Mentor Of @CloudWhistler
  • Thumbnail for the video - click to play

    ►

    When Incidents Get Physical: A View Of Incident Response In Critical Infrastructure
    - Akash Sandhu
  • Thumbnail for the video - click to play

    ►

    Breaking In, Standing Tall: A Rookie’s Guide To Confidence In GRC
    - Funke Omolere
  • Thumbnail for the video - click to play

    ►

    Residential Proxies And The Line Between Use And Abuse
    - Sandra Cantero
  • Thumbnail for the video - click to play

    ►

    Google Pay, Drug Bots, And SIM Swaps: How Old Leaks Power New Attacks
    - Sarit Yerushalmi & Ron Masas
  • Thumbnail for the video - click to play

    ►

    Playing Peekaboo With Runtime In CI/CD Pipelines
    - Patricia R
  • Thumbnail for the video - click to play

    ►

    Phishing, Upgraded - TokenFlare: The Little Serverless AiTM Framework That Could
    - Sunny Chau
  • Thumbnail for the video - click to play

    ►

    Where Did The Organiser Go? When The Conference Doesn't Run As Planned
    - Cooper
  • Thumbnail for the video - click to play

    ►

    Hunt At Scale: Fingerprinting Threat Actors Across The Web
    - Stephen Doyle
  • Thumbnail for the video - click to play

    ►

    Phish And Chips: Tactics, Tales And Takeaways
    - Stefan Bargan
  • Thumbnail for the video - click to play

    ►

    Cloud & Containers: The Security Puzzle That Locks Tight
    - Ashley Barker
  • Thumbnail for the video - click to play

    ►

    Breaking DNA: Cooking Malware In The Lab
    - Ram
  • Video will not be published
    Cybersecurity For The Non-Hacker: Protecting Systems Before It’s Too Late
    - Ozonuwe Onyenike
  • Thumbnail for the video - click to play

    ►

    Making Malware Analysis Less Scary
    - Resetti
  • Thumbnail for the video - click to play

    ►

    Open Sesame: All Your Doors Are Belong To Us
    - KevTheHermit & Benything
  • Thumbnail for the video - click to play

    ►

    Using LLMs For Vulnerability Discovery: Hacking Like Humans (Without Humans)
    - Jeevan Jutla
  • Thumbnail for the video - click to play

    ►

    Sorry, Did You Say Millions Of Sessions? How Cheap Kits Fuel AiTM Attacks On Microsoft 365
    - Joshua Rawles
  • Thumbnail for the video - click to play

    ►

    Disability And Accessibility In Cyber Security
    - Deepan Shah
  • Thumbnail for the video - click to play

    ►

    Persistence Pays: From Flames To Firewalls
    - Oliver Ellis
  • Thumbnail for the video - click to play

    ►

    Does The Fog Ever Stop? Testing Without All The Answers
    - Ehren Osborne
  • Video will not be published
    It Takes 10 Minutes To Cripple A Ransomware Gang
    - Cristian Sindile
  • Video will not be published
    Always Cloudy In Chengdu: Inside The China Nexus And The Hunt For An Adversary
    - Craig Jones
  • Thumbnail for the video - click to play

    ►

    Anyone Can Hack APIs: A Crash Course For Pentesters And Bug Bounty Hunters
    - Alex Olsen
  • Thumbnail for the video - click to play

    ►

    THICC Clients - No Admin, No Permissions, No Problem! Reverse Engineering Your Way To Application Admin
    - Harry Williams
  • Thumbnail for the video - click to play

    ►

    ClientAuth Certificates Everywhere: When Your CA Becomes The Attack Surface
    - Ben Lintern
  • Thumbnail for the video - click to play

    ►

    SAPPIN’ The Enterprise: Breaking What No One Else Pentests
    - Jonathan Pake
  • Thumbnail for the video - click to play

    ►

    From Pipelines To Problems: My Early DevOps Lessons In Security Culture
    - Prevail Uzodinma
  • Thumbnail for the video - click to play

    ►

    Is AI Ready For AML In DeFi? A Look Into Transaction-Level Risk Analysis
    - Yash Nimbalkar
  • Video not yet published
    From Silent Threat To Visible Danger: IPv6 Attacks Inside Corporate Networks
    - Felix Meggison
  • Thumbnail for the video - click to play

    ►

    Applying Cybersecurity To Cognitive Defense: Too Much Information, Noise, Critical Ignoring, And Bullshit
    - Winn Schwartau
  • Thumbnail for the video - click to play

    ►

    Your Board's Perspective On Cyber
    - Jessica Figueras
  • Thumbnail for the video - click to play

    ►

    From Startup Speed To Security Mindset: My Shift From Dev To Infosec
    - Keleigh Berenger
  • Thumbnail for the video - click to play

    ►

    When Java Plays Unsafe: How A Single Mistake Can Break Memory Safety
    - Thomas Leplus
  • Thumbnail for the video - click to play

    ►

    Governments' Guide To Social Engineering
    - Mario Khawam
  • Thumbnail for the video - click to play

    ►

    Hacking Humans: A Nurses Perspective
    - Emma
  • Thumbnail for the video - click to play

    ►

    Why Bother? Regulating Operational Technology Beyond Critical National Infrastructure
    - Owen
  • Thumbnail for the video - click to play

    ►

    How Not To Become A Red Teamer
    - Neil Lines
  • Thumbnail for the video - click to play

    ►

    You Scored 46
    - David McKenzie
  • Thumbnail for the video - click to play

    ►

    EmailShell - A War Story On Leveraging Server Side Template Injection (SSTI) To Hack Into GCP
    - Filip
  • Thumbnail for the video - click to play

    ►

    Amadey Malware Analysis: How Digital Forensics And A Batch Script Helped Me Unlock The Mystery Of The Infection Chain
    - Ataur Rahman
  • Thumbnail for the video - click to play

    ►

    Bridging LAN And Cloud: Actionable Security Tips For Every Defender
    - @CloudWhistler
  • Thumbnail for the video - click to play

    ►

    Closing Remarks
    - BSides London Orga