-
Welcome
- BSides Munich Orga
-
8 Bits Wisdom To
Secure The Code Of Life
- Desiree Sacher-Boldewin
-
Real-Time Threat Intelligence
With ML Feedback Loops
- Tomer Doitshman
-
Leaking Kakao: How I Found A 1-Click
Exploit In Korea's Biggest Chat App
- Dawin Schmidt
-
Demystifying The First Few Minutes
After Compromising A Container
- Stuart McMurray
-
/proc For Security Analysts:
Unveiling Hidden Threats And Forensic Treasures
- Stephan Berger and Asger Strunk
-
EDR Analysis: An Introduction To
Reversing Sophisticated Detection
- Daniel Feichter
-
Building And Leading
Advanced Red Teams
- Bjoern Trappe
-
Ground Control To Major Threat:
Hacking The Space Link Extension Protocol
- Andrzej Olchawa
-
From Boot To Root: Identifying And
Mitigating Security Issues In Bootloaders
- Richard Weinberger
-
A Security Champion's Journey: How To Make
Things A Bit More Secure Than Yesterday Every Day
- Lisi Hocke
-
Mystical Vulnerabilities:
Exploring The Oddities In Cybersecurity
- Massimo Morello
-
Some Thoughts On
Penetration Test Reports
- Hans-Martin Muench
-
Kobold Letters And Other Mischief:
How Emails Can Deceive You
- Konstantin Weddige
-
Demystifying Cloud Infrastructure Attacks
- Alexander
-
Reverse Engineering And Control Flow
Analysis With Intel Processor Trace
- Hagen Paul Pfeifer
-
Let's Get Physical:
Stories From Behind Your Company's Gate
- Moritz Thomas and Firat Acar
-
Beyond Manual: Enhancing And
Scaling Security With Automation
- Christian Bauer
-
Becoming The Evil Maid: Hacking Android
Disk Encryption For Fun And Profit
- David Gstir
-
NIS2 And CRA: From Legislation To Execution
- Sneha Rajguru & Jennifer Janesko
-
Help, My Application Is Vulnerable, But How Bad Is It?
Practical Vulnerability Analysis For Development Teams
- Michael Helwig and Alvaro Martinez
-
Z/OS For GenZ - Hack The Mainframe
- Jonathan Prince
-
Empowering Pentesters: Strategies For
Team Motivation, Purpose And Success
- Bettina Haas
-
Closing
- BSides Munich Orga