-
Sbud: Infovis In Infosec
- Ange Albertini
-
Detecting VPNs/Proxies By Analyzing
Their Attack Patterns Over Time
- Emanuel Seemann
-
SBOMs: Are They A Threat Or A Menace?
- Philippe Ombredanne
-
Token Smart Contract Analyzer
- Thierry Grandjean
-
Cloaking Malicious
Web Content Delivery
- Jeroen Pinoy
-
The Composition Analysis Of Binary
Java, ELF, Go, And JavaScript Apps
- Philippe Ombredanne
-
Case Management
- Cruciani
-
GeoOpen And MMDB-Server: A Comprehensive
Open Source Solution For IP Address Geolocation
- Alexandre Dulaunoy
-
CTI Is Dead, Long Live CTI!
- David
-
FOSStering An ISAC: Enabling A
Community With Open-Source Tools
- JJ Josing
-
Kunai:
Your New Threat Hunting Tool For Linux
- Quentin Jerome
-
Why Does The CTI Industry Struggle
With Communicating Uncertainties?
- Ondra Rojcik
-
Ensuring IoC Quality At CERT-FR
- Victor Barrault
-
MISP Updates
- Andras Iklody
-
Malware AV Evasion Tricks:
Cryptography In Malware
- Cocomelonc
-
Cratos:
Use Your Bloody Indicators
- Dennis Rand
-
IPFS Unveiled:
Exploring Data Collection, Analysis, And Security
- Patrick Ventuzelo and Tanguy Laucournet
-
He Is Everywhere:
A Tale Of Lazarus And His Family
- JeongGak Lyu and @lazarusholic
-
Cerebrate - Learning To Run
- Andras Iklody
-
Digital Tug Of War: Unraveling The
Cyber Battle Between Ukraine And Russia
- Ondrej Nekovar and Jan
-
How To Operationalize CTI:
A Real World Example
- Melanie Niethammer
-
Liberate The CSAM Hashsets!
- Andras Iklody
-
Cobalt Striked?
- Vincent Hinderer
-
Are Leaked Credentials Dumps Used By Attackers?
- Xavier Mertens
-
Lessons Learned From Sharing Intel
About Potential Fraud # Compomise
- Jeroen Pinoy
-
Sigma Project News
- Thomas Patzke
-
Do We Consider This
As A Risks Already?
- Vladimir Kropotov
-
JTAN - Data Sharing Network
- Paweł Pawliński and Alexandre Dulaunoy
-
Turbocharging IOC Validation:
Become A More Efficient CTI Analyst
- Arwa Alomari
-
Modern IOCs Matching With Suricata
- Eric Leblond and Peter Manev
-
PXF-X - A Modular Python Framework To Hunt, Extract
And Enrich Post-Exploitation Framework Artifacts
- Joel Doenne
-
Pyrrha:
Navigate Easily Into Your System Binaries
- Eloïse Brocas
-
Threat Actors & Surveillance Companies
Targeting Telecom Operators
- Alexandre De Oliveira
-
How Crowdsec Is Building A Collaborative, Trustable, And
Crowdsourced CTI To Change The Cybersecurity Landscape
- Matthieu Mazzolini
-
MISP42:
Connecting CTI And SOC Teams
- Remi Seguy
-
Yeti:
Old Dog, New Tricks
- Sébastien Larinier and Thomas Chopitea
-
How Digital Technologies Are
Redefining Warfare And Why It Matters
- Mauro Vignati
-
Ongoing EvilEye Campaigns
Targeting CCP Adversaries
- Rascagneres Paul
-
Defeating VPN Always-On
- Maxime Clementz
-
The Renaissance Of Cyber
Physical Offensive Capabilities
- Daniel Kapellmann Zafra
-
Introduction To Cyberwarfare:
Theory And Practice
- Lukasz Olejnik
-
You Can Learn Anything
- Cookie
-
Velocity Raptor: Accelerating Velociraptor
Hunting With Tenzir Pipelines
- Matthias Vallentin
-
TIDeMEC : A Detection Engineering Platform
Homegrown At The European Commission
- Amine Besson
-
Deming - ISMS Open Source
- Didier Barzin
-
Belgian Cyber Reserve Forces
- Christophe Vandeplas
-
Non Vulnerable Package
Dependency Resolution
- Philippe Ombredanne
-
Embedded Threats:
A Deep Dive Into The ESIM World
- Markus Vervier
-
Building An Evil Phone Charging Station
- Stef Van Dop and Tomás Philippart
-
Do's And Don'ts In File Formats
- Ange Albertini
-
ACME: Benefits Of Deploying An Internet
Security Protocol Inside Your Corporate Network
- Christophe Brocas
-
Your Unknown Twins: Identity In The Era Of
Deepfakes, AI And Mass Biometrics Exposure
- Vladimir Kropotov
-
PHP Filter Chains: How To Use It
- Rémi Matasse (@_remsio_)
-
MISP <=> LLM
Automating Free Form CTI Reports
- Sami Mokkadem,Andras Iklody and Aaron Kaplan
-
Internet Exposure Of Satellite
Modems, And Their Vulnerabilities
- Patrice Auffret and Arnaud Girault
-
Almost 2 Years After Log4J .. If Your PSIRT Has Survived, Are The Lessons
Learned Or Not Learned On Security Incident & Vulnerability Management?
- FrederiqueD
-
Avoiding The Basilisk's Fangs:
State-of-the-art In AI LLM Detection
- Jacob Torrey
-
Permissionless Universal Overlays
- Dimitrios Valsamaras
-
Raiders Of The Lost Arts
- Stefan Hager
-
Token Smart Contract Analyzer
- Thierry Grandjean
-
Suricata Language Server
- Eric Leblond
-
Wintermute:
An LLM Pen-Testing Buddy
- Aaron Kaplan
-
SLP DoS Amplification:
Someone Is Having Fun
- Pedro Umbelino
-
DER Editing, Easy-Peasy
With asn1template
- William Robinet
-
Supply Chain Resilience:
Challenges & Solutions
- Saâd Kadhi
-
Open Wounds: The Last 5 Years
Have Left Bluetooth To Bleed
- Xeno Kovah
-
The Rise Of Malicious MSIX File
- Rintaro Koike and Shogo Hayashi
-
Reviving Our Oldest Tool:
Using Bayesian Inference To Detect Cyber Attacks
- Emanuel Seemann
-
Using Apple Sysdiagnose For
Mobile Forensics And Integrity Checks
- David Durvaux and Aaron Kaplan
-
A Deep Dive Into
Maritime Cybersecurity
- Olivier Jacq
-
Operation Duck Hunt:
A Peak Behind The Curtain Of DuckTail
- Pol Thill
-
Kunai:
Your New Threat Hunting Tool For Linux
- Quentin Jerome
-
Closing & Prize Giving Ceremony
- Hack.lu