-
Insights From Modern Botnets
- Miguel
-
NeuroCTI - A Custom LLM For CTI: Benchmarking,
Successes, Failures And Lessons Learned (Updates)
- Aaron Kaplan
-
Tales Of The Future Past
- Saâd Kadhi
-
Integrating New Tools In Your
Workflows Within Minutes In MISP
- Sami Mokaddem
-
Lessons Learned From (Almost)
8 Years Of Sigma Development
- Thomas Patzke
-
Catching Phish Using Publicly Accessible Information
- Aurimas Rudinskis
-
Cyrus - The Story Of No Cloud
- Guillaume Ginis
-
Latest Updates On Kunai
- Quentin JEROME
-
Hacking EV Charging Points, For Fun... And Fixing The Firmware
- Simon Petitjean
-
Running Exercises With SkillAegis
- Sami Mokaddem
-
QKD - Is It Worth It?
- Mihai Carabas
-
Nothing To See Here! On The Awareness Of
And Preparedness And Defenses Against
Cloaking Malicious Web Content Delivery
- Jeroen Pinoy
-
Automating Dark Web CTI Reports
With RAG Insight For MISP Sharing
- Shing-Li Hung
-
Dredge: An Open Source Framework
For Cloud Incident Response
- Santi Abastante
-
You Just Got A CTI Program Funded.
Now What?
- Lukas Vytautas Dagilis
-
Malware And Hunting For Persistence:
How Adversaries Exploit Your Windows?
- Cocomelonc
-
Trying Gateway Bugs: Breaking Industrial Protocol
Translation Devices Before The Research Begins
- Claire Vacherot
-
In-Depth Study Of Linux Rootkits:
Evolution, Detection, And Defense
- Stephan Berger
-
Decoding Galah:
An LLM Powered Web Honeypot
- Adel Karimi
-
CSIRT And The Chocolate Factory
- Didier Stevens
-
The Gist Of Hundreds Of
Incident Response Cases
- Stephan Berger
-
IoT Hacks Humans: Unexpected
Angles Of Human Process Compromise
- Vladimir Kropotov
-
KubeHound: Identifying Attack Paths In
Kubernetes Clusters At Scale With No Hustle
- Julien Terriac
-
The Web Of Cognitive Warfare
- Jindrich Karasek
-
It Has Been [0] Days Since The
Last Edge-Device Security Incident
- Paul Rascagneres
-
A Quick Monologue
On Global Inefficiency
- Claus Cramon Houmann
-
Flowintel - Flow Your Management
- David Cruciani
-
How I Learned To Stop
Worrying And Love The NLF
- Fukami
-
Any Sufficiently Advanced Technology
Indistinguishable From 01 January 1970
- Trey Darley
-
How Much Time We Had For IPv6 Preparation?
- Nicol Dankova
-
I Need Access: Exploit Password Management
Software To Obtain Credential From Memory
- Efstratios Chatzoglou
-
Empowering Cybersecurity Outreach And Learning Through
Collaborative Challenge Building, Sharing, And Execution
- David Durvaux & Alexandre Dulaunoy
-
Artemis: How CERT PL Improves The
Security Of The Polish Internet
- Krzysztof Zając
-
Spicy — Generating Robust Parsers
For Protocols & File Formats
- Benjamin Bannier
-
Securing The Stars: Comprehensive Analysis Of Modern
Satellite Vulnerabilities And Emerging Attack Surfaces
- Vic Huang
-
DFIQ:
Codifying Digital Forensic Intelligence
- Thomas Chopitea
-
Cyber Threats To Advanced Intelligent
Connected Vehicle Systems
- Yuqiao Ning & Shihao Xue
-
APT28: Following Bear
Tracks Back To The Cave
- Golo
-
A New (free) Internet Listener In Town
- Mathieu Le Cleach
-
Unlocking BEAM's Pandora's Box:
Security Pitfalls In Distributed
Erlang And Elixir Systems
- Jean-Louis Huynen
-
Sharing IoC - Wrong Answers Only
- Deborah Servili
-
Back To The Failure: Did Your Physical
Security Really Evolve In The Last 40 Years?
- Simon Geusebroek
-
Blowing Up Gas Stations
For Fun And Profit
- Pedro Umbelino
-
The Good, The Bad, And
The Ugly: Microsoft Copilot
- Inbar Raz & Michael Bargury
-
Scam As A Service
Powered By Telegram
- Aurimas Rudinskis
-
From 0 To Millions: Protecting
Against AitM Phishing At Scale
- Jacob Torrey
-
Running Circles Around Threat Actor Tooling
Using Javascript Data Visualisation
- Chris Horsley
-
Using LLM Locally
- Pauline Bourmeau (Cookie)
-
Future Of Websites Without DDoS
- Lukáš Kršek
-
Analysis And Forecasting
Of Exploits With AI
- Roman Graf
-
Vulnerability Lookup
- Cédric Bonhomme
-
MISP Playbooks, Proving The Value Of
Cyber Threat Intelligence And ICS-CSIRT.io
- Koen Van Impe
-
Quantum Cybersecurity:
Pioneering A Secure Future
- Samira Chaychi & Sharif Shahini
-
Making IOT Great Again
- David Durvaux & Marc Durvaux
-
Ghosts'n'Gadgets: Common Buffer Overflows
That Still Haunt Our Networks
- Stanislav Dashevskyi
-
SQL Injection Isn't Dead: Smuggling
Queries At The Protocol Level
- Paul Gerste
-
Keys To The City: The Dark Trade-Off Between
Revenue And Privacy In Monetizing SDKs
- Dimitrios Valsamaras
-
Understanding File Type
Identifiers & Scanners
- Ange Albertini
-
The Ouroboros Of Cybercrime:
Witnessing Threat Actors Go From Pwn To Pwn'd
- Estelle Ruellan & Stuart Beck
-
The XE Files:
Trust No Router
- James Atack
-
New Features In The
Zeek Network Monitor
- Christian Kreibich
-
Sigma Unleashed:
A Realistic Implementation
- Mathieu Le Cleach
-
Predictive Analytics For Adversary Techniques
In The MITRE ATT&CK Framework Using Rule Mining
- Tristan Madani
-
Introducing The ACTOR Model: Adversary Simulation
Is Dead, Long Live Adversary Simulation!
- Tristan Madani
-
AIL Project:
Secrets In Squares - QR Codes
- Aurelien Thirion
-
Pentests Using LLMs
- Al Mochkin
-
Learn Anything - Reload
- Pauline Bourmeau (Cookie)
-
Luks Full Disk Encryption Upside-Down
- Michael Hamm
-
Phantom DLL Hijacking In Powershell.exe
(aka Backdooring Powershell For Fun And Profit)
- Tristan Madani
-
Internal Domain Name Collision 2.0
- Philippe Caturegli
-
Lucky Leaks: 400+ Mln Files
Are Worth A Thousand Words
- Lorenzo Nicolodi
-
Reverse Engineering
Android Apps With ACVTool
- Aleksandr Pilgun
-
Detection And Response
For Linux Without EDR
- Hilko Bengen
-
Mercator:
Mapping The Information System
- Didier Barzin
-
Disconnecting Games With A Single
Packet: An Unreal Untold Story
- Hugo Bertin
-
CTF Prizegiving Ceremony
- Hack.lu