• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2019
  • 2018
Edition logo

Insomni'hack 2019

2019-03-21 - 2019-03-22
  • Video will not be published
    Federal Intelligence Service: How We Help To Protect Protect Switzerland Against Serious Cyber Threats
    - Mauro Vignati
  • Thumbnail for the video - click to play

    ►

    Growing Hypervisor 0day With Hyperseed
    - Shawn Denbow
  • Thumbnail for the video - click to play

    ►

    The way from App to Brain: attack surfaces of smart medical infrastructure
    - Denis Makrushin
  • Thumbnail for the video - click to play

    ►

    The Evolution Of Cloud Threats
    - Paolo Passeri
  • Thumbnail for the video - click to play

    ►

    Spyware, Ransomware and Worms. How to prevent the next SAP tragedy
    - Jordan Santarcieri
  • Thumbnail for the video - click to play

    ►

    Building A Flexible Hypervisor-Level Debugger
    - Mathieu Tarral
  • Video will not be published
    SD-WAN - Yet Another Way to Unsafe Internet
    - Denis Kolegov and Oleg Broslavsky
  • Thumbnail for the video - click to play

    ►

    Security Analysis On The Attack Surface Of Blockchain Client
    - Chen Nan and Kame Wang
  • Thumbnail for the video - click to play

    ►

    On the Security Of Dockless Bike Sharing Services
    - Antoine Neuenschwander
  • Thumbnail for the video - click to play

    ►

    Analyzing A Portable Wireless Storage Device From Zero To Remote Code Execution
    - Qinghao Tang and Shuo Yuan
  • Thumbnail for the video - click to play

    ►

    What Every (IT | Security) Professional Should Know About The Dark Web
    - Mischa Peters
  • Thumbnail for the video - click to play

    ►

    Let's Hack The IoT Hub With Pwnhub Dudes: IoT Hub Exploitation And Countermeasure
    - Jisub Kim and Kanghyun Choi
  • Thumbnail for the video - click to play

    ►

    Medieval Castles And Modern Servers
    - Christian Folini
  • Thumbnail for the video - click to play

    ►

    These Are The Droids You Are Looking For: Practical Security Research On Android
    - Elena Kovakina
  • Thumbnail for the video - click to play

    ►

    Sneaking Past Device Guard
    - Philip Tsukerman
  • Video will not be published
    Intelligence-driven Red Teaming
    - Peter Hladký
  • Thumbnail for the video - click to play

    ►

    Vulnerabilities Of Mobile OAuth 2.0
    - Nikita Stupin
  • Thumbnail for the video - click to play

    ►

    Turning Your BMC Into A Revolving Door: The HPE ILO Case
    - A. Gazet,F. Perigaud and J. Czarny
  • Thumbnail for the video - click to play

    ►

    NSX-T Architecture And Benefits
    - Erik Bussink
  • Thumbnail for the video - click to play

    ►

    Betrayed By The Android User Interface: Why A Trusted UI Matters
    - Yanick Fratantonio
  • Thumbnail for the video - click to play

    ►

    Secure Boot Under Attack: Simulation To Enhance Fault Attacks and Defenses
    - Martijn Bogaard
  • Thumbnail for the video - click to play

    ►

    Digitalisation Demands Defensive Action
    - Daniel Caduff
  • Thumbnail for the video - click to play

    ►

    Cryptocurrency Mobile Malware
    - Axelle Apvrille
  • Thumbnail for the video - click to play

    ►

    Threat Hunting Research Methodology: A Data Driven Approach
    - Roberto Rodriguez and Jose Luis Rodriguez
  • Thumbnail for the video - click to play

    ►

    Addressing Privacy: GDPR, Cloud, And You
    - Chris Esquire
  • Thumbnail for the video - click to play

    ►

    How To Investigate IOS Devices
    - Paul Rascagneres
  • Thumbnail for the video - click to play

    ►

    Dear Blue Team: Forensics Advice To Supercharge Your DFIR Capabilities
    - Joe Gray
  • Thumbnail for the video - click to play

    ►

    From The Cloud To The Internal Network: Offense Vs Defense
    - Snir Ben-Shimol
  • Thumbnail for the video - click to play

    ►

    Wake Up Neo: Detecting Virtualization Through Speculative Execution
    - Innokentii Sennovskii
  • Thumbnail for the video - click to play

    ►

    Exploits In Wetware
    - Robert Sell