• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2019
  • 2018
Edition logo

Insomni'hack 2023

2023-03-23 - 2023-03-24
  • Thumbnail for the video - click to play

    ►

    Welcome
    - Alain Mowat
  • Thumbnail for the video - click to play

    ►

    Crazy Incentives And How They Drive Security Into No Man's Land
    - Dr. Christian Folini
  • Thumbnail for the video - click to play

    ►

    Breaking And Fixing Azure AD Device Identity Security
    - Dirk-jan Mollema
  • Thumbnail for the video - click to play

    ►

    Targeted Social Engineering Attacks: Weaponizing Psychology
    - Christina Lekati
  • Thumbnail for the video - click to play

    ►

    Turn And Face The Strange: Ch-Ch-Changes In Ransomware Techniques
    - Lindsay Kaye
  • Thumbnail for the video - click to play

    ►

    A Ticket Worth Waiting 65 Years For
    - Charlie Bromberg
  • Thumbnail for the video - click to play

    ►

    Hacking Harms! Measuring The Impact And Harm From Cyberattacks
    - Emma Raffray
  • Thumbnail for the video - click to play

    ►

    Modern Adventures With Legacy Protocols
    - Yannay Livneh
  • Thumbnail for the video - click to play

    ►

    Inglourious Drivers: The Revenge Of The Peripheral Devices
    - Omer Tsarfati
  • Video will not be published
    Open Sésame! Example Of Modern Electronic Lockpicking
    - Thomas Bygodt
  • Thumbnail for the video - click to play

    ►

    Pentesting By The Numbers: What Data Analysis Tells About What We Do
    - Charl Van Der Walt
  • Thumbnail for the video - click to play

    ►

    USBvalve: Expose USB Activity On The Fly
    - Cesare Pizzi
  • Thumbnail for the video - click to play

    ►

    Hacking Your Jump Rope Or Your Coffee Machine
    - Axelle Apvrille
  • Thumbnail for the video - click to play

    ►

    Meet The Latest Innovations And Startups In Cybersecurity & How To Become A Cyber Entrepreneur?
    - Trust Valley Startups
  • Thumbnail for the video - click to play

    ►

    How To Have Visibility And Security OF CICD Ecosystem
    - Pramod Rana
  • Thumbnail for the video - click to play

    ►

    Cloud, IoT, Machine Learning: Which Models For Secure ICS Network Architectures To Adapt To New Usages?
    - Alexandrine Torrents
  • Thumbnail for the video - click to play

    ►

    Permissionless Android Universal Overlays
    - Dimitrios Valsamaras
  • Thumbnail for the video - click to play

    ►

    Attacking And Defending GraphQL: The Ultimate Guide
    - Leo Juszkiewicz
  • Thumbnail for the video - click to play

    ►

    Welcome Day 2
    - Alain Mowat
  • Thumbnail for the video - click to play

    ►

    The Converging Threat Landscape
    - Patrice Perche
  • Thumbnail for the video - click to play

    ►

    Breaking Docker's Named Pipes SYSTEMatically
    - Eviatar Gerzi
  • Thumbnail for the video - click to play

    ►

    The Snake Is In The Grass: Finding Malicious PyPI Packages In The Wild
    - Christophe Tafani-Dereeper And Vladimir De Turckheim
  • Thumbnail for the video - click to play

    ►

    Secrets, Data And Cypher-injections: Neo4j Attacks And Cloud Exploits
    - Nitay Bachrach and Or Emanuel
  • Thumbnail for the video - click to play

    ►

    You Click, You Lose: A Practical Look At Visual Studio Code's Security
    - Thomas Chauchefoin & Paul Gerste
  • Thumbnail for the video - click to play

    ►

    Data Science And Machine Learning In Cybersecurity: Hype Or Reality?
    - Angelo Schranko De Oliveira
  • Thumbnail for the video - click to play

    ►

    Optimising Business Value With Secure Access Service Edge
    - Neil Thacker
  • Thumbnail for the video - click to play

    ►

    Whatever Pown2own
    - Benoit Forgette & Damien Cauquil
  • Thumbnail for the video - click to play

    ►

    Detection Engineering In Modern Day Security Organization
    - Tondang Mangatas and Sylvain Lu
  • Thumbnail for the video - click to play

    ►

    Stories Of Money: Crypto, Hacks, Ransom, DeFi And Attacks
    - Marco Preuss
  • Thumbnail for the video - click to play

    ►

    Cloud Disaster... As A Service
    - Chris Hernandez
  • Thumbnail for the video - click to play

    ►

    Adversary Tracking And All The Lies We Tell Ourselves
    - Joe Slowik
  • Thumbnail for the video - click to play

    ►

    Use Case: Red Teaming A Recently Breached Company
    - Nuri And Marat
  • Thumbnail for the video - click to play

    ►

    RCEing Your Way Into The Blockchain: Uncovering A Critical Vulnerability And Taking Over Decentralized Identity (DID) Networks
    - Shaked Reiner
  • Thumbnail for the video - click to play

    ►

    The History Of Ransomware: From Floppies To Droppers, And Beyond
    - Eliad Kimhy
  • Thumbnail for the video - click to play

    ►

    Go Security Pitfalls: 2 Lessons From The Battlefield At Grafana Labs
    - Jeremy Matos
  • Thumbnail for the video - click to play

    ►

    Why Kidz Couldn’t Care Less About Your Password Advice?
    - Mia Landsem