-
Welcome To Nullcon
- Antriksh Shah
-
Fueling The Future: Building Robust
Engines For A Secure Digital World
- Daniel Cuthbert
-
The Future Is Trustless:
How ZkVMS And ZkTLS Transform Bug
- Anto Joseph
-
How Ecovacs Robots Got Hacked
And What We Can Learn From It
- Dennis Giese
-
Google Give Me Vulnz
- Cameron Vincent
-
AI In SecOps: Enhancing Incident Response With Intelligence
- Panel
-
Broken Isolation: Draining Your Credentials
From Popular MacOS Password Managers
- Wojciech Regula
-
Your Identity Is Mine: Techniques And
Insights From OS Identity Providers Research
- Maor Abutbul
-
What The PHUZZ?! Finding 0-Days In
PHP Apps With Coverage-guided Fuzzing
- Sebastian Neef
-
Software Supply Chain Security
- Fireside Chat
-
State Of IOS Jailbreaking In 2025
- Lars Fröder
-
The Hidden ART Of
Rolling Shellcode Decryption
- Tijme Gommers
-
MLOps Under Attack:
Threat Modeling Modern AI Systems
- Sandeep Singh
-
Converging IT And OT Security: Unified Strategies For Protection, Detection, And Response
- Panel
-
MacOS Lockdown Mode:
A Forensic Deep Dive
- Bhargav Rathod
-
Fuzzing Rust Smart Contracts:
Writing A Bug Printer Engine From Scratch
- Daniel Schmidt & Kevin Valerio
-
Guilt By Association: Pwning Millions Of Smart
Weighing Machines With API And Hardware Hacking
- Eugene Lim
-
Navigating Data Protection In The Age Of Globalisation
- Panel
-
Predator Malware:
Trust Broken At The Core
- Matthias Frielingsdorf
-
How To Teach Threading To A Dolphin
- Andras Tevesz
-
Crowdsourced Cybersecurity: Should Companies
Trust Ethical Hackers With Defense?
- Panel
-
AI Versus AI : Reimagining Security Operation
- Panel
-
Drawing Parallels Between IOS
And MacOS Pentesting With DVMA
- Vaibhav Lakhani
-
Reversing Large Deep Learning AI Models
- Yashodhan Vivek Mandke
-
Project Dusseldorf: Finding Out-Of-Band
Vulnerabilities At Cloud Scale
- Michael Hendrickx
-
Cyber Tech 2030: The Next Chapter In AI, Zero Trust & Offensive Defense
- Panel
-
Hackers, Bureaucrat And Corporations. Who Really Runs The Cybersecurity For A Country?
- Panel
-
Trapped By The CLI
- William Robinet
-
How Can Organisations Protect Themselves Against Advanced Cyber Threats?
- Panel
-
Kernel Conquest: Breaking Boundaries And Demystifying
Kernel SU For Root Access In Azure Cloud Shell
- Abhishek & Krishna
-
Hidden In Plain Sight: Large-Scale Exposure
Of Orphaned Commits On Major Git Platforms
- Kumar Ashwin
-
Modernizing Security Architecture: Platforms Or Best-of-Breed, What Works Best?
- Panel
-
Satellite Communications: Analyzing
And Protecting Space-Based Assets
- Drishti Jain
-
Windows Keylogger Detection:
Targeting Past And Present Keylogging Techniques
- Asuka Nakajima
-
Building Glitch-Resistant Firmware: Practical
Software Countermeasures For Hardware Glitch Attacks
- Arshid Shyam Kumar & Chinmay Krishna R
-
Cyber Fusion Center: The Command Center For Integrated Cyber Defense
- Panel
-
Will It Run? Fooling EDRs With
Command Lines Using Empirical Data
- Wietze Beukema
-
Securing The Chains:
Building Defensive Layers For Software Supply Chains
- Akhil Mahendra and Hritik Vijay & Yadhu Krishna M
-
Unlocking India’s Cyber Potential Through Strategic Policies, R&D Support, And Robust Public-Private Partnerships
- Panel
-
EKYC Crisis: Securing The Lockers
- Kartik Lalan
-
Tackling Automotive Hardware Vulnerabilities
- Panel
-
Cyber Security From Telco Lens
At Sanjeev Dhallam
- TBA
-
From Code To Defense: Why Developers Are The New Security Leaders
- Panel
-
Prize & Closing Note
- NullCon Orga