• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 15
  • 14
  • 13
  • 11
  • 10
  • 9
  • 8
Edition logo

Nullcon 15

2025-03-01 - 2025-03-02
  • Video not yet published
    Welcome To Nullcon
    - Antriksh Shah
  • Video not yet published
    Fueling The Future: Building Robust Engines For A Secure Digital World
    - Daniel Cuthbert
  • Video not yet published
    The Future Is Trustless: How ZkVMS And ZkTLS Transform Bug
    - Anto Joseph
  • Video not yet published
    How Ecovacs Robots Got Hacked And What We Can Learn From It
    - Dennis Giese
  • Video not yet published
    Google Give Me Vulnz
    - Cameron Vincent
  • Video not yet published
    AI In SecOps: Enhancing Incident Response With Intelligence
    - Panel
  • Video not yet published
    Broken Isolation: Draining Your Credentials From Popular MacOS Password Managers
    - Wojciech Regula
  • Video not yet published
    Your Identity Is Mine: Techniques And Insights From OS Identity Providers Research
    - Maor Abutbul
  • Video not yet published
    What The PHUZZ?! Finding 0-Days In PHP Apps With Coverage-guided Fuzzing
    - Sebastian Neef
  • Video not yet published
    Software Supply Chain Security
    - Fireside Chat
  • Video not yet published
    State Of IOS Jailbreaking In 2025
    - Lars Fröder
  • Video not yet published
    The Hidden ART Of Rolling Shellcode Decryption
    - Tijme Gommers
  • Video not yet published
    MLOps Under Attack: Threat Modeling Modern AI Systems
    - Sandeep Singh
  • Video not yet published
    Converging IT And OT Security: Unified Strategies For Protection, Detection, And Response
    - Panel
  • Video not yet published
    MacOS Lockdown Mode: A Forensic Deep Dive
    - Bhargav Rathod
  • Video not yet published
    Fuzzing Rust Smart Contracts: Writing A Bug Printer Engine From Scratch
    - Daniel Schmidt & Kevin Valerio
  • Video not yet published
    Guilt By Association: Pwning Millions Of Smart Weighing Machines With API And Hardware Hacking
    - Eugene Lim
  • Video not yet published
    Navigating Data Protection In The Age Of Globalisation
    - Panel
  • Video not yet published
    Predator Malware: Trust Broken At The Core
    - Matthias Frielingsdorf
  • Video not yet published
    How To Teach Threading To A Dolphin
    - Andras Tevesz
  • Video not yet published
    Crowdsourced Cybersecurity: Should Companies Trust Ethical Hackers With Defense?
    - Panel
  • Video not yet published
    AI Versus AI : Reimagining Security Operation
    - Panel
  • Video not yet published
    Drawing Parallels Between IOS And MacOS Pentesting With DVMA
    - Vaibhav Lakhani
  • Video not yet published
    Reversing Large Deep Learning AI Models
    - Yashodhan Vivek Mandke
  • Video not yet published
    Project Dusseldorf: Finding Out-Of-Band Vulnerabilities At Cloud Scale
    - Michael Hendrickx
  • Video not yet published
    Cyber Tech 2030: The Next Chapter In AI, Zero Trust & Offensive Defense
    - Panel
  • Video not yet published
    Hackers, Bureaucrat And Corporations. Who Really Runs The Cybersecurity For A Country?
    - Panel
  • Video not yet published
    Trapped By The CLI
    - William Robinet
  • Video not yet published
    How Can Organisations Protect Themselves Against Advanced Cyber Threats?
    - Panel
  • Video not yet published
    Kernel Conquest: Breaking Boundaries And Demystifying Kernel SU For Root Access In Azure Cloud Shell
    - Abhishek & Krishna
  • Video not yet published
    Hidden In Plain Sight: Large-Scale Exposure Of Orphaned Commits On Major Git Platforms
    - Kumar Ashwin
  • Video not yet published
    Modernizing Security Architecture: Platforms Or Best-of-Breed, What Works Best?
    - Panel
  • Video not yet published
    Satellite Communications: Analyzing And Protecting Space-Based Assets
    - Drishti Jain
  • Video not yet published
    Windows Keylogger Detection: Targeting Past And Present Keylogging Techniques
    - Asuka Nakajima
  • Video not yet published
    Building Glitch-Resistant Firmware: Practical Software Countermeasures For Hardware Glitch Attacks
    - Arshid Shyam Kumar & Chinmay Krishna R
  • Video not yet published
    Cyber Fusion Center: The Command Center For Integrated Cyber Defense
    - Panel
  • Video not yet published
    Will It Run? Fooling EDRs With Command Lines Using Empirical Data
    - Wietze Beukema
  • Video not yet published
    Securing The Chains: Building Defensive Layers For Software Supply Chains
    - Akhil Mahendra and Hritik Vijay & Yadhu Krishna M
  • Video not yet published
    Unlocking India’s Cyber Potential Through Strategic Policies, R&D Support, And Robust Public-Private Partnerships
    - Panel
  • Video not yet published
    EKYC Crisis: Securing The Lockers
    - Kartik Lalan
  • Video not yet published
    Tackling Automotive Hardware Vulnerabilities
    - Panel
  • Video not yet published
    Cyber Security From Telco Lens At Sanjeev Dhallam
    - TBA
  • Video not yet published
    From Code To Defense: Why Developers Are The New Security Leaders
    - Panel
  • Video not yet published
    Prize & Closing Note
    - NullCon Orga