• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
Edition logo

Out Of The Box 2025

2025-08-20 - 2025-08-21
  • Thumbnail for the video - click to play

    ►

    Long Live Short-Lived Certificates! Updates On Public Key Infrastructure
    - Alexis Hancock
  • Thumbnail for the video - click to play

    ►

    Cloud Edge Phishing: Breaking The Future Of Auth
    - Carlos Gómez Quintana
  • Thumbnail for the video - click to play

    ►

    Why'd You Only Call Me When You're In SMM? Exploiting UEFI SMM Vulnerabilities For Persistent Firmware Implants
    - Nika Korchok Wakulich
  • Thumbnail for the video - click to play

    ►

    Ghosts In The Lobby: Covert Entry Stories (And The Lessons That They Teach Us)
    - Cori Macy
  • Thumbnail for the video - click to play

    ►

    The Power Of Powerlogs
    - Sarah Edwards
  • Thumbnail for the video - click to play

    ►

    Agentic ProbLLMs: Exploiting Al Computer-Use And Coding Agents
    - Johann Rehberger
  • Thumbnail for the video - click to play

    ►

    Architecting Security Onion For Enterprise Resilience: A Case Study In Scaling Open-Source SIEM For High-Performance Threat Detection
    - Piroon Srisawang and Peerapong Thongpubet & Korrawit Chaikangwan
  • Thumbnail for the video - click to play

    ►

    Hot Off The Presses: AI Agents As Your Organization's Personal Security Newsroom
    - Brett Andrews
  • Thumbnail for the video - click to play

    ►

    Build Your Own SOC
    - Kristen Huang
  • Thumbnail for the video - click to play

    ►

    Unpacking Real Malware With Their Runtime Protection: Insights From Southeast Asia
    - Huy Ngo