<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2026.1.1. -->
<schedule>
    <generator name="pretalx" version="2026.1.1" />
    <version>0.72</version>
    <conference>
        <title>BSidesLuxembourg 2026</title>
        <acronym>bsidesluxembourg-2026</acronym>
        <start>2026-05-06</start>
        <end>2026-05-08</end>
        <days>3</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://pretalx.com</base_url>
        
        <time_zone_name>Europe/Luxembourg</time_zone_name>
        
        
        <track name="Main Stage" slug="6603-main-stage"  color="#5f0211" />
        
        <track name="Secondary Stage" slug="6605-secondary-stage"  color="#7993f0" />
        
        <track name="CLUSIL Stage" slug="6606-clusil-stage"  color="#19c316" />
        
        <track name="Workshop track 1" slug="6607-workshop-track-1"  color="#77761d" />
        
        <track name="Workshop track 3" slug="6608-workshop-track-3"  color="#ffad00" />
        
        <track name="Villages in Atrium" slug="6609-villages-in-atrium"  color="#87c2d0" />
        
        <track name="Workshop track 2" slug="6602-workshop-track-2"  color="#d3c7af" />
        
        <track name="Cloud track" slug="6963-cloud-track"  color="#6dd4ee" />
        
        <track name="Actionable CTI and detection engineering village" slug="6964-actionable-cti-and-detection-engineering-village"  color="#9700ff" />
        
        <track name="AI Security Village" slug="6977-ai-security-village"  color="#2f2022" />
        
        <track name="Escape games!" slug="6965-escape-games"  color="#1b4f5b" />
        
        <track name="Secure Development track" slug="6978-secure-development-track"  color="#f3f235" />
        
    </conference>
    <day index='1' date='2026-05-06' start='2026-05-06T04:00:00+02:00' end='2026-05-07T03:59:00+02:00'>
        <room name='Main Stage' guid='75d481b1-868b-58be-a3aa-7a08dfdaa6bb'>
            <event guid='221380ef-0903-53dd-aca3-6327642366c9' id='90612' code='EFGX97'>
                <room>Main Stage</room>
                <title>From Zero Trust to Trusted Advisor - Selling Security to Stakeholders</title>
                <subtitle></subtitle>
                <type>Workshop 4h</type>
                <date>2026-05-06T14:00:00+02:00</date>
                <start>14:00</start>
                <duration>04:00</duration>
                <abstract>You&apos;ve identified the vulnerability, tested the exploit, and written the report. But they just don&#8217;t see the urgency. Now what? This 4-hour, hands-on workshop bridges the gap between technical mastery and boardroom influence. We&apos;ll move beyond simply reporting risks to crafting compelling narratives, quantifying value, and building the relationships necessary to drive meaningful security improvements.

This isn&apos;t your typical &quot;compliance&quot; training. We&apos;ll delve into the psychology of decision-making, explore adversarial communication tactics (used against you), and arm you with practical strategies to become a trusted advisor who can effectively advocate for security and get things done.</abstract>
                <slug>bsidesluxembourg-2026-90612-from-zero-trust-to-trusted-advisor-selling-security-to-stakeholders</slug>
                <track></track>
                
                <persons>
                    <person id='90937'>Daniela Parker</person><person id='90938'>Glen Sorensen</person>
                </persons>
                <language>en</language>
                <description>You&apos;ve identified the vulnerability, tested the exploit, and written the report. But they just don&#8217;t see the urgency. Now what? This 4-hour, hands-on workshop bridges the gap between technical mastery and boardroom influence. We&apos;ll move beyond simply reporting risks to crafting compelling narratives, quantifying value, and building the relationships necessary to drive meaningful security improvements.
This isn&apos;t your typical &quot;compliance&quot; training. We&apos;ll delve into the psychology of decision-making, explore adversarial communication tactics (used against you), and arm you with practical strategies to become a trusted advisor who can effectively advocate for security and get things done.
Target Audience:
Security professionals of all levels (penetration testers, security engineers, analysts, red teamers, etc.) who want to improve their communication and persuasion skills to influence stakeholders and drive security initiatives.
Workshop Objectives:
Participants will be able to:
&#8226;	Identify and analyze key stakeholders, influencers, and decision makers within their organizations.
&#8226;	Translate technical findings or concepts, such as security by design, into business-centric language.
&#8226;	Tailor your message to your stakeholders and influence them to make better decisions (social engineering for good!).
&#8226;	Articulate the ROI of security investments.
&#8226;	Effectively counter common objections and adversarial tactics.
&#8226;	Develop a practical method for ongoing stakeholder engagement.
&#8226;	Practice communicating complex security issues to non-technical audiences.
&#8226;	Build trust and credibility with diverse stakeholders.
&#8226;	Overcome their own fears and perceived limitations when dealing with key business decision makers.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/EFGX97/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/EFGX97/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='IFEN room 1, Workshops and Detection Engineering village (Building D)' guid='d009362d-88e2-5587-ae2a-5051041602da'>
            <event guid='4ecd0935-4394-552e-aabf-ef9b50eb5efc' id='88216' code='WGNSKX'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>[Reboot] ML foundations for cybersecurity in 2026</title>
                <subtitle></subtitle>
                <type>Training 8h</type>
                <date>2026-05-06T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>09:00</duration>
                <abstract>This session provides cybersecurity professionals with practical machine learning skills, from ML basics up to deep learning with TensorFlow. Participants will set up a complete development environment and learn foundational ML concepts through hands-on implementation rather than mathematical theory. The curriculum covers core ML principles through deep learning, with emphasis on security-relevant applications. No advanced mathematics or prior AI experience required.

We break the myth. You don&apos;t need a PhD to do AI here.</abstract>
                <slug>bsidesluxembourg-2026-88216-reboot-ml-foundations-for-cybersecurity-in-2026</slug>
                <track></track>
                
                <persons>
                    <person id='88706'>Pauline Bourmeau (Cookie)</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/WGNSKX/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/WGNSKX/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='IFEN room 2, Workshops and AI Security Village  (Building D)' guid='a18bb72e-a1ae-5ea3-acfa-8ddd1c6b0d44'>
            <event guid='375bb907-bd81-5b2c-9da9-7332a4305a2a' id='88650' code='9HS8CG'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Packet Analysis for Beginners - an IoT toy, some packets, and Wireshark</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>02:00</duration>
                <abstract>What can we learn from ordinary packets on the wire, using a disconcerting connected toy as a demo device? How can you tell when something is phoning home? In this workshop, we&#8217;ll use Wireshark to observe what devices send and receive during regular operation</abstract>
                <slug>bsidesluxembourg-2026-88650-0-packet-analysis-for-beginners-an-iot-toy-some-packets-and-wireshark</slug>
                <track></track>
                <logo>/media/bsidesluxembourg-2026/submissions/9HS8CG/image_TyepQxk.webp</logo>
                <persons>
                    <person id='89221'>Katherine Leese</person>
                </persons>
                <language>en</language>
                <description>Pre-Workshop Setup:
Please install Wireshark before the session: [https://www.wireshark.org/docs/installation.html
](https://www.wireshark.org/download.html)

Crucial Permission Steps:
    Windows: Ensure you install Npcap during the setup process.
    macOS: Follow the prompts to allow network access/chmod permissions.
    Linux: Run sudo dpkg-reconfigure wireshark-common, select yes, then add your user to the wireshark group (sudo usermod -aG wireshark $USER), then reboot.

Test: Open the app; if you see &quot;live&quot; traffic lines on your network interface, you are ready!

In this workshop, we&#8217;ll take packet capture from a disconcerting connected toy and use it as a starting point to learn how to read ordinary network traffic. Step by step, we&#8217;ll look at how devices introduce themselves on a local network, resolve names, establish connections, negotiate encryption, and continue communicating during normal operation. Once we have familiarized ourselves, we will move on to some real-world captures.

Rather than breaking encryption or exploiting vulnerabilities, the focus is on observation and understanding. Using Wireshark, we&#8217;ll practice identifying patterns, relationships, and metadata that remain visible even when payloads are encrypted. Along the way, we&#8217;ll look at how to recognise when a device is phoning home, what kinds of context travel with requests, and how much can be learned from traffic that is behaving exactly as designed.

This workshop is aimed at beginners and the curious. No prior experience with packet analysis is required. A willingness to look closely at what is already on the wire is enough.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/9HS8CG/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/9HS8CG/feedback/</feedback_url>
            </event>
            <event guid='b9004aeb-7710-5fe6-9568-ff2a09ab7d0e' id='92469' code='ZXMFCW'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>A phishing trip with Fancy Bear - Let&apos;s analyze APT malware together!</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T11:00:00+02:00</date>
                <start>11:00</start>
                <duration>02:00</duration>
                <abstract>In this beginner-friendly workshop we will walk through the analysis of a recent Fancy Bear (APT28) attack chain together. It will feature targeted phishing email, a then-0-day Microsoft Office exploit and multiple follow-up stages to showcase file formats and analysis methods. Additionally, we will take a look at the infrastructure behind the attack.</abstract>
                <slug>bsidesluxembourg-2026-92469-a-phishing-trip-with-fancy-bear-let-s-analyze-apt-malware-together</slug>
                <track></track>
                
                <persons>
                    <person id='92695'>Marius Genheimer</person>
                </persons>
                <language>en</language>
                <description>This workshop does not depend on domain-specific knowledge, we will try to break the steps down as far as possible. Attendees will follow along through small exercises, with the opportunity to compare their solution through a validation system.

Important for message for attendees: If you would like to follow along, please bring laptop with a charged battery. You will be handling real-world malware (you act at your own risk; No backup, no pity). I recommend to use a virtual machine (e.g. FLARE-VM, Remnux). No special tooling is required, make sure to have the basics (Text and Hex Editor, Browser, ZIP utility) installed. No photos during the workshop please, you will receive a copy of the slides.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/ZXMFCW/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/ZXMFCW/feedback/</feedback_url>
            </event>
            <event guid='98669856-e407-5a85-857f-489b3f7bd215' id='85279' code='JABHUU'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>How to Read Code to Find Vulnerabilities</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T14:00:00+02:00</date>
                <start>14:00</start>
                <duration>02:00</duration>
                <abstract>The industry needs more security code reviewers. Vulnerabilities are getting deeper, not simpler, and modern applications fail in subtle ways that scanners, and even AI, routinely miss. Meanwhile, developers are writing less code and reviewing more of it than ever (hopefully).

This workshop is a fast, hands-on introduction to reading code with a security mindset. Through real CVE-inspired examples, you&#8217;ll see how tiny inconsistencies, misplaced assumptions, and misunderstood framework behaviour turn into real, exploitable flaws.

You&#8217;ll learn how to detect red flags quickly, identify dangerous patterns in small snippets, and build intuition for where vulnerabilities hide. Whether you&#8217;re a developer, pentester, or security engineer, you&#8217;ll walk away with a foundational methodology for performing clear, consistent, and reliable code reviews.</abstract>
                <slug>bsidesluxembourg-2026-85279-how-to-read-code-to-find-vulnerabilities</slug>
                <track></track>
                <logo>/media/bsidesluxembourg-2026/submissions/JABHUU/Beetle-Wallpa_AuZGt2l.webp</logo>
                <persons>
                    <person id='86405'>Louis Nyffenegger</person>
                </persons>
                <language>en</language>
                <description>Modern applications break in subtle ways, and many of the most impactful vulnerabilities come from tiny mistakes hidden in plain sight. Scanners won&#8217;t catch them. AI won&#8217;t catch them. But a trained human eye will.

This workshop teaches you how to read code with the explicit goal of finding vulnerabilities.
Through real, CVE-inspired examples, we&#8217;ll explore how small inconsistencies, incorrect assumptions, and misunderstood framework behaviour turn into exploitable bugs.

You&#8217;ll practice spotting red flags in small snippets, recognising dangerous patterns, and understanding why certain coding choices reliably lead to security issues. The session is fast-paced and hands-on, designed to build practical intuition you can apply immediately.

Whether you&#8217;re a developer, pentester, or AppSec engineer, you&#8217;ll leave with a clear, repeatable methodology for reviewing code and uncovering vulnerabilities that tools routinely miss.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/JABHUU/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/JABHUU/feedback/</feedback_url>
            </event>
            <event guid='8d2085e9-622d-59b2-bb24-05864ce4927d' id='85197' code='CY9AEA'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Hands-on Car Hacking &amp; Automotive Cybersecurity</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T16:00:00+02:00</date>
                <start>16:00</start>
                <duration>02:00</duration>
                <abstract>Modern cars are no longer mechanical devices. They&apos;re complex, interconnected computer networks. And like any networked system, they can be hacked. This workshop introduces participants to the fundamentals of automotive cybersecurity through real-world, hands-on exploration of in-vehicle communication and attack techniques.</abstract>
                <slug>bsidesluxembourg-2026-85197-hands-on-car-hacking-automotive-cybersecurity</slug>
                <track></track>
                
                <persons>
                    <person id='86349'>Roald Nefs</person>
                </persons>
                <language>en</language>
                <description>In this interactive workshop, attendees will learn how modern cars communicate internally and how attackers can exploit weaknesses in these systems. After a quick introduction to automotive security concepts and vehicle network architecture, participants will dive straight into practical exercises using the Controller Area Network (CAN) bus.

You&apos;ll capture and analyze live CAN traffic, reverse engineer messages sent to critical components, and craft spoofed signals that manipulate the instrument cluster. All within a safe and controlled lab environment. Through guided exercises, demonstrations, and collaborative problem-solving, you&apos;ll gain a clear understanding of how real automotive attacks work and what defenders should look out for.

**Key Takeaways:**
- Understand modern automotive security fundamentals and vehicle network design
- Capture, analyze, and interpret CAN bus traffic
- Reverse engineer real in-vehicle messages
- Craft and send spoofed signals to demonstrate attack paths in a controlled environment

**Prerequisites:**
Participant should bring a laptop with the following characteristics:
- Laptop running a Linux distribution (or a Linux VM with USB passthrough enabled)
- Available USB-A port, or USB-C port with compatible cable</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/CY9AEA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/CY9AEA/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='IFEN room 3 Workshops and AI Security Village (Building D)' guid='3ecced5f-5a05-593c-a612-364a5528f8d3'>
            <event guid='7f4d15ef-16ab-51a1-8df6-85ad1bc205a9' id='92825' code='CVMLKB'>
                <room>IFEN room 3 Workshops and AI Security Village (Building D)</room>
                <title>Gotta Contain &apos;Em All: Collaborative Incident Response Training Through Gaming</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>02:00</duration>
                <abstract>Incident response isn&apos;t just about knowing your tools - it&apos;s about coordinating under pressure, communicating when things go sideways, and making calls with incomplete information. Traditional training focuses on isolated techniques, missing the collaborative reality of actual incidents. And most tabletop exercises? Painfully dull. Participants zone out, give checkbox answers, and leave having learned little.

This workshop introduces Malware &amp; Monsters (https://malwareandmonsters.com), a framework that turns IR training into something people actually enjoy. Think tabletop role-playing meets creature-collection mechanics, where teams &quot;hunt and contain&quot; digital threats through story-driven gameplay.
Game-based learning works - research shows it beats traditional instruction for skill building and retention. M&amp;M makes participants actively discover concepts instead of sitting through lectures. Scenarios include organizational pressures, evolving threats, and stakeholder drama, turning abstract security concepts into tangible problems.

You&apos;ll experience the full methodology: learn the mechanics, build custom scenarios based on real malware families (mapped to MITRE ATT&amp;CK), and run live simulations. Participants take specialized roles - Hunter, Analyst, Forensicator, Communicator, Coordinator, or Researcher - experiencing how security functions actually collaborate during incidents.

The framework includes legacy malmons from malware history&#8212;because history always repeats itself, and understanding past threats reveals patterns in current attacks. The &quot;type effectiveness&quot; system teaches strategic thinking about matching defenses to threats. Evolution mechanics show how attacks escalate when containment fails.

Participants walk away with ready-to-use materials and facilitation techniques for training that actually works.

Best of all? M&amp;M is free to play in most cases.</abstract>
                <slug>bsidesluxembourg-2026-92825-gotta-contain-em-all-collaborative-incident-response-training-through-gaming</slug>
                <track></track>
                
                <persons>
                    <person id='93002'>Klaus Agnoletti</person><person id='90938'>Glen Sorensen</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/CVMLKB/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/CVMLKB/feedback/</feedback_url>
            </event>
            <event guid='94f5cec4-2ae0-5830-ad0f-131cc6fc4d2c' id='92008' code='ETX7TJ'>
                <room>IFEN room 3 Workshops and AI Security Village (Building D)</room>
                <title>Cloud &amp; AI Security - Capture the Flag</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T11:00:00+02:00</date>
                <start>11:00</start>
                <duration>02:00</duration>
                <abstract>Cloud &amp; AI Security - Capture the flag hands-on workshop</abstract>
                <slug>bsidesluxembourg-2026-92008-cloud-ai-security-capture-the-flag</slug>
                <track></track>
                
                <persons>
                    <person id='92265'>Nathan</person><person id='92521'>Richard Hensen</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/ETX7TJ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/ETX7TJ/feedback/</feedback_url>
            </event>
            <event guid='656de9ab-f401-5af2-a7d6-f0e694e00421' id='85117' code='TVXPKX'>
                <room>IFEN room 3 Workshops and AI Security Village (Building D)</room>
                <title>Level Up Your CI/CD: Building a secure pipeline with OSS</title>
                <subtitle></subtitle>
                <type>Workshop 4h</type>
                <date>2026-05-06T14:00:00+02:00</date>
                <start>14:00</start>
                <duration>04:00</duration>
                <abstract>What does the &quot;perfect&quot; CI/CD pipeline look like, especially one built with security at its core? This hands-on workshop explores that ideal using readily available open-source tools. We&apos;ll dissect the essential stages of a modern pipeline, demonstrating how to integrate security seamlessly throughout the development lifecycle (DevSecOps).

Through practical, step-by-step guidance, we&apos;ll implement key security checks like Static Application Security Testing (SAST), Software Composition Analysis (SCA), infrastructure vulnerability scanning, and secrets detection using popular OSS tools within a functional pipeline. While we&apos;ll showcase specific tools and configurations, the goal is not just replication, but understanding how and why these security controls work.

Discover the underlying principles of secure pipeline design and leave with actionable techniques to start building your own hardened, practical CI/CD pipeline.</abstract>
                <slug>bsidesluxembourg-2026-85117-level-up-your-ci-cd-building-a-secure-pipeline-with-oss</slug>
                <track></track>
                
                <persons>
                    <person id='86297'>Andoni Alonso</person><person id='87024'>Paco Sanchez</person>
                </persons>
                <language>en</language>
                <description>Workshop repository: https://github.com/unicrons/secure-pipeline-workshop</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/TVXPKX/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/TVXPKX/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops May 6th (C1.02.05)' guid='3d0c95a1-f896-52f4-af12-2382f12d5c2d'>
            <event guid='ed842c82-e617-5b5c-b13c-75bae66e7e5a' id='92929' code='XGQ7DT'>
                <room>Workshops May 6th (C1.02.05)</room>
                <title>Mastering Bash for Hackers: Extreme Command-Line Power</title>
                <subtitle></subtitle>
                <type>Workshop 4h</type>
                <date>2026-05-06T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>04:00</duration>
                <abstract>Bash isn&#8217;t just an interface to your daily laptop - it&#8217;s a weapon. In this hands-on workshop, we&#8217;ll push bash beyond its typical use, leveraging it for hacking, data processing, automation, and real-world security applications. Whether you&#8217;re crafting exploits, analyzing massive datasets, or automating reconnaissance, this session will equip you with the skills to turn bash into your ultimate hacking tool.

To take part in the workshop, please bring your own laptop.</abstract>
                <slug>bsidesluxembourg-2026-92929-mastering-bash-for-hackers-extreme-command-line-power</slug>
                <track></track>
                
                <persons>
                    <person id='93070'>Kirils Solovjovs</person>
                </persons>
                <language>en</language>
                <description>- Master advanced bash scripting techniques for automation, and hacking.
- Process terabytes of leaked password data and uncover real-world security insights.
- Use bash to manipulate and extract intelligence from logs, network traffic, and system artifacts.
- Generate graphs, automate reports, and convert file format entirely from the command line.
- Learn how to replace GUI-based tools with bash scripts for speed and stealth.

By the end of this workshop, you&#8217;ll be able to:
- Automate and accelerate security tasks with powerful one-liners and scripts.
- Use bash to analyze, manipulate, and exploit data in security research.
- Apply bash in unconventional ways, from image processing to document forensics.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/XGQ7DT/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/XGQ7DT/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops May 6th (C1.02.06)' guid='85295e39-503b-571c-b933-5c91f45f71d4'>
            <event guid='c6aeb9c6-614e-5d88-9f7d-2204a2f0affb' id='92619' code='QXECVY'>
                <room>Workshops May 6th (C1.02.06)</room>
                <title>From Code to Compromise: Turning modern day IDEs into attack vectors via malicious Extensions</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>02:00</duration>
                <abstract>Visual Studio Code has become the de-facto IDE for millions of developers, and its extension marketplace is now a first-class target for supply-chain compromise. In this talk we move beyond yesterday&#8217;s JavaScript-only &#8220;theme&#8221; backdoors and show how to fuse high-level TypeScript with low-level Rust to create extensions that are indistinguishable from legitimate Microsoft-signed add-ons&#8212;yet silently execute native x86_64 shellcode inside the IDE process.

We begin with a data-driven tour of recent in-the-wild incidents: we begin by examining an array of malicious solidity extensions which targeted blockchain developers with a special emphasis on the [&#8220;Solidity&#8221; extension that stole $500 k in crypto from a Russian blockchain developer](https://www.kaspersky.com/about/press-releases/kaspersky-uncovers-500k-crypto-heist-through-malicious-packages-targeting-cursor-developers). We follow that up with an analysis of the Malicious Corgi malware, and the [new self propagating GlassWorm extension](https://www.truesec.com/hub/blog/glassworm-self-propagating-vscode-extension) - including the later samples seen in the wild which used more advanced techniques. The rise of AI-centric forks (Cursor, Windsurf, etc.) has also given a rise to new extension marketplaces where malicious extension can use inflated download counts to serve as perfect camouflage. Next we deep-dive into the malicious extension toolchain: a Rust FFI bridge that compiles to a library, exposes a single innocent-looking TypeScript API, and preserves the marketplace&#8217;s blue &#8220;verified&#8221; tick. We demonstrate live how to backdoor legit extensions - including cases where the source code is available and when it is not. 

We close with defensive takeaways: IoCs and TTPs to look for, defensive rules which can prevent such attacks and possible detection vectors. Attendees leave with a fully annotated GitHub repo that walks them through the process of developing such malware - starting with a &quot;hello-world&quot; C++ addon and building a rust based shellcode loader backdoored into a popular extensions.</abstract>
                <slug>bsidesluxembourg-2026-92619-from-code-to-compromise-turning-modern-day-ides-into-attack-vectors-via-malicious-extensions</slug>
                <track></track>
                
                <persons>
                    <person id='86184'>Debjeet Banerjee</person>
                </persons>
                <language>en</language>
                <description>Visual Studio Code is no longer just an editor; the IDE, along with its many AI powered forks, have become the most primary interface for Developers of all kind.  Its extension host, a Microsoft-signed Electron process, enjoys the same blind trust from EDRs that we traditionally grant to Outlook or Teams.  Meanwhile, the extension ecosystem still treats security as an after-thought: there is no deep dive source scanning, verification mechanisms are sparse, and the blue &#8220;verified&#8221; badge is cached locally &#8211; so a repackaged `.vsix` keeps the badge even after the payload has been swapped. The talks presents a brief case study about the various examples of malicious extensions used in the wild by threat actors and previously affected supply chains.

The talks presents the one of the first public implementation that weaponises this trust gap with a **Rust-compiled, position-independent shellcode runner** delivered as a Node native addon by taking a Microsoft published extension: live-server and backdooring it with a malicious extension, as well another extension with over 74M downloads. The talk also demos the following aspects of such an attack:

1. **Extension-host OPSEC**: delaying `require(&quot;./index.node&quot;)` until the user triggers the legitimate command (&#8220;Open with Live Server&#8221;) so the implant is **absent from the initial process snapshot** that EDRs collect.  
2. **Repackaging a blue-tick extension**: cloning Microsoft&#8217;s own &#8220;Live Preview&#8221; repository at a signed commit, grafting the Rust addon into its webpack pipeline, and repackaging with `vsce package`.  The resulting `.vsix` is byte-for-byte identical except for the extra native node &#8211; and the GUI still shows the verified badge because VS Code only re-validates signatures when enterprise policy `extensions.verifySignature` is set to `error`.  
3. **Going in blind** - Backdooring another popular extension with our shellcode - without any prior knowledge of the source code&#8232;
All these topics would also dissect the internal workings, file structure, thread stack and other relevant information associated with the working of the loader/

Finally, the talk concludes by listing the relevant IoCs and TTPs left behind by this attack vector and discusses various detections which organisations and individuals can adopt to protect themselves.

Session Outline

0. Pre-roll (loop, 2 min before start)
    1. Screen cycles side-by-side screenshots: legitimate vs back-doored Live Preview extension.
    2. Blue tick is identical; only the &#8220;Installation&#8221; tab shows an extra 46 kB native node
    3. Caption: &#8220;Spot the implant.&#8221; (Sets the visual theme of the talk.)
1. Introductions (1 min)
    1. whoami
    2. Previous work&#8232; 
2. Opening &#8211; VS Code and its many forks (5 min)
    1. Rise of VS Code and it&#8217;s various forks	
    2. Rise of new forks mean the rise of new market places
    3. Why target VSCode?
        * Electron renderer = Microsoft-signed, whitelisted by every EDR.
        * Marketplaces scan JS source only &#8594; native code is often a blind spot.
        * Very difficult to tell malicious extensions apart
3. Attacks in the Wild (8 mins) 
    1. Previous attacks in the wild: Kaspersky, Malicious Corgi, Material Themes, Glassworm
    2. Dissecting the $500K Kaspersky malware
    3. Powershell scripts are nice - but we can do better
    4. Taking a look into Malicious Corgi 
    5. Taking a looking into Glassworm&#8217;s source code 
    6. Unicode is nice - compiled is nicer
    7. Pivot: &#8220;What if we go native?&#8221;&#8232;
4. Node addons and demo extensions (5 mins)
    1. Introduction to node addons 
    2. Compiling C++ shellcode runner compiled with node-gyp  and running it with gyp
    3. Creating a &#8220;Hello world&#8221; extension and using ffi to pop a message box&#8232;
5. Bringing in the crab (8 mins)
    1. Introducing neon-rs  and interfacing with Javascript/Typescript 
    2. Writing a shellcode runner in rust
    3. Discuss relevant changes to be made in the configs 
    4. Compiling and running &#8232;
6. Backdooring a legit VS Code extension (10 mins) 
    1. Choosing the target: LiveServer 
    2. Updating the source to include the add-on
    3. Making webpack happy 
    4. Compiling and loading the extension 
    5. Visual similarities with legitimate extensions&#8232;
7. Backdooring a popular VS Code extension without any prior knowledge of it&#8217;s source code (5mins):
    1. Extract the VSIX bundle 
    2. Add our implant
    3. Repackage the extension 
    4. Load it into VSCode
    5. Trigger shellcode execution&#8232;
8. Improvements and Detections (3 mins) 
    1. References to other similar works
    2. Improvements and other closing thoughts
    3. IoCs and TTPs associated with the techniques
    4. Possible detections and prevention mechanisms&#8232;
Key Takeaways
1. The audience become more aware of the dangers of blindly trusting extensions from stores
2. Malware developers and red teamers get introduced to a new and powerful vector for initial access method 
3. Blue teasers can use the knowledge to prepare new rulesets and detections to avoid any such attacks</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/QXECVY/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/QXECVY/feedback/</feedback_url>
            </event>
            <event guid='18526287-bccd-541c-9e58-d6fa0480f1e1' id='92904' code='SH7X9Y'>
                <room>Workshops May 6th (C1.02.06)</room>
                <title>ANALYZE &amp; HUNT DPRK ATTACKS</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T16:00:00+02:00</date>
                <start>16:00</start>
                <duration>02:00</duration>
                <abstract>This workshop offers an in-depth exploration of advanced methodologies for identifying and analyzing cyber threats emanating from **North Korea (DPRK)**. Participants will learn practical techniques for uncovering malicious activities through **Fake GitHub Repositories**, **Hunting DPRK-based clusters**, and exploring comprehensive **ByBit Heist** that hacked $1.5 Billion. The session will also cover critical threat hunting strategies such as **Hostname Analysis**, **Command and Control (C2) infrastructure identification**, **Fake Domain Spotting** and much more. Attendees will gain valuable insights into the operational tactics of DPRK threat actors and practical skills to enhance their defensive postures against these sophisticated cyber campaigns. Please join this session to deepen your understanding of nation-state cyber operations and strengthen your threat detection capabilities.</abstract>
                <slug>bsidesluxembourg-2026-92904-analyze-hunt-dprk-attacks</slug>
                <track></track>
                <logo>/media/bsidesluxembourg-2026/submissions/SH7X9Y/image_yA2RCh0.webp</logo>
                <persons>
                    <person id='93053'>RAKESH KRISHNAN</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/SH7X9Y/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/SH7X9Y/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)' guid='6d57f409-6e10-5f49-9eb1-79fd7d149da7'>
            <event guid='548fa1e6-a2c6-535a-ae72-8a3c82292349' id='92811' code='S97X3K'>
                <room>Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)</room>
                <title>Android App Tricks: Defenses and Bypasses</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>02:00</duration>
                <abstract>Have you ever wondered how an attacker analyzes your favorite Android app? In this workshop, we will adopt a perspective of a reverse engineer to learn how to approach Android applications.

We will explore popular reverse engineering tools and techniques used in Android security analysis. Through hands-on practice, you&apos;ll learn to identify common security weaknesses and understand how attackers exploit them.

Android applications are often targeted by attackers due to openness of the platform and numerous omissions in the app development process. Plenty of security methods were created to harden Android apps against reverse engineering and tampering, which seems widely used by major app developers and way less by smaller ones.

We&apos;ll analyze a few real-world applications to examine current protection mechanisms and their limitations. We&apos;ll explore the common security measures deployed by Google Play Store and app developers, and discuss whether they are as effective as they claim to be.

By the end of the workshop, participants will have hands-on experience with several popular tools used for Android application analysis. If you are an Android developer, please feel free to bring and explore your own Android app with us.</abstract>
                <slug>bsidesluxembourg-2026-92811-android-app-tricks-defenses-and-bypasses</slug>
                <track></track>
                
                <persons>
                    <person id='92979'>Aleksandr Pilgun</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/S97X3K/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/S97X3K/feedback/</feedback_url>
            </event>
            <event guid='bf0d4518-5b79-550a-a7ea-38ad858675ee' id='88650' code='9HS8CG'>
                <room>Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)</room>
                <title>Packet Analysis for Beginners - an IoT toy, some packets, and Wireshark</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T11:00:00+02:00</date>
                <start>11:00</start>
                <duration>02:00</duration>
                <abstract>What can we learn from ordinary packets on the wire, using a disconcerting connected toy as a demo device? How can you tell when something is phoning home? In this workshop, we&#8217;ll use Wireshark to observe what devices send and receive during regular operation</abstract>
                <slug>bsidesluxembourg-2026-88650-1-packet-analysis-for-beginners-an-iot-toy-some-packets-and-wireshark</slug>
                <track></track>
                <logo>/media/bsidesluxembourg-2026/submissions/9HS8CG/image_TyepQxk.webp</logo>
                <persons>
                    <person id='89221'>Katherine Leese</person>
                </persons>
                <language>en</language>
                <description>Pre-Workshop Setup:
Please install Wireshark before the session: [https://www.wireshark.org/docs/installation.html
](https://www.wireshark.org/download.html)

Crucial Permission Steps:
    Windows: Ensure you install Npcap during the setup process.
    macOS: Follow the prompts to allow network access/chmod permissions.
    Linux: Run sudo dpkg-reconfigure wireshark-common, select yes, then add your user to the wireshark group (sudo usermod -aG wireshark $USER), then reboot.

Test: Open the app; if you see &quot;live&quot; traffic lines on your network interface, you are ready!

In this workshop, we&#8217;ll take packet capture from a disconcerting connected toy and use it as a starting point to learn how to read ordinary network traffic. Step by step, we&#8217;ll look at how devices introduce themselves on a local network, resolve names, establish connections, negotiate encryption, and continue communicating during normal operation. Once we have familiarized ourselves, we will move on to some real-world captures.

Rather than breaking encryption or exploiting vulnerabilities, the focus is on observation and understanding. Using Wireshark, we&#8217;ll practice identifying patterns, relationships, and metadata that remain visible even when payloads are encrypted. Along the way, we&#8217;ll look at how to recognise when a device is phoning home, what kinds of context travel with requests, and how much can be learned from traffic that is behaving exactly as designed.

This workshop is aimed at beginners and the curious. No prior experience with packet analysis is required. A willingness to look closely at what is already on the wire is enough.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/9HS8CG/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/9HS8CG/feedback/</feedback_url>
            </event>
            <event guid='f07f841c-c2a5-5034-808b-50862d02c438' id='90638' code='YGC7EA'>
                <room>Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)</room>
                <title>Dismantle The Bomb</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T14:00:00+02:00</date>
                <start>14:00</start>
                <duration>02:00</duration>
                <abstract>Dismantle the bomb by performng different taks</abstract>
                <slug>bsidesluxembourg-2026-90638-0-dismantle-the-bomb</slug>
                <track>Escape games!</track>
                
                <persons>
                    <person id='90958'>Stijn Tomme</person>
                </persons>
                <language>en</language>
                <description>Dismantle the bomb by performing different taks. The tasks will include:
- Solving ciphers
- Being genuine with a special flashlight
- lock picking 
- make a key with a lishi tool
- ...</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/feedback/</feedback_url>
            </event>
            <event guid='ea2e7ba1-d601-5db1-9257-2f928f82a8fd' id='90638' code='YGC7EA'>
                <room>Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)</room>
                <title>Dismantle The Bomb</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T16:00:00+02:00</date>
                <start>16:00</start>
                <duration>02:00</duration>
                <abstract>Dismantle the bomb by performng different taks</abstract>
                <slug>bsidesluxembourg-2026-90638-1-dismantle-the-bomb</slug>
                <track>Escape games!</track>
                
                <persons>
                    <person id='90958'>Stijn Tomme</person>
                </persons>
                <language>en</language>
                <description>Dismantle the bomb by performing different taks. The tasks will include:
- Solving ciphers
- Being genuine with a special flashlight
- lock picking 
- make a key with a lishi tool
- ...</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops and Stage - Design Space (C1.05.12)' guid='1d52d5bc-e122-502d-8a62-7079b3f6d4a3'>
            <event guid='3241c930-ca99-5562-b77b-52a89057002b' id='89384' code='XMDNJB'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Secure Development Lifecycle Applied - How to Make Things a Bit More Secure than Yesterday Every Day</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-06T10:00:00+02:00</date>
                <start>10:00</start>
                <duration>02:00</duration>
                <abstract>Building valuable solutions is a complex endeavor that requires a breadth of knowledge. That not being enough, we&#8217;re also getting asked to build secure solutions in a secure way - yet what does that even mean? How do we incorporate such a vast area of expertise into our everyday workflows?

In this hands-on workshop, I will introduce you to core security concepts, like the CIA triad or defense in depth - and how we can apply them in everyday work. Based on a practical example, we will go through the development lifecycle with security in mind. You will learn about threat modeling to uncover risks early on, secure coding principles to bake security in, security testing approaches to make informed decisions depending on your risk appetite, and ways of detecting potentially malicious activity to protect against. Interactive exercises at each step will let you experience how security can neatly fit with what you&#8217;re already doing without adding artificial gates.

Whether you want to keep your system secure or get a neglected one back in shape, this session is for you. Join us to gain fundamental security knowledge, hone your security skills, and get tactical advice to secure your development lifecycle. Let&#8217;s make things a bit more secure than yesterday every day!</abstract>
                <slug>bsidesluxembourg-2026-89384-secure-development-lifecycle-applied-how-to-make-things-a-bit-more-secure-than-yesterday-every-day</slug>
                <track></track>
                
                <persons>
                    <person id='89834'>Lisi Hocke</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/XMDNJB/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/XMDNJB/feedback/</feedback_url>
            </event>
            <event guid='27c65e53-8690-5830-9e3b-2dab6532b15b' id='94133' code='AALWHZ'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Kunai Workshop: Hands-on Linux Threat Detection</title>
                <subtitle></subtitle>
                <type>Workshop 4h</type>
                <date>2026-05-06T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>04:30</duration>
                <abstract>Get hands-on with Kunai in this practical workshop! You&apos;ll learn to deploy and configure this Linux monitoring tool, then dive into advanced threat detection techniques. We&apos;ll start with the basics - installation, configuration, and core functionality - before moving to advanced topics like custom rule creation, IoC integration, and MISP connectivity. Whether you&apos;re securing production systems or just exploring Linux security monitoring, this workshop will give you practical skills to detect and investigate threats.</abstract>
                <slug>bsidesluxembourg-2026-94133-kunai-workshop-hands-on-linux-threat-detection</slug>
                <track></track>
                
                <persons>
                    <person id='94001'>Quentin JEROME</person>
                </persons>
                <language>en</language>
                <description>### Part 1: Kunai Fundamentals
- **Quick Start:** Get Kunai up and running on your system
- **Core Concepts:** Understand Kunai&apos;s architecture and monitoring capabilities
- **Hands-on Basics:** Navigate the CLI, configure monitoring, and interpret events

### Part 2: Advanced Threat Detection
- **Custom Rules:** Write detection rules for specific threats and anomalies
- **IoC Integration:** Load and leverage Indicators of Compromise
- **MISP Connectivity:** Enhance your threat intelligence with MISP integration
- **Real-world Scenarios:** Apply Kunai to actual threat detection challenges

### Part 3: Bonus Topics (time permitting)
- Using [Kunai sandbox](https://sandbox.kunai.rocks/) to share traces
- Creating detection rules for specific malware</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/AALWHZ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/AALWHZ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops and Stage - Gernsback (C1.05.02)' guid='b84d3f24-c35e-59bb-96b9-3b07464f6ab1'>
            <event guid='406c662d-66a4-5a59-81ef-b1908635d19c' id='92302' code='MG7H3X'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>Malware Development for Ethical Hackers (Windows, Linux, Android)</title>
                <subtitle></subtitle>
                <type>Training 8h</type>
                <date>2026-05-06T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>09:00</duration>
                <abstract>Whether you are a Red Team or Blue Team specialist, learning the techniques and tricks of malware development gives you the most complete picture of advanced attacks. Also, due to the fact that most (classic) malwares are written under Windows, as a rule, this gives you tangible knowledge of developing under Windows.

The course will teach you how to develop malware, including classic tricks and tricks of modern ransomware found in the wild. Everything is supported by real examples.

The course is intended for Red Team specialists to learn in more detail the tricks of malware development (also persistence and AV bypass) and will also be useful to Blue Team specialists when conducting investigations and analyzing malware.

The course is divided into four logical sections:
- Malware development tricks and techniques (classic injection tricks, DLL injection tricks, shellcode running)
- AV evasion tricks (Anti-VM, Anti-Sandbox, Anti-disassembling)
- Persistence techniques
- Cryptographic functions in malware development (exclusive)
- Malware Development for Android and Linux (bonus)

Most of the example in this course require a deep understanding of the Python, Kotlin
and C/C++ programming languages.

Knowledge of assembly language basics is not required but will be an advantage</abstract>
                <slug>bsidesluxembourg-2026-92302-malware-development-for-ethical-hackers-windows-linux-android</slug>
                <track></track>
                <logo>/media/bsidesluxembourg-2026/submissions/MG7H3X/image_cHNI7b9.webp</logo>
                <persons>
                    <person id='92537'>cocomelonc</person>
                </persons>
                <language>en</language>
                <description>The course will teach you how to develop malware, including classic tricks and tricks of modern ransomware found in the wild. Everything is supported by real examples.

The course is intended for Red Team specialists to learn in more detail the tricks of malware development (also persistence and AV bypass) and will also be useful to Blue Team specialists when conducting investigations and analyzing malware.


The course is divided into four logical sections:
- Malware development tricks and techniques (classic injection tricks, DLL injection tricks, shellcode running)
- AV evasion tricks (Anti-VM, Anti-Sandbox, Anti-disassembling)
- Persistence techniques
- Cryptographic functions in malware development (exclusive)
- Malware Development for Android and Linux (bonus)

Most of the example in this course require a deep understanding of the Python, Kotlin
and C/C++ programming languages.

Knowledge of assembly language basics is not required but will be an advantage

Training Outline (detailed, timed - total ~8 hours):    

MALWARE INJECTION TECHNIQUES:
1. Traditional Injection Approaches: Code and DLL (2 practical examples, LAB + 1 homework) - 20 min
2. Exploring Hijacking Techniques (2 practical examples, LAB + 1 homework) - 20 min
3. Understanding Asynchronous Procedure Call (APC) Injections (2 practical examples, LAB + 1 homework) - 15 min
4. Mastering New Injection/Hooking Techniques (4 practical example, LAB) - 20 min

PERSISTENCE MECHANISMS:
5. Classic Path: Registry Run Keys / Persistence via Registry Keys ( 3 practical example, LAB) - 15 min
6. Persistence via Winlogon Process ( 2 practical example, LAB) - 15 min
7. Exploiting Windows Services for Persistence ( 2 practical examples, LAB + 1 homework) - 15 min
8. Exploring Non-Trivial Loopholes and New Persistence Techniques ( 5 practical examples, LAB + 2 homework) - 15 min

MALWARE FOR PRIVILEGE ESCALATION:
9. Manipulating Access Tokens like APT (1 practical example, LAB + 1 homework) - 15 min
10. Password stealing / LSASS.exe dumping (3 practical example, LAB + 1 homework) - 15 min
11. Malware for bypass User Access Control (2 practical example LAB + 1 homework) - 15 min

ANTI-VM AND AV BYPASSING
12. Anti-Virtual Machine Strategies (4 practical example, LAB + 1 homework) - 15 min
13. Practical use of hash algorithms in malware ( 1 practical example, LAB + 1 homework) - 15 min
14. Evasion Static Detection ( 1 practical example, LAB + 1 homework) - 15 min
15. Evasion Dynamic Detection (1 practical example, LAB + 1 homework) - 15 min
16. Advanced Evasion Techniques (1 practical example, LAB + 1 homework) - 15 min
17. Cryptography for bypassing security solutions ( 4 practical examples, LAB + 2 homework) - 15 min

Linux and Android Malware
18. Linux Kernel Hacking (1 practical example, LAB) - 15 min
19. Linux process injection (1 practical example, LAB) - 15 min
20. Introduction to Android Malware (3 practical examples, LAB) - 40 min
21. Leveraging legit APIs for Android Malware (2 practical examples, LAB) - 40 min

RESEARCH AND PRACTICE:
22. Simple Tricks and Automation for Malware Development and Emulation (3 practical examples, LAB + 1 homework) - 15 min
23. How to find New Persistence Techniques (2 practical examples, LAB + 1 homework) - 15 min
24. Elliptic Curve Cryptography (ECC) and Malware ( 1 practical example, LAB + 1 homework) - 15 min</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/MG7H3X/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/MG7H3X/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='CTF players room (C1.03.05 6+8th or C1.04.02 7th)' guid='9a60e791-5cf1-5ead-a5d6-59d101667e5a'>
            <event guid='a966b033-6bc5-5276-a21d-4e4ea211f1f8' id='93430' code='9NGAYY'>
                <room>CTF players room (C1.03.05 6+8th or C1.04.02 7th)</room>
                <title>Blackhoodie training - Introduction to Linux Memory Forensics</title>
                <subtitle></subtitle>
                <type>Training 8h</type>
                <date>2026-05-06T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>03:00</duration>
                <abstract>## Workshop description

What happens in memory, stays in memory! In this beginner workshop, we&#8217;ll take our first steps into the fascinating world of Linux Memory Forensics &#128522;.

This session will introduce the fundamentals of volatile memory, Linux memory management, with a touch on memory acquisition. We will then discover how to investigate memory artefacts and uncover traces of malicious behaviour through a simulated ransomware attack, from identifying suspicious processes and carving out binaries to recovering encryption keys from memory.

We will mostly use the Volatility framework, but this workshop will go beyond a simple command-line tutorial to explore the underlying principles: what are Volatility profiles and why do we need them, what are some interesting artefacts to look for, what to do when there is no command for what we are looking for, where do we even start looking, etc.

## Who should attend?

Anyone who wants to discover digital forensics! This workshop won&#8217;t require extensive hacking knowledge, however knowing a bit about Linux will help.

## Requirements

A laptop capable of running a virtual machine (or a native Linux environment), and a few gigabytes of free disk space (a memory dump can be quite heavy!). We might do a little bit of Python too! The VM will contain all the tools needed for the workshop. If you choose to use your own Linux environment instead, a setup guide will be provided.</abstract>
                <slug>bsidesluxembourg-2026-93430-0-blackhoodie-training-introduction-to-linux-memory-forensics</slug>
                <track></track>
                
                <persons>
                    <person id='93560'>Sonia Seddiki</person>
                </persons>
                <language>en</language>
                <description>BlackHoodie&#8217;s Mission
- BlackHoodie is a series of technical trainings aiming to attract more women to the field of cyber security
- Our events are women-only, except if individual organizers state otherwise
- Whether introduction level or advanced, classes are always challenging
- All of our events are free to attend
- We do not exert any preference in education level, occupation or corporate affiliation of attendees
- BlackHoodie is dedicated to serve the community, we aim to integrate, not separate
- BlackHoodie is independent, and cannot be leveraged to promote anything but its own mission
- We seek quality over quantity, in number of classes and attendees
- We also support/encourage attendees to start giving technical trainings thereby providing a platform to build their confidence</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/9NGAYY/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/9NGAYY/feedback/</feedback_url>
            </event>
            <event guid='2966a456-ad16-52c0-865c-878e45e0afbc' id='93430' code='9NGAYY'>
                <room>CTF players room (C1.03.05 6+8th or C1.04.02 7th)</room>
                <title>Blackhoodie training - Introduction to Linux Memory Forensics</title>
                <subtitle></subtitle>
                <type>Training 8h</type>
                <date>2026-05-06T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>04:30</duration>
                <abstract>## Workshop description

What happens in memory, stays in memory! In this beginner workshop, we&#8217;ll take our first steps into the fascinating world of Linux Memory Forensics &#128522;.

This session will introduce the fundamentals of volatile memory, Linux memory management, with a touch on memory acquisition. We will then discover how to investigate memory artefacts and uncover traces of malicious behaviour through a simulated ransomware attack, from identifying suspicious processes and carving out binaries to recovering encryption keys from memory.

We will mostly use the Volatility framework, but this workshop will go beyond a simple command-line tutorial to explore the underlying principles: what are Volatility profiles and why do we need them, what are some interesting artefacts to look for, what to do when there is no command for what we are looking for, where do we even start looking, etc.

## Who should attend?

Anyone who wants to discover digital forensics! This workshop won&#8217;t require extensive hacking knowledge, however knowing a bit about Linux will help.

## Requirements

A laptop capable of running a virtual machine (or a native Linux environment), and a few gigabytes of free disk space (a memory dump can be quite heavy!). We might do a little bit of Python too! The VM will contain all the tools needed for the workshop. If you choose to use your own Linux environment instead, a setup guide will be provided.</abstract>
                <slug>bsidesluxembourg-2026-93430-1-blackhoodie-training-introduction-to-linux-memory-forensics</slug>
                <track></track>
                
                <persons>
                    <person id='93560'>Sonia Seddiki</person>
                </persons>
                <language>en</language>
                <description>BlackHoodie&#8217;s Mission
- BlackHoodie is a series of technical trainings aiming to attract more women to the field of cyber security
- Our events are women-only, except if individual organizers state otherwise
- Whether introduction level or advanced, classes are always challenging
- All of our events are free to attend
- We do not exert any preference in education level, occupation or corporate affiliation of attendees
- BlackHoodie is dedicated to serve the community, we aim to integrate, not separate
- BlackHoodie is independent, and cannot be leveraged to promote anything but its own mission
- We seek quality over quantity, in number of classes and attendees
- We also support/encourage attendees to start giving technical trainings thereby providing a platform to build their confidence</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/9NGAYY/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/9NGAYY/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops May 6th (C1.03.06)' guid='b732f36a-4aac-5cd0-a76f-c28c29453193'>
            <event guid='f23b3ab6-6ead-5b0a-90b0-d087495948af' id='89381' code='TMG89Y'>
                <room>Workshops May 6th (C1.03.06)</room>
                <title>Threat Modelling Starter Training</title>
                <subtitle></subtitle>
                <type>Training 8h</type>
                <date>2026-05-06T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>09:00</duration>
                <abstract>This threat modelling training is geared towards beginner to intermediate audiences with software engineering and security engineer/pentester backgrounds who have never done any sort of threat modelling work but are trying to get into it. Practically, anyone can join this class even if they do not have those backgrounds, but at least some basic idea of how programs work on a code level, basic cyber security issues and threats and anybody interested in learning them.

The main goal of this training is to equip participants with understanding the importance of threat modelling in dealing and understanding cyber threats to their applications and networks. The trainer&apos;s goal is to prevent more software security bugs from inception by teaching students whether they build more secure software or find underlying security flaws and bugs and minimizing the risks and impact of the engineered software. Participants will be immersed with the popular STRIDE and DREAD methodologies for threat modelling, increasing growing popular PASTA methodology, and they will create their own threat models during the training. 

At the end of the training, students shall expect themselves to be able to do a quick threat model of any function/method that they wish to implement in their software, realize the threats that they could introduce or deal with, and finally be able to write a full and complete threat model on their own from start to finish including recommendations, threat scenarios and related risk ratings.</abstract>
                <slug>bsidesluxembourg-2026-89381-threat-modelling-starter-training</slug>
                <track></track>
                
                <persons>
                    <person id='89833'>Ralph Andalis</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/TMG89Y/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/TMG89Y/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops May 6th (C1.03.09)' guid='1dc3959f-471b-5fd4-8656-b7b228eddc44'>
            <event guid='cd372e1b-06a7-5f83-a7c2-ee3ec8b499e4' id='97088' code='GZHQYD'>
                <room>Workshops May 6th (C1.03.09)</room>
                <title>Threat Modeling in DevOps and Cloud using Card Games</title>
                <subtitle></subtitle>
                <type>Workshop 4h</type>
                <date>2026-05-06T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>04:00</duration>
                <abstract>DevOps processes transfer security responsibility to development teams.  But how can developers handle that additional task? 

Threat Modeling is a structured approach to identifying security problems early, spreading security knowledge across teams, and communicating risks in a way that is accessible to management. In this workshop, we explore lightweight Threat Modeling approaches tailored to DevOps workflows. We also show how gamification can lower the barrier to entry for teams without a strong security background.

We will look at:
* What is Threat Modeling?
* Basic Threat Modeling with STRIDE
* Gamification
* Hands-on Threat Modeling with OWASP Cumulus for a cloud-native scenario
* What&apos;s next? Risk, processes, and beyond

Attendees will leave with practical tools and techniques they can immediately apply in their own teams.</abstract>
                <slug>bsidesluxembourg-2026-97088-threat-modeling-in-devops-and-cloud-using-card-games</slug>
                <track></track>
                <logo>/media/bsidesluxembourg-2026/submissions/GZHQYD/image_vxeseVw.webp</logo>
                <persons>
                    <person id='96714'>Christoph Niehof</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/GZHQYD/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/GZHQYD/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='2' date='2026-05-07' start='2026-05-07T04:00:00+02:00' end='2026-05-08T03:59:00+02:00'>
        <room name='Atrium (common area)' guid='fdf8693e-170e-5bb7-9e30-eff972c8b09d'>
            <event guid='99554d67-3654-545a-a469-7231edd1f497' id='85198' code='3CLCMG'>
                <room>Atrium (common area)</room>
                <title>Car Hacking Village</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-07T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>03:00</duration>
                <abstract>The Car Hacking Village offers attendees a hands-on, immersive environment to explore the security of modern vehicles. As cars continue to evolve into complex, connected computer systems, the need to understand their attack surfaces and defensive challenges grows. This village provides a safe and controlled space where participants can learn, experiment, and collaborate on real automotive cybersecurity techniques.</abstract>
                <slug>bsidesluxembourg-2026-85198-0-car-hacking-village</slug>
                <track>Villages in Atrium</track>
                
                <persons>
                    <person id='86349'>Roald Nefs</person>
                </persons>
                <language>en</language>
                <description>The village includes a fully equipped setup featuring simulated vehicle networks, CAN bus tooling, instrument clusters, ECUs, and other automotive components. Attendees can:

- Interact with the CAN bus and observe how in-vehicle communication works
- Capture, analyze, and replay automotive network traffic
- Reverse engineer messages sent to various vehicle subsystems
- Craft spoofed signals to manipulate components such as instrument clusters
- Explore common vulnerabilities in today&apos;s vehicle architectures
- Learn practical defensive considerations for securing automotive systems

All activities are guided and designed to be accessible to beginners while still offering depth for more experienced researchers.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/3CLCMG/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/3CLCMG/feedback/</feedback_url>
            </event>
            <event guid='2c55278a-10f8-51b8-a4dd-72192e27b69a' id='85198' code='3CLCMG'>
                <room>Atrium (common area)</room>
                <title>Car Hacking Village</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-07T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>04:30</duration>
                <abstract>The Car Hacking Village offers attendees a hands-on, immersive environment to explore the security of modern vehicles. As cars continue to evolve into complex, connected computer systems, the need to understand their attack surfaces and defensive challenges grows. This village provides a safe and controlled space where participants can learn, experiment, and collaborate on real automotive cybersecurity techniques.</abstract>
                <slug>bsidesluxembourg-2026-85198-1-car-hacking-village</slug>
                <track>Villages in Atrium</track>
                
                <persons>
                    <person id='86349'>Roald Nefs</person>
                </persons>
                <language>en</language>
                <description>The village includes a fully equipped setup featuring simulated vehicle networks, CAN bus tooling, instrument clusters, ECUs, and other automotive components. Attendees can:

- Interact with the CAN bus and observe how in-vehicle communication works
- Capture, analyze, and replay automotive network traffic
- Reverse engineer messages sent to various vehicle subsystems
- Craft spoofed signals to manipulate components such as instrument clusters
- Explore common vulnerabilities in today&apos;s vehicle architectures
- Learn practical defensive considerations for securing automotive systems

All activities are guided and designed to be accessible to beginners while still offering depth for more experienced researchers.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/3CLCMG/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/3CLCMG/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Atrium (common room) 2' guid='663a9ff0-e9f4-52f8-95ae-2af2e2e913dd'>
            <event guid='32b47eae-d28b-55a0-b7e0-15f27231edeb' id='92182' code='9FGWWQ'>
                <room>Atrium (common room) 2</room>
                <title>Lockpicking Village</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-07T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>03:00</duration>
                <abstract>Learn or practice your lockpicking skills in the lockpicking village.
Experts say that this has real-life impact, not only to red teamers!</abstract>
                <slug>bsidesluxembourg-2026-92182-0-lockpicking-village</slug>
                <track>Villages in Atrium</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>There will be all sorts of lockpicking equipment available for you to practice, guided by our volunteers.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/9FGWWQ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/9FGWWQ/feedback/</feedback_url>
            </event>
            <event guid='8a3c4478-6b76-5ead-9a2f-8a3b43acbd42' id='92182' code='9FGWWQ'>
                <room>Atrium (common room) 2</room>
                <title>Lockpicking Village</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-07T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>04:30</duration>
                <abstract>Learn or practice your lockpicking skills in the lockpicking village.
Experts say that this has real-life impact, not only to red teamers!</abstract>
                <slug>bsidesluxembourg-2026-92182-1-lockpicking-village</slug>
                <track>Villages in Atrium</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>There will be all sorts of lockpicking equipment available for you to practice, guided by our volunteers.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/9FGWWQ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/9FGWWQ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Main Stage' guid='75d481b1-868b-58be-a3aa-7a08dfdaa6bb'>
            <event guid='91a478ba-06a9-5ee9-bc05-94e4bc5d6c77' id='93069' code='S8NTGH'>
                <room>Main Stage</room>
                <title>Things Fall Apart: Allying Cybersecurity and Diplomacy against Authoritarian Disorder</title>
                <subtitle></subtitle>
                <type>Opening Speech</type>
                <date>2026-05-07T09:10:00+02:00</date>
                <start>09:10</start>
                <duration>00:25</duration>
                <abstract>There are over 100 concurrent armed conflicts in the world (+130 according to the ICRC) and **all** of them have a technological dimension. The planet is rapidly heating. Poverty and economic inequality are rampant. While the international legal order and multilateral institutions are under unprecedented strain, &quot;emerging and disruptive technologies&quot; like generative AI are hyped as miracle cures. How can diplomacy and cybersecurity professionals work together to push back against rising authoritarianism?</abstract>
                <slug>bsidesluxembourg-2026-93069-things-fall-apart-allying-cybersecurity-and-diplomacy-against-authoritarian-disorder</slug>
                <track></track>
                
                <persons>
                    <person id='93185'>Luc Dockendorf</person>
                </persons>
                <language>en</language>
                <description>Luxembourg&apos;s Cybersecurity and Digitalisation Ambassador will return to BSides 2026 for a no-nonsense overview of current challenges in geopolitics and cyberdiplomacy. Come armed with all your questions about international relations and (dis-)order in the digital world!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/S8NTGH/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/S8NTGH/feedback/</feedback_url>
            </event>
            <event guid='d27e4f3a-292f-5346-8e72-98e5b8aee42a' id='91204' code='LUCRQP'>
                <room>Main Stage</room>
                <title>Keynote: Identity Security Just Exploded</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T09:35:00+02:00</date>
                <start>09:35</start>
                <duration>00:40</duration>
                <abstract>There are some aspects to identity and access management that have never worked very well, such as delegation. Unfortunately, the stakes just got higher and wider with the explosion of identities that aren&apos;t humans, but aren&apos;t traditional system and application accounts either.

Even if you&apos;re not using them yourselves, it&apos;s time to make some decisions on how to deal with agents in your ecosystem.</abstract>
                <slug>bsidesluxembourg-2026-91204-keynote-identity-security-just-exploded</slug>
                <track></track>
                
                <persons>
                    <person id='91445'>Wendy Nather</person><person id='92423'>Wendy Nather</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/LUCRQP/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/LUCRQP/feedback/</feedback_url>
            </event>
            <event guid='c2dfdaf4-dc80-528a-9943-7320f0ca0d4f' id='88657' code='G979N8'>
                <room>Main Stage</room>
                <title>Level Up Your CI/CD: Building a secure pipeline with OSS</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T10:35:00+02:00</date>
                <start>10:35</start>
                <duration>00:40</duration>
                <abstract>What does the &quot;perfect&quot; CI/CD pipeline look like, especially one built with security at its core? In this talk, we&apos;ll explore that ideal using readily available open-source tools. We&apos;ll walk through the essential stages of a modern secure pipeline, demonstrating how to integrate security seamlessly throughout the development lifecycle (DevSecOps).

We&apos;ll cover seven key security stages: pipeline security scanning, code security analysis (SAST and SCA), secrets detection, container scanning, Infrastructure as Code scanning and runtime infrastructure scanning. You&apos;ll learn not just which tools to use, but why these security controls matter and how they work together.

Leave with a clear understanding of secure pipeline design principles and actionable techniques to start building your own hardened CI/CD pipeline.</abstract>
                <slug>bsidesluxembourg-2026-88657-level-up-your-ci-cd-building-a-secure-pipeline-with-oss</slug>
                <track></track>
                
                <persons>
                    <person id='86297'>Andoni Alonso</person><person id='87024'>Paco Sanchez</person>
                </persons>
                <language>en</language>
                <description>This talk is a companion presentation to our hands-on workshop, distilling the key concepts and tool demonstrations into a focused session suitable for all attendees.

Workshop repository: https://github.com/unicrons/secure-pipeline-workshop</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/G979N8/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/G979N8/feedback/</feedback_url>
            </event>
            <event guid='b2c0d893-4efe-5acf-bd57-810f69786dae' id='88367' code='9JT9GR'>
                <room>Main Stage</room>
                <title>The Spy Who Logged Me - When your XDR joins the attackers</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T11:20:00+02:00</date>
                <start>11:20</start>
                <duration>00:40</duration>
                <abstract>What if I told you the security tool you trust the most (your XDR) is also an attacker&apos;s favorite weapon? You spent time, money, and effort deploying it, testing it, fine tuning it, believing it had your back. But what if, instead of stopping threats, it was helping them?

Your XDR isn&apos;t broken, in fact, it&apos;s doing exactly what it&apos;s designed to do and what you set it up to do. The problem? Attackers have figured out how to make it work for them instead of against them. 

In this session, we&apos;ll discuss how the bad guys manipulate XDR implementations, abuse detection logic, weaponize built-in components, and turn trusted security controls into defensive tools. From abusing existing workflows to full exploitation, you&apos;ll see why your XDR might not be protecting you the way you think it is.</abstract>
                <slug>bsidesluxembourg-2026-88367-the-spy-who-logged-me-when-your-xdr-joins-the-attackers</slug>
                <track></track>
                
                <persons>
                    <person id='87302'>Melina Phillips</person>
                </persons>
                <language>en</language>
                <description>What if I told you the security tool you trust the most (your XDR) is also an attacker&apos;s favorite weapon? You spent time, money, and effort deploying it, testing it, fine tuning it, believing it had your back. But what if, instead of stopping threats, it was helping them?

Your XDR isn&apos;t broken, in fact, it&apos;s doing exactly what it&apos;s designed to do and what you set it up to do. The problem? Attackers have figured out how to make it work for them instead of against them. 

In this session, we&apos;ll discuss how the bad guys manipulate XDR implementations, abuse detection logic, weaponize built-in components, and turn trusted security controls into defensive tools. From abusing existing workflows to full exploitation, you&apos;ll see why your XDR might not be protecting you the way you think it is.



	1. Intro
Short story and correlate it to XDRs.

	2. XDR 101: Understanding the Basics
We won&#8217;t reinvent the wheel, but understanding how XDRs work is critical, so we can visualize how attackers can weaponize them.

	3. Point of Origin: How do attackers access an XDR console?

XDRs are only as strong as their weakest link, and that weak link is often broken access controls, misconfigurations, or outdated components. Attackers don&#8217;t always need complex exploits when defenders leave the door open.

	&#183; Default Credentials on External-Facing XDR Deployments.

Many XDR solutions have cloud-based management consoles exposed to the internet.
If default credentials aren&#8217;t changed, attackers can:

	- Log in and modify IOC exclusion rules.
	- Uninstall sensors or disable detections.
	- Deploy malware directly through the XDR interface.

Countermeasures
	- Enforcing MFA on all management consoles.
	- Audit externally exposed XDR consoles (does your XDR console really need to be internet-facing?).


	&#183; Compromised API keys - The secret backdoor.

	&#183; Many XDR solutions have APIs for automation, management and integration. If an attacker finds compromised API keys they can query endpoint logs to map security gaps, modify blacklisting rules and disable detections.

Countermeasures:
	- Monitor for compromised credentials and unusual API activity.
	- Rotate API keys regularly to limit exposure.
	- Use environmental variables instead of hardcoded credentials.


	- Outdated XDR Versions &#8211; Legacy software is an attacker&apos;s best friend.

	- Running outdated XDR versions allows attackers to exploit known vulnerabilities in previous versions and abuse compatibility issues to downgrade protections.

Countermeasures:
	- Audit security tools for outdated versions regularly.
	- Enable  automatic updates for XDR components


	&#183; Outdated XDR agents - Weak links in the chain

	- One endpoint running an outdated version of an XDR sensor is enough for an attacker to exploit known vulnerabilities and bypass detection.

Countermeasures:
	- Use SIEM integration or centralized management to monitor XDR agent mismatches.
	- Automate XDR agents updates across all endpoints.



	4. XDR as an attack vector.

&#8226; Your Security Tool is My C2 - Abusing Remote Shell Access.

Many XDR consoles offer built-in shell capabilities that allow defenders to execute limited admin commands on endpoints  (for example Crowdstrike Falcon RTR). But if an attacker gains access to the XDR management console, they can run system enumeration commands to:

- Gather information about a host.
- Deploy malicious files or modify settings.
- Use the sensor as a C2 channel.

Countermeasures:

Restrict remote shell access.
- Require MFA for authentication.
- Enforcing RBAC.
- Monitor XDR shell command history.


&#183; Blinding the Guard &#8211; Removing and Disabling an XDR Sensor
Before executing an attack, adversaries often remove or disable XDR agents to avoid detection. Some XDR solutions lack strong tamper protection, allowing attackers to:

- Stop XDR services to prevent detection.
- Uninstall the XDR agent using weak removal controls.
- Kill security processes or corrupt critical files to make the sensor non-functional.

Example:
Attempt to stop the XDR service using systemctl stop XDR agent. Kill the process manually using pkill -9 XDR agent and show that detection logs stop, leaving the system unprotected.

Countermeasures:
- Implement tamper protection to prevent unauthorized removal.
- Deploy kernel-based security monitoring (eBPF) to detect service manipulation.


- Hiding in Plain Sight - Whitelisting Malicious IOCs

If attackers gain access to an XDR allowlist, they can manipulate rules to bypass detection entirely.

- Whitelist malware so it is ignored by security controls.
- Drop malicious payloads in trusted directories that are already allowlisted.
- Modify allowlists via API access, letting malware execute freely.

Example:
Identify an XDR allowlist configuration file and manually whitelist malicious IOCs.

Countermeasures:
- Restrict who can modify allowlists (RBAC enforcement).
- Implement cryptographic integrity checks on configuration files.
- Require MFA to modify exclusions.


&#183; When Vintage isn&apos;t Always Nicer &#8211; Downgrading a Sensor or Preventing Updates
Attackers prefer outdated security tools because they lack modern detection techniques, by preventing updates or forcing a downgrade, attackers can:

- Decrease detection effectiveness by pushing legacy security policies.
- Reintroduce vulnerabilities patched in later versions.
- Prevent new threat signatures from being applied.

Demo: Blocking XDR updates via /etc/hosts and downgrading the agent.

Countermeasures:
- Enforce automatic updates across all endpoints.
- Monitor version mismatches across all deployed sensors.
- Block manual downgrades unless explicitly approved.


&#183; Friendly Fire &#8211; Isolating Critical Systems for Disruption

Some XDRs have host isolation features to contain threats. Attackers abuse this to:
- Trigger false positives and force automated isolation.
- Manually isolate critical infrastructure (domain controllers, production servers).
- Lock down an organization without deploying malware.

Countermeasures:
- Implement role-based restrictions on isolation functions.
- Require MFA and secondary approval for manual isolations.
- Alert on mass isolations as a potential attack indicator.



&#183; Spotting a Knockoff  &#8211; Sensor Spoofing

XDRs rely on heartbeat signals to confirm agents are online and attackers can manipulate this process to:
- Fake sensor check-ins, tricking defenders into believing the agent is still running.
- Redirect telemetry to a different endpoint, suppressing real detections.
- Modify system responses to make XDR appear fully functional while disabled.

Countermeasures:
- Use mutual TLS authentication between XDR agents and servers.
- Monitor for missing logs and no heartbeats.



&#183; Going for the Kill - Leaking Sensitive Information from XDR Logs.

XDR logs store useful information that attackers can abuse. These logs allow security analysts to identify suspicious behavior. Some common techniques include:

- Extracting IP addresses, hostnames and domain controllers for enumeration purposes.
- Enumerating security policies to avoid detection.
- Finding user accounts and credentials stored in logs.

Example: Extracting domain controllers, user accounts, and network data from XDR logs.

Countermeasures:
- Use SIEM log forwarding as a backup and integrity verification.
- Enforce RBAC on log access to prevent unauthorized queries.
	


&#183; SOC Analysts, It&#8217;s Panic O&#8217;Clock - Alert Saturation Attacks.

Attackers generate thousands of fake alerts to distract SOC teams from real threats. This allows:

- Overloading analysts with false positives.
- Creating a blind spot, given that some security teams opt to disable XDRs as a way to stop all the noise.
- Hiding legitimate threat activity.

Example: Creating fake logs and flooding a SIEM with fake ransomware alerts.

Countermeasures:
- Leverage anomaly detection activity to identify alert flooding patterns.
- Enforcing log integrity checks to decrease the chances of alert poisoning.
- Rate-limit automated log events to prevent abuse.


	5. Catch 22: Detecting Malicious activity without an XDR.

Given that your XDR agent is disabled, visibility is limited. These are some alternatives:
- Syslog Monitoring and SIEM logs: Look for XDR agent stop/disable events in your system logs.
- Monitor authentication logs for suspicious access to the XDR console.
- Review SIEM log ingestion for gaps in log forwarding (if logs stop being ingested, that&apos;s typically a red flag).


	6. Stop The Bleeding: Immediate Response to Regain Visibility and Isolation.

If an attacker has disabled visibility, you need to contain the compromised host without an XDR. The following alternatives could be applied:
- Quarantine the compromised host using firewall rules of NAC.
- Leverage network based detections (identify suspicious traffic patterns, detect connections to known C2).
- Restore XDR sensor remotely.
- If the attacked blocked reinstallation, deploy a separate forensic agent (such as velociraptor).


	7. Beat Them At Their Own Game: Locking the Attacker Out of the Console.

- Check for rogue admin accounts added to your XDR console.
- Rotate API keys and credentials.
- Review XDR logs for unauthorized policy changes.
- Enable MFA on XDR console.


	8. Real-World Case Studies: RansomHub - Weaponizing XDR Weaknesses.
	
RansomHub is a ransomware-as-a-service (RaaS) operation first detected in February 2024 by TrendMicro. Unlike highly structured ransomware groups, RansomHub operates as a decentralized affiliate-based collective, allowing attackers from various regions to conduct their own operations under the same banner.
Their primary targets? Organizations with high operational dependencies, industries where downtime is more expensive than the ransom itself, increasing the likelihood of payouts.

	
	&#183; Attack methodology:
	RansomHub doesn&apos;t rely exclusively on encrypting data, they start by disabling security mechanisms, ensuring they can operate without any roadblocks. They attack chain includes:
	
	- Using TDSSKiller to disable antivirus or XDR solutions in the target system.
	- Deploying TOGGLEDEFENDER to disable Windows Defender.
	- Utilizing XDR Kill Shifter, a loader executable that leverages the Bring Your Own Vulnerable Driver (BYOVD) technique, exploiting multiple vulnerable drivers to disable XDR protection before execution.

Key Takeaway: Their focus on XDR disablement as a priority aligns with modern ransomware strategies, attackers don&apos;t just evade detection, they neutralize the entire security stack.

	&#183; Notable Victims:
Mexican government (Hit Twice!).
	- The second attack impacted 13 airports across the country.
	- Fun Fact: The Mexican government is a frequent target of ransomware attacks, often due to weak infrastructure, slow patching cycles, and underfunded cybersecurity measures.
	
Frontier communications.
	- Disruption in telecom services, impacting businesses and residential users.

Christie&apos;s Auction House
	- Attackers targeted high-value transactions and sensitive financial data.

&#183; Key Takeaways:
- RansomHub exemplifies modern ransomware techniques, they don&#8217;t just encrypt data, they strategically dismantle defenses first.
- The use of BYOVD attacks on XDRs shows that even advanced security solutions are vulnerable when misconfigurations or unpatched drivers exist.

&#183; Countermeasures: Defending Against RansomHub
- Use behavioral-based detection instead of relying only on signature-based AV/XDR protections.
- Apply strict application control policies to block unauthorized tools.
- Monitor for signs of BYOVD exploitation, harden kernel-level protections to prevent unsigned driver execution.
	

	9. Final Thoughts

Attackers are shifting tactics, instead of just evading security tools, they&apos;re actively disabling them. Attackers recognize that XDRs are a core part of enterprise security, so their first priority is to neutralize detection and response capabilities before executing their objective.

The question isn&#8217;t if attackers will target your XDR, it&#8217;s how prepared you are when they do. The key to defense isn&#8217;t just relying on automated detections, but understanding how attackers think and proactively securing the tools meant to protect you.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/9JT9GR/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/9JT9GR/feedback/</feedback_url>
            </event>
            <event guid='52a7600b-28a1-5827-b207-5997ca2f5e44' id='92259' code='VYCS8Y'>
                <room>Main Stage</room>
                <title>What is the dark web talking about? - Dark Jargon Detection and Identification</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2026-05-07T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>00:05</duration>
                <abstract>Communication on the dark web incorporates specialized coded language, referred to as &quot;dark jargon&quot;, which serves to obscure illicit activities and hinder automated interpretation. These illicit activities often have severe real-world consequences, including drug and human trafficking, data leaks
and financial theft through fraud, and the facilitation of child abuse, which emphasizes the need for dark jargon detection and decoding methods. In this lightning talk we aim to explain the basic concepts of dark jargon, its NLP-based detection and interpretation methods as well as the difficulties that impede these.</abstract>
                <slug>bsidesluxembourg-2026-92259-what-is-the-dark-web-talking-about-dark-jargon-detection-and-identification</slug>
                <track></track>
                
                <persons>
                    <person id='92493'>Laura Bernardy</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/VYCS8Y/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/VYCS8Y/feedback/</feedback_url>
            </event>
            <event guid='d0ca42da-b96c-56bd-baba-696832c2a121' id='92257' code='GDNK3Q'>
                <room>Main Stage</room>
                <title>Understanding Mobile Stalkerware</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2026-05-07T13:35:00+02:00</date>
                <start>13:35</start>
                <duration>00:05</duration>
                <abstract>Stalkerware -software for stalking- is a class of malware aimed at targeted surveillance of individuals.
On contemporary mobile platforms, such monitoring is often enabled not through remote exploitation, but through authenticated access, coercion, and reconfiguration of devices. This creates a gray zone in which surveillance can be implemented via purpose-built stalkerware, but also by weaponizing dual-use applications or native OS-features.

To better understand this class of threats, we&apos;ve studied definitions, classification, behavior and detection performance through literature in order to address some of the current research gaps. Based on our research, we propose an attack-centric perspective that grounds definitions and analysis in attacker access, persistence, and coercive objectives rather than application identity alone. We consolidate an end-to-end stalkerware attack lifecycle, with particular relevance to real-world Intimate Partner Violence (IPV) scenarios.</abstract>
                <slug>bsidesluxembourg-2026-92257-understanding-mobile-stalkerware</slug>
                <track></track>
                
                <persons>
                    <person id='92491'>Elouan Rigaut</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/GDNK3Q/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/GDNK3Q/feedback/</feedback_url>
            </event>
            <event guid='9766a529-2994-588e-a689-838ef870bd42' id='92431' code='QB7ZBY'>
                <room>Main Stage</room>
                <title>Scaling defence - finding RedVDS from a phishing email</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2026-05-07T13:40:00+02:00</date>
                <start>13:40</start>
                <duration>00:05</duration>
                <abstract>Something we hear constantly as defenders is that attacks scale, implying that defences do not. While it is undeniable an attacker can take a 0-day and exploit thousands or millions of hosts, we can also turn the tables as defenders and scale our efforts. In this talk I will show you how you can take a phishing attempt and turn it into a major pain in the ass for an attacker.</abstract>
                <slug>bsidesluxembourg-2026-92431-scaling-defence-finding-redvds-from-a-phishing-email</slug>
                <track></track>
                
                <persons>
                    <person id='92652'>Elliot Parsons</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/QB7ZBY/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/QB7ZBY/feedback/</feedback_url>
            </event>
            <event guid='5552615b-415c-50ac-8e29-7e9bb470e3c8' id='91895' code='RVGUME'>
                <room>Main Stage</room>
                <title>How to be just the right amount of Paranoid (Cybersecurity Edition)</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2026-05-07T13:45:00+02:00</date>
                <start>13:45</start>
                <duration>00:05</duration>
                <abstract>Hearing the first time about cybersecurity is exciting! You will learn how to hack things and learn how to defend against hackers. Red team, blue team and even purple team, but no one has told me that I will become more aware of security, or rather, become more aware of the lack of security in my surroundings. This awareness can grow into something much more than just being aware &#8211; &#8220;being paranoid&#8221;.</abstract>
                <slug>bsidesluxembourg-2026-91895-how-to-be-just-the-right-amount-of-paranoid-cybersecurity-edition</slug>
                <track></track>
                
                <persons>
                    <person id='91955'>Denim Lati&#263;</person>
                </persons>
                <language>en</language>
                <description>This lightning talk has the objective to bring this topic to light. It is a topic not often talked about, but it is a matter most people, that work or are in contact with (cyber)security, have experienced. The extend can vary and the impact can be visible or invisible. One might share in their close family and friend circle how passphrases are better than passwords and easier to remember while others might force them to use password managers, MFA, backups of the previous two, VPN connections 24/7 and so on.
The golden middle way is to adapt enough awareness to not fall into security traps while not becoming paranoid over the smallest things. It is difficult to balance, but by bringing this topic to light, a certain self-reflection should hopefully spark in the participants. Where do they find themselves on this scale between care-free and paranoid?
The human factor continues to play an important role in not only awareness, but in the realm of cybersecurity. Being able to position oneself and others on this scale can be crucial when it comes to determining how to convey a message. A security mindset is something we can work towards and expand together to create a secure and healthy environment.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/RVGUME/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/RVGUME/feedback/</feedback_url>
            </event>
            <event guid='26b9e060-f5d8-5152-8748-3d6688d258ab' id='94144' code='878PCR'>
                <room>Main Stage</room>
                <title>Magic-rs: A Memory-Safe, libmagic-Compatible File Type Detection Ecosystem</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2026-05-07T13:50:00+02:00</date>
                <start>13:50</start>
                <duration>00:05</duration>
                <abstract>File identification has been a long-standing problem in software development, traditionally relying on legacy C code embedded within memory-safe applications. Magic-rs is a Rust ecosystem providing near-full compatibility with libmagic&apos;s file type detection while eliminating unsafe code. The ecosystem includes Python bindings and a CLI utility called `wiza` that we will demonstrate. We&apos;ll explore key advantages, architecture, and how you can use it in your projects or contribute to improving libmagic compatibility.</abstract>
                <slug>bsidesluxembourg-2026-94144-magic-rs-a-memory-safe-libmagic-compatible-file-type-detection-ecosystem</slug>
                <track></track>
                
                <persons>
                    <person id='94001'>Quentin JEROME</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/878PCR/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/878PCR/feedback/</feedback_url>
            </event>
            <event guid='44084530-2159-5391-9edc-cc32c430359a' id='94883' code='3YK3HN'>
                <room>Main Stage</room>
                <title>Building a safe harbor for cybersecurity professionals</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2026-05-07T13:55:00+02:00</date>
                <start>13:55</start>
                <duration>00:05</duration>
                <abstract>This lightning talk will present positive and negative examples related to workplace well-being. It will emphasise the importance of mental health for operational teams such as SOCs and CSIRTs, and explore the pressures CISOs face today. The talk will explore the importance of creating a safe and open environment for cybersecurity professionals. It will also explain how to build a safe harbor for cybersecurity professionals. Furthermore, it will explain how this approach will be reciprocated by these individuals and contribute to a positive workplace culture.</abstract>
                <slug>bsidesluxembourg-2026-94883-building-a-safe-harbor-for-cybersecurity-professionals</slug>
                <track></track>
                
                <persons>
                    <person id='93489'>Ondrej Nekovar</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/3YK3HN/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/3YK3HN/feedback/</feedback_url>
            </event>
            <event guid='010aebc3-77f9-5905-929c-77e00b7f25d0' id='89826' code='YQSRBJ'>
                <room>Main Stage</room>
                <title>RioT &#8211; A Raspberry-Based Network Implant for Red Team Operations</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T14:00:00+02:00</date>
                <start>14:00</start>
                <duration>00:40</duration>
                <abstract>Our journey in Adversary Simulation and Red Team engagements frequently relies on attack scenarios that require physical access, or at least close proximity, to obtain an initial foothold.

To support these missions, we weaponized Raspberry Pi devices and transformed them into modular network implants tailored to our most common operational use cases.

We will look at uncommon situations where attackers have time on their side&#8212;waiting for victim devices to quietly whisper their secrets, or using physical proximity in ways that traditional controls, including MFA, were never designed to handle.

This talk presents the internal RioT project, which has been actively used by the DEEP Red Team for more than five years. We will cover its design philosophy, implemented tooling, and a survey of attack scenarios and techniques that enabled successful outcomes during real-world engagements.</abstract>
                <slug>bsidesluxembourg-2026-89826-riot-a-raspberry-based-network-implant-for-red-team-operations</slug>
                <track></track>
                
                <persons>
                    <person id='90215'>Olivier M&#233;doc</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YQSRBJ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YQSRBJ/feedback/</feedback_url>
            </event>
            <event guid='4c11ae03-0607-5b76-8559-eb9efd33edb6' id='85277' code='8UQAZC'>
                <room>Main Stage</room>
                <title>Those Who Don&#8217;t Learn from CVEs Are Doomed to Rediscover Them</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T14:40:00+02:00</date>
                <start>14:40</start>
                <duration>00:40</duration>
                <abstract>This session dives into real-world vulnerabilities by dissecting CVEs directly in the code where they occurred. Each example showcases not just what went wrong, but why, with a focus on the subtle coding patterns, missed assumptions, and language misunderstandings that led to the bugs.
For every vulnerability, we will extract a few key lessons: principles or warnings that developers and reviewers can apply to prevent similar issues.</abstract>
                <slug>bsidesluxembourg-2026-85277-those-who-don-t-learn-from-cves-are-doomed-to-rediscover-them</slug>
                <track></track>
                
                <persons>
                    <person id='86405'>Louis Nyffenegger</person>
                </persons>
                <language>en</language>
                <description>The story starts with my analysis of a CVE affecting AES-GCM in a Ruby library and how this issue appears in other codebases and languages. I will show several related problems I reported across ecosystems.

From there, I cover the cyclic nature of vulnerabilities: &quot;The end of the world, we forget, rediscovery.&quot;

Next, I explain a practical methodology for performing CVE analysis. This leads into a selection of excellent CVEs I have studied and the lessons they provide. I will also demonstrate how one CVE I found was directly inspired by another I had analyzed earlier. I will finish this section with the most interesting CVE I examined in the weeks leading up to the conference.

We will wrap up with clear recommendations for attendees.

Since the topic can be complex, I include a few jokes and memes throughout the presentation to help maintain attention.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/8UQAZC/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/8UQAZC/feedback/</feedback_url>
            </event>
            <event guid='896867d4-149e-58ae-92cb-1692b0bda7cd' id='92826' code='J9BBAM'>
                <room>Main Stage</room>
                <title>Dungeons &amp; Dragons: The security power tool you didn&#8217;t know you needed</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T15:40:00+02:00</date>
                <start>15:40</start>
                <duration>00:40</duration>
                <abstract>Tired of security training that puts your team to sleep? What if I told you the most powerful training tool in cybersecurity has been sitting in your game room all along? Welcome to the world of game-based learning, where the proven power of play transforms how professionals master complex skills.

Research shows that humans learn best when working together, yet traditional training methods keep pushing isolated, theoretical learning. Game-based learning flips this approach on its head, creating environments where people forget about office politics and actually engage with the material. Through structured play and collaborative storytelling, participants don&apos;t just memorize concepts&#8212;they live them, breaking down professional barriers and building genuine understanding through experience.

I&apos;ll show you the compelling evidence behind why using roleplaying games work, and demonstrate how to transform resistant learners into engaged participants. Using compelling examples, you&apos;ll discover how tabletop role-playing mechanics can turn your most challenging training scenarios&#8212;from incident response to zero trust architecture&#8212;into adventures your team actually looks forward to.

Join me to learn why adding roleplaying games to your professional development isn&apos;t just about making training fun&#8212;it&apos;s about making it work.</abstract>
                <slug>bsidesluxembourg-2026-92826-dungeons-dragons-the-security-power-tool-you-didn-t-know-you-needed</slug>
                <track></track>
                
                <persons>
                    <person id='93002'>Klaus Agnoletti</person><person id='90938'>Glen Sorensen</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/J9BBAM/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/J9BBAM/feedback/</feedback_url>
            </event>
            <event guid='3125e582-722a-5c14-80c7-5708e448e75b' id='92574' code='APBPPQ'>
                <room>Main Stage</room>
                <title>Finding meaning in /dev/null</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T16:20:00+02:00</date>
                <start>16:20</start>
                <duration>00:35</duration>
                <abstract>A network telescope, also called a black&#8209;hole or network sinkhole, is a passive monitoring system that observes traffic sent to large blocks of unused IP address space. Because these IP ranges are never assigned to active hosts and do not generate legitimate responses, any traffic received is by definition unsolicited. This makes network telescopes powerful tools for studying global Internet behavior. They capture background noise, scanning activity, botnet noise, malicious probes, and even misconfigurations that would otherwise remain invisible. At CIRCL we operate a /18 Network Telescope since a long time, and in the context of this presentation, we will explain the potential of such dead network and our use case.</abstract>
                <slug>bsidesluxembourg-2026-92574-finding-meaning-in-dev-null</slug>
                <track></track>
                
                <persons>
                    <person id='92802'>Paul JUNG</person>
                </persons>
                <language>en</language>
                <description>In this talk, we will first present the conceptual and operational fundamentals of what a network telescope is. Explaining its technical characteristics and its role in capturing unsolicited traffic at Internet scale. I will then describe the ingestion, normalization, and structuring pipeline used to transform the raw PCAP data into a durable and queryable data lake, relying on Suricata and ClickHouse for large-scale processing. Finally, I will showcase the types of analyses and meaningful insights that can be extracted from this dataset; including the identification of emerging behaviors, the characterization of malicious activities, and the observation of broader, systemic trends in global Internet traffic.

We will details in our presentation all the valuable analysis that may comes out of the void;

Detection of Scanners Bots:
By combining PTR, and activity is it possible to determine profiles of commercial and detect also some less known scanner. We were able to discover more than 25 different scanners brand, from well known ones like Onyphe or Shodan to less unknown like Stretchoid or some public russians ones F6 or Skipa. This permit the indentification of around 6000 IP&#8217;s monthly that are available as Misp Warning lists. 
Observation of the Mirai Botnet:
Since decades now this malware is trying to replicate, the TCP windows size of the initial SYN packet is enought to qualify this malware family. The dataset collected shows an average of 45K Mirai BOTs. The repartition of MIRAI per country is quite interesting.

Detection of CVE Trends:
By discriminating sources of activity by destination port, protocl and known scanner type, it is often possible to distinguish early scanning campaigns and anticipate upcoming threats. This capability is particularly valuable for a CERT, as it supports early warning and timely notification of its constituency.

This is an example of scan activity around the port TCP 8530 corresponding to the remote code execution (RCE) CVE-2025-59287 via unsafe deserialization bug in Microsoft Windows Server Update Services (WSUS). The CVE was released on 14/10/25

Deep analysis of SNMP queries
Analysis at this scale SNMP traffics allows us to monitor CVE Based injections, and associated campains.

It permit also to find interesting relations between devices and user SMMP community. Some examples of our previous SNMP protocol analysis could be found here ;
https://d4-project.org/2025/11/27/Learning-from-Large-Scale-IPv4-blackhole-behavioral-analysis-of-SNMP-traffic.html

Many other trends can also be extracted. During this presentation, we will additionally cover;

    IOT botnet injections: The lowest level possible of interaction still allow use to identify old RCE injection like CVE-2019-12297, CVE-2021-35394, CVE-2023-28771.
    Detection of DDoS attacks: Since combined DDOS attacks often use spoofed random IP&#8217;s, it is possible to see some the backscatter traffic (TCP synack/ icmp unreachable). and therefore determine victimology
    Antivirus usage trends: By observing unsolicited traffic generated by security products, it is possible to identify antivirus deployment patterns, update behaviors, and their evolution over time, providing indirect visibility into defensive technologies used across the Internet.
    Port 0 scanning: Although port 0 is reserved and unused by legitimate services, it is sometimes leveraged by scanners for operating system fingerprinting. Monitoring this activity helps identify OS detection techniques and early-stage reconnaissance behaviors.
    Many Funny syslog misconfigurations: Since our range is not too far from a RFC1918 IP one, it often receive syslog traffic from misconfigured devices sending logs to invalid destinations. These cases highlight operational mistakes, legacy configurations, and occasionally the unintended exposure of internal or sensitive information.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/APBPPQ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/APBPPQ/feedback/</feedback_url>
            </event>
            <event guid='de0aa9ab-2e5a-5bd2-ad62-c1424875fc70' id='92361' code='KHWQNW'>
                <room>Main Stage</room>
                <title>Digital risks, threat models, and empathy: trainings that empower</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T16:55:00+02:00</date>
                <start>16:55</start>
                <duration>00:35</duration>
                <abstract>Digital and cyber risks do not always fit into standard risk assessment paradigms; they might use different language or touch upon complex causal or interdependence relationships. This non-technical talk will guide listeners on digital security training and storytelling techniques that will leave their audience feeling more empowered and better able to assess and mitigate digital risks. It will look at how to position digital risks next to other risks and look at how smart and empathetic threat modelling can combat nihilistic feelings of universal surveillance.</abstract>
                <slug>bsidesluxembourg-2026-92361-digital-risks-threat-models-and-empathy-trainings-that-empower</slug>
                <track></track>
                
                <persons>
                    <person id='92599'>&#321;ukasz Kr&#243;l</person>
                </persons>
                <language>en</language>
                <description>Many risk assessment professionals struggle with understanding digital and cyber risk. Risks such as injury caused by fires of earthquakes have reasonably straightforward causes. Risks such as data exfiltration could be caused by a number of complex, interconnected attacks. This talk will be based on my experiences of training small teams of very different risk experts&#8212;ranging from investigative journalism editors to humanitarian workers&#8212;about digital risks. It will focus on how we can tell better stories on digital risk that leave the audience feeling empowered.

We will discuss:

1. How to position digital risks next to other types of risks: I will summarise some of the conversations I&#8217;ve had with risk assessment professionals, highlighting both easy parts of and struggles in explaining digital risk. I will also briefly mention the problem of knowledge asymmetries in cyber and digital risk assessments.

2. Differences in risk assessment language used&#8212;and why they matter: this includes looking at words like &#8220;threat&#8221;, &#8220;risk&#8221;, &#8220;prevention&#8221;, and &#8220;mitigation&#8221;, and how cyber and digital risk professionals might use them differently from others

3. Why &#8216;standing out&#8217; (for example refusing to use some mainstream tools or having unusual tech use patterns) could itself be a problem. Here, we also discuss how much of the data surveillance actors collect can be noisy and messy, and why this might be reassuring.

4. Perceptions of omnipresent surveillance and ill-defined threat actors and how those frustrate our efforts at security education: we all sometimes run into the perception that surveillance isn&#8217;t just everywhere but done by everybody. While it&#8217;s true that many different actors are involved in this ecosystem, I explain how explicitly defining those actors and explaining what they are and aren&#8217;t capable of can help empower the audiences of our trainings. In short, this is a session on how we can use standard threat modelling techniques.

5. A case study on WhatsApp and Signal to explain how to best discuss risks and mitigations related to messaging and messengers.

6. Time for questions and discussion!


The main audience of this talk are security trainers, security team managers, and others who frequently work with and upskill non-technical audiences. I will mostly focus on broader notions of digital risk, only going into technical details when necessary.

I hope that, after the talk, the audience will have the following key take aways:

- How to effectively tell stories about digital risk, cyber risk, and surveillance to audiences that don&#8217;t feel too comfortable with such topics
- Building analogies, and noting differences, between digital risk and other types of risk (physical, financial, legal, etc.)
- How to empower people who might feel overwhelmed when thinking about risks such as surveillance or spyware</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/KHWQNW/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/KHWQNW/feedback/</feedback_url>
            </event>
            <event guid='d17ba237-357b-5fa7-86fc-a56cf3dc63b9' id='92560' code='SWGJPX'>
                <room>Main Stage</room>
                <title>Phinding a Phisher: Don&apos;t let rep get you rekt</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T17:30:00+02:00</date>
                <start>17:30</start>
                <duration>00:35</duration>
                <abstract>The as-a-service model has become ubiquitous across the cybercrime ecosystem. Previously dominated by tight-knit, exclusive groups, cybercrime is now a distributed international marketplace of service providers and consumers. As a result, it is more resilient than ever, with the gaps left by law enforcement takedowns quickly filled by the next opportunistic teenager. However, to operate effectively in this anonymous distributed economy threat actors need to build a reputation to gain trust. Does this give us an opportunity?

In this presentation I will discuss the importance of trust in the cybercrime ecosystem and walk through a real-world investigation involving a prominent phishing-as-a-service (PhaaS) provider. The case study illustrates that trust and OpSec do not mix, exposing threat actors to identification. Attendees will leave with additional insight into the cybercrime ecosystem, hacker culture, and some nifty OSINT tricks.</abstract>
                <slug>bsidesluxembourg-2026-92560-phinding-a-phisher-don-t-let-rep-get-you-rekt</slug>
                <track></track>
                
                <persons>
                    <person id='92652'>Elliot Parsons</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/SWGJPX/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/SWGJPX/feedback/</feedback_url>
            </event>
            <event guid='2e4e0024-fd81-59ac-92cf-edaf11dc6823' id='92930' code='D8PPLC'>
                <room>Main Stage</room>
                <title>Security Impress Karaoke</title>
                <subtitle></subtitle>
                <type>Custom entertainment and similar</type>
                <date>2026-05-07T19:30:00+02:00</date>
                <start>19:30</start>
                <duration>01:30</duration>
                <abstract>Think you can bluff your way through a security talk with zero prep? Now is your chance! At Security Impress Karaoke&#185;, you&apos;ll be handed a totally random, security-themed slide deck you&#8217;ve never seen before - and have just 3 minutes to present it like a pro.</abstract>
                <slug>bsidesluxembourg-2026-92930-security-impress-karaoke</slug>
                <track>Main Stage</track>
                
                <persons>
                    <person id='93070'>Kirils Solovjovs</person>
                </persons>
                <language>en</language>
                <description>No experience? No problem. This is all about having fun, thinking fast, and impressing the crowd with your creativity (or chaos). Whether you&apos;re a seasoned hacker or just security-curious, come take the podium and let&#8217;s see what you&#8217;ve got!

Sign up or just show up!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/D8PPLC/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/D8PPLC/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='IFEN room 1, Workshops and Detection Engineering village (Building D)' guid='d009362d-88e2-5587-ae2a-5051041602da'>
            <event guid='e90c28c0-1ee2-5ec2-b111-00c6d953294d' id='91893' code='EW9MCX'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Hello LuCy nice to meet you! - A conclusion on a 3 year Open-Source cybersecurity project</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>00:40</duration>
                <abstract>LuCy is the 3-year odyssey to bring a new security solution closer to the R&amp;E community in Luxembourg. The open-source project is integrated into an existing IT infrastructure - but wait, why not open it to our Luxembourgish R&amp;E community and that at a low cost! After some reflection it became clear that with a bit of effort the security tools can also be used by the community!

This presentation will be the conclusion on the LuCySe4RE project, presenting the overall highs and lows of the project from a technical, awareness as well as from the human perspective.

As a conclusion, focus will be put on new challenges that emerged after the move from prototype to a fully fully-fledged service, as well as explain new risks that we did not identify before.

In this presentation we will share our lessons-learned from our journey from a prototype to a tool in production and hopefully reach others to start their journey with implementing and promoting open-source projects in their community in future!</abstract>
                <slug>bsidesluxembourg-2026-91893-hello-lucy-nice-to-meet-you-a-conclusion-on-a-3-year-open-source-cybersecurity-project</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='91955'>Denim Lati&#263;</person><person id='96356'>Cynthia Wagner</person>
                </persons>
                <language>en</language>
                <description>LuCy is a mostly open-source cybersecurity toolbox consisting of a SIEM and a DNS firewall. Due to limited resources, a significant amount of R&amp;E (research and education) institutions cannot deploy an inhouse cybersecurity solution. 
Therefore, LuCy was brought into this world to offer these services, such as alerting, dns filtering, dashboards, to the R&amp;E institutions to improve their resilience at a reduced cost. We highly value the input from institutions connected to LuCy for continuous improvement of the platform.
Data sovereignity is crucial, thus everything is hosted on premises at the _Restena Foundation_ in Luxembourg.
We are working on reports and documentation so that any other SME can deploy this open-source cluster on their premises.

Open-source is the way to go! Lessons learned from implementing a cybersecurity tool which needs half of the staff. Not to lose motivation also in tough times. Keep the mindset, open source is needed in our community!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/EW9MCX/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/EW9MCX/feedback/</feedback_url>
            </event>
            <event guid='28e06720-8277-5f21-ad45-735d5d5386e4' id='92938' code='ZDAX3J'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>From Hours to Minutes: Automating Incident Response Triage with Open-Source Tools</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T09:40:00+02:00</date>
                <start>09:40</start>
                <duration>00:35</duration>
                <abstract>Learn how to automate incident response triage using open-source tools. This talk shows how to go from forensic collection to collaborative analysis in minutes, with real-world workflows and cloud-based automation.</abstract>
                <slug>bsidesluxembourg-2026-92938-from-hours-to-minutes-automating-incident-response-triage-with-open-source-tools</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='93073'>Markus Einarsson</person>
                </persons>
                <language>en</language>
                <description>Traditional forensic acquisitions create bottlenecks in incident response, requiring specialized expertise and significant time that delays investigations. This presentation introduces an automated forensic triage workflow using open-source tools to accelerate response operations.

The workflow utilizes a Velociraptor offline collector to acquire forensic triage images, automatically uploaded to cloud storage. This triggers an OpenRelik workflow that processes triage data using tools like Hayabusa and Plaso/log2timeline, with AI-powered analysis and summarization. The processed output is uploaded to Timesketch for collaborative analysis.

Several DFIR datasets will be used to show the automation pipeline from initial collection to timeline analysis. The workflow reduces time-to-analysis from hours to minutes while maintaining forensic integrity.

Attendees will learn to implement automated triage workflows and integrate multiple open-source tools into investigation pipelines. This targets incident responders, digital forensics practitioners and anyone in the security community looking to streamline forensic operations.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/ZDAX3J/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/ZDAX3J/feedback/</feedback_url>
            </event>
            <event guid='78197750-cc28-5d28-af61-292b7d08d631' id='92598' code='AP8GQT'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Advanced Threat Hunting: Staying One Step Ahead of Adversary</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T10:35:00+02:00</date>
                <start>10:35</start>
                <duration>00:40</duration>
                <abstract>As cybersecurity defenders, our job is to prevent breaches. However, threat actors continue to succeed because they constantly evolve their techniques. In this session, I will show you some of the innovative attack vectors that malicious hackers use to target our infrastructure. You&#8217;ll learn how these techniques work and more importantly, how to leverage them for your own threat hunting.</abstract>
                <slug>bsidesluxembourg-2026-92598-advanced-threat-hunting-staying-one-step-ahead-of-adversary</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='92825'>Alex Holden</person>
                </persons>
                <language>en</language>
                <description>As cybersecurity defenders, our job is not just to react but to stay ahead of attackers. Yet, adversaries continue to evolve, refining their techniques to bypass defenses and infiltrate critical systems. To effectively hunt threats, we must understand how these attackers think and operate.

This session will explore real-world techniques used by malicious actors to breach security controls. We will examine how stolen data such as compromised session tokens and credentials are weaponized to gain unauthorized access to systems and supply chains. We&#8217;ll also uncover how attackers bypass restricted registration requirements, exploiting gaps in verification and automation processes. We will also analyze how logic flaws in authentication mechanisms allow threat actors to circumvent security controls, gaining entry where they shouldn&#8217;t. And much more.

By breaking down these attack strategies, you will learn how to identify, track, and neutralize emerging threats before they cause damage. This session will equip you with practical threat-hunting insights, showing you how to turn an attacker&#8217;s own methods against them before they strike.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/AP8GQT/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/AP8GQT/feedback/</feedback_url>
            </event>
            <event guid='40d2cb10-2683-5f4b-8529-e13e37b8b2b0' id='93492' code='L9773J'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>CT(C)I-Driven detection against internal and external threats</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T11:20:00+02:00</date>
                <start>11:20</start>
                <duration>00:40</duration>
                <abstract>Threat intelligence is often reduced to reactive IOC lists or superficial color-coded reports. This talk dismantles that paradigm. We will explore the application of Cyber Threat (Counter) Intelligence - CT(C)I - in a geopolitical context, demonstrating how to engineer detections that actively hunt sophisticated adversaries operating both outside and inside your perimeter. Moving beyond standard threats, we dissect the rising trend of APT-backed &quot;remote workers&quot; infiltrating organizations using deepfakes and fabricated histories. We will show you how to weaponize cyber counterintelligence and deploy deceptive defenses to expose the threat, transforming your internal environment into your primary intelligence sensor - detection. Finally, we will outline a modern, graph-based &quot;Detection-as-Code&quot; methodology that replaces static documentation with visual, automated defense logic.</abstract>
                <slug>bsidesluxembourg-2026-93492-ct-c-i-driven-detection-against-internal-and-external-threats</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='93489'>Ondrej Nekovar</person>
                </persons>
                <language>en</language>
                <description>In this talk, we redefine efficient threat intelligence processing and its direct application in advanced detection engineering. We are moving past the era of creating reactive detection rules based on trending IOCs or generating &quot;traffic light&quot; reports that lack real defensive impact.
We will examine high-stakes threat scenarios on a geopolitical scale. By analyzing the laws of cyber deception within CTI reports, we will identify the behavioral errors attackers make and learn how to exploit those flaws for detection.
However, the landscape is evolving. We will analyze scenarios where external adversaries successfully become internal threats&#8212;specifically dissecting the tactic of APTs deploying state-sponsored remote workers to infiltrate security companies. This involves advanced deception: deepfakes, synthetic profiles, fabricated employment histories, and the abuse of corporate devices.
When you have a highly trained operative inside, traditional defense fails. This is where Cyber Counterintelligence (CCI) becomes essential. You must counter the adversary&apos;s deception with your own deceptive architecture to force them into revealing themselves. And there we will go through a real detection engineering challenge - an identity based detection through all environment. 
To operationalize this approach, we must abandon outdated methods. We will explore how to revolutionize your engineering process by replacing static documentation with a visual graph engine. You will learn how to apply a Git-native &quot;Detection-as-Code&quot; workflow that automatically converts visual capability maps into executable SIGMA rules, leveraging MITRE frameworks to design and scale resilient defense logic.

Key Takeaways:
- Shatter the Perimeter Illusion - Realize that sophisticated threats are not just external; they are actively infiltrating organizations as trusted insiders.
- The Necessity of Threat-Informed Defense - Understand that generic monitoring is obsolete; threat-driven detection engineering is the only viable path forward against modern adversaries.
- Operationalize Cyber Counterintelligence - Learn how to use internal telemetry and deceptive tactics to expose sophisticated actors already operating within your environment.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/L9773J/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/L9773J/feedback/</feedback_url>
            </event>
            <event guid='5267142a-8248-5853-abf9-0e3f077ba7c2' id='92601' code='RNELAL'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>OpenTide: From Raw Intelligence to Structured Threat-Informed Detections</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>00:40</duration>
                <abstract>Threat intelligence has matured significantly in the domain of indicators of compromise (IOCs), with standardised formats and automated sharing infrastructure. Yet when it comes to adversary behaviors - tactics, techniques, and procedures (TTPs), intelligence is still largely delivered through unstructured reports, PDFs, and blog posts. This creates a persistent gap: while defenders receive rich insights, they lack a systematic way to translate those insights into actionable detection engineering outcomes. Measuring detection coverage remains difficult, often reduced to basic ATT&amp;CK matrix mappings that fail to capture the relational and technical nature of adversary behaviors. Meanwhile, intelligence evolves faster than most teams can analyse, leaving detection engineers overwhelmed and without a standardised workflow to prioritise or model new threats.
 
OpenTide (Open Threat Informed Detection Engineering, an open source framework developed at the European Commission CSOC) addresses this challenge by introducing a structured, top&#8209;down intelligence&#8209;to&#8209;detection flow. At its core are Threat Vectors - an open construct for modeling TTPs at any level of granularity. Threat Vectors can be interrelated to form attack graphs, enabling defenders to build a dynamic and continuous coverage picture as new intelligence emerges.
 
Within OpenTide, detection objectives and supporting rules are explicitly linked to Threat Vectors, creating a direct mapping from intelligence to detection logic. A normalised schema ensures that unstructured intelligence can be ingested, transformed, and operationalised consistently. Furthermore, experimental integrations with large language models (GenTide R&amp;D Project) accelerate the creation of these objects, demonstrating how automation can reduce the time from intelligence inputs to detection deployment.
 
By reframing how we model and consume TTP&#8209;focused intelligence, OpenTide provides a scalable path to actionable detection engineering. It enables defenders to move beyond static mappings, measure coverage in context, and continuously align detection priorities with the evolving threat landscape.
 
OpenTide : https://github.com/OpenTideHQ</abstract>
                <slug>bsidesluxembourg-2026-92601-opentide-from-raw-intelligence-to-structured-threat-informed-detections</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='92828'>Remi Seguy</person>
                </persons>
                <language>en</language>
                <description>**Outline**
Intelligence to Detection Engineering Gap
- TTP intelligence remains unstructured (reports, PDFs, blogs).
- Defenders struggle to operationalize insights into detections.
- Coverage measurement reduced to static ATT&amp;CK mappings.
- Manual workflows are slow and inconsistent.
- Teams overwhelmed by volume and pace of new intel.
 
OpenTide Workflow
- Intelligence &gt; Threat Vectors &gt; Detection Objectives &gt; Rules.
- Normalized schema for consistent ingestion of unstructured intel.
- Attack graphs enable contextual coverage measurement.
 
Accelerating with LLMs (GenTide)
- GenTide : LLMs accelerate Threat Vector modeling from intelligence.
- Accelerates turning into Detection Objectives to support rule development
- Reduces time from intel input to detection deployment.
- Supports continuous alignment with evolving threats.
 
**Key take aways**
OpenTide helps defenders turn unstructured threat intelligence into actionable detections. It introduces Threat Vectors to model adversary behaviors and link them directly to detection objectives and rules in comprehensive. This creates a structured, scalable workflow that replaces static ATT&amp;CK mappings with a growing knowledge graph and redefines how detection coverage can be evaluated.

With experimental automation through large language models, OpenTide shortens the time from intelligence to deployment and enables continuous alignment with evolving threats.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/RNELAL/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/RNELAL/feedback/</feedback_url>
            </event>
            <event guid='2abf58b0-a5af-5aa9-8e06-38cc3d624e93' id='92773' code='Z8EPNM'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Your CTI Reports Are Useless Without Structure: From Unstructured Threat Intel to STIX Knowledge Graphs with LLMs and MCP server</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T14:10:00+02:00</date>
                <start>14:10</start>
                <duration>00:35</duration>
                <abstract>Every week, hundreds of threat intelligence reports are published in prose &#8212; rich in context, but locked in a format that no SIEM, TIP, or AI agent can consume. Without structure, CTI stays trapped in PDFs and blog posts, disconnected from the defensive stack that needs it most.
This talk presents a **practitioner and research-driven approach** to closing that gap. Drawing from independent research on the **[TI Mindmap HUB]([url](https://ti-mindmap-hub.com/))** project and an academic study currently under peer review, benchmarking five LLM families against government-grade STIX 2.1 ground truth, the speaker demonstrates how a hybrid architecture &#8212; combining deterministic extraction with LLM-based semantic inference &#8212; can transform unstructured reports into **machine-readable STIX 2.1 bundles**.
Beyond generation, the talk explores how STIX bundles become the foundation for **LLM-powered knowledge graphs** and how the **Model Context Protocol** (MCP) exposes structured CTI as tool calls for AI agents &#8212; making intelligence not just structured, but conversationally actionable for both human analysts and autonomous copilots.
This is independent research, not a product pitch. The speaker invites collaboration from the CTI community.
_Disclaimer: TI Mindmap HUB is a personal, independent research project. It is not affiliated with, endorsed by, or representative of any employer, organization, or commercial entity._</abstract>
                <slug>bsidesluxembourg-2026-92773-your-cti-reports-are-useless-without-structure-from-unstructured-threat-intel-to-stix-knowledge-graphs-with-llms-and-mcp-server</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='92955'>Antonio Formato</person>
                </persons>
                <language>en</language>
                <description>**Problem Statement**
The CTI community produces an enormous volume of high-quality threat intelligence every week &#8212; malware analyses, campaign reports, government advisories. The vast majority is published as unstructured text. Despite the existence of STIX 2.1 as a mature, graph-based interoperability standard, most organizations skip the conversion step entirely because it is slow, manual, and requires deep domain expertise. The consequence: intelligence that could feed automated detection, correlation, and response workflows remains locked in prose.
This section frames STIX not as bureaucratic overhead, but as the critical prerequisite layer that makes everything downstream &#8212; from SIEM rules to AI-driven threat hunting &#8212; possible.
**The Hybrid Architecture: GenAI-STIX**
The core of the talk introduces a hybrid pipeline architecture developed through independent research and validated in an academic study currently under peer review (University of Salerno, AY 2025/2026). The key design insight is that not everything should be delegated to a generative model:

- Deterministic extraction (regex + validation) handles Indicators of Compromise (IoCs) &#8212; IP addresses, hashes, domains, URLs &#8212; where precision and resistance to hallucination are paramount.
- LLM-based semantic inference handles the hard part: extracting Tactics, Techniques, and Procedures (TTPs), threat actors, malware families, victims, and the relationships between them, then mapping these to the MITRE ATT&amp;CK framework.

The talk walks through the evaluation methodology: a dual pipeline (object-level detection metrics + holistic graph similarity) tested against a ground-truth dataset built from real UK National Cyber Security Centre (NCSC) STIX bundles. Five LLM families were benchmarked. Key finding: high-reasoning models exceed 94% precision in TTP extraction, demonstrating that automated MITRE ATT&amp;CK mapping is no longer a theoretical prospect but a production-ready capability.
**TI Mindmap HUB: The Living Research Lab**
TI Mindmap HUB is the independent research platform where these concepts are implemented and tested at scale, processing 50&#8211;60 threat reports weekly. The speaker demonstrates how a single unstructured report flows through the pipeline and emerges as a multi-lens analyst workstation:

- STIX graph view &#8212; interactive entity/relationship exploration
- Diamond Model &#8212; campaign framing from STIX objects
- MITRE ATT&amp;CK heatmap &#8212; behavioral coverage visualization
- CVE analyst table &#8212; vulnerability prioritization with threat context
- TI Mindmap &#8212; narrative structure for executive and analyst consumption

The same structured artifacts (STIX bundles, ATT&amp;CK layers, IOC/CVE objects) power all views &#8212; different analytical lenses from shared data, not isolated widgets. A brief visual walkthrough shows the end-to-end flow from URL submission to structured intelligence.
**MCP: Making CTI Actionable for AI Agents**
Structure alone is not enough &#8212; intelligence must be accessible where decisions are made. This section introduces the Model Context Protocol (MCP) server built for TI Mindmap HUB, which exposes structured CTI as native tool calls for AI copilots and agents:

- Report discovery and deep-dive &#8212; search, filter, and retrieve processed intelligence artifacts directly from a chat interface
- IOC pivoting &#8212; &quot;where else was this indicator seen?&quot; as a single tool call
- STIX bundle retrieval &#8212; portable intelligence packages ready for TIP/SOAR/SIEM integration
- Article submission &#8212; trigger the full processing pipeline from conversation context

This transforms CTI from a static product into a conversational operations layer. The MCP server implements secure API key + OAuth authentication, making it ready for both human analysts and autonomous agent workflows.
**Toward Knowledge Graphs: The Research Horizon**
With STIX bundles as building blocks, the next research frontier is LLM-inferred cross-report relationships &#8212; connecting entities across dozens of reports to build a threat intelligence knowledge graph that reveals patterns invisible in individual analyses. The speaker briefly outlines this ongoing research direction and its implications for strategic CTI.
**Closing**
TI Mindmap HUB is an independent research project exploring the intersection of Generative AI and Cyber Threat Intelligence. It is not a product and not affiliated with any employer or commercial entity. The speaker actively seeks collaboration from the CTI research and practitioner community.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links>
                    <link href="https://github.com/TI-Mindmap-HUB-Org/ti-mindmap-hub-research">GitHub Repo: TI Mindmap HUB is an independent research project exploring the application of Generative AI to Cyber Threat Intelligence (CTI) workflows.</link>
                </links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/Z8EPNM/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/Z8EPNM/feedback/</feedback_url>
            </event>
            <event guid='c8a2bbab-02ea-5c41-871c-12b57227eeaf' id='84867' code='LL9LUX'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Not So hARMless: The Hidden World of Linux Packers and Detection Challenges</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T14:45:00+02:00</date>
                <start>14:45</start>
                <duration>00:35</duration>
                <abstract>Linux packers and loaders represent a blind spot in modern cybersecurity defenses.&#160;By compressing, encrypting, and obfuscating executable code, these tools enable fileless, in-memory execution that bypasses traditional detection mechanisms entirely.
This presentation dissects the hARMless ARM64 ELF packer/loader to reveal sophisticated evasion techniques: multi-layer page encryption, CRC32 integrity verification, and direct ARM64 syscall invocation. We expose critical security gaps where EDR solutions lack Linux visibility, static analysis fails against packed payloads, and memory-resident execution defeats forensic recovery. The bad news? Traditional EDR solutions are practically blind on Linux, static analysis can&apos;t keep up with modern packers, and memory-only execution makes forensics a nightmare. The good news? Well...let&apos;s see it together</abstract>
                <slug>bsidesluxembourg-2026-84867-not-so-harmless-the-hidden-world-of-linux-packers-and-detection-challenges</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='86075'>Massimo Bertocchi</person>
                </persons>
                <language>en</language>
                <description>This presentation examines Linux malware packers and loaders as sophisticated evasion techniques that pose significant challenges to modern cybersecurity defenses. Malware packers compress, encrypt, and obfuscate executable code, while loaders execute the original malware directly in memory, enabling fileless execution that bypasses traditional detection mechanisms. The research includes a case study of the Lazarus APT group&apos;s ThreatNeedle malware, demonstrating real-world implementation of multi-stage deployment with in-memory execution capabilities. A practical analysis of the hARMless ARM64 ELF packer/loader system illustrates key technical components including multi layer encryption, CRC32 integrity verification, and direct ARM64 syscall implementation. The presentation reveals critical security implications: traditional EDR solutions have significant detection gaps on Linux systems, static analysis proves insufficient against packed malware, and memory-based execution complicates forensic analysis. Defensive strategies require implementing syscall-level monitoring, deploying behavioral analysis capabilities, and maintaining comprehensive logging for effective threat detection and response. Attendees will understand how modern malware evades detection and discover practical defensive strategies including syscall-level monitoring, behavioral analysis, and comprehensive logging for effective threat detection and response.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/LL9LUX/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/LL9LUX/feedback/</feedback_url>
            </event>
            <event guid='6023d3dd-df9c-505f-b1aa-529814f5fe67' id='84864' code='JRZGUH'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Goodbye Purple Team, Hello Purple Bots</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T15:40:00+02:00</date>
                <start>15:40</start>
                <duration>00:40</duration>
                <abstract>Security teams no longer need to manually configure and perform purple team exercises. It is possible to automate and orchestrate all this flow with a combination of automation and artificial intelligence.

Powered by n8n, Elastic, Caldera, TheHive, and LLMs, this orchestration requires zero manual effort after launch. It continuously fetches and updates APT profiles, executes attack techniques, and analyzes detection logs in the alerting system. If a technique is not detected the system checks SIEM logs, if the activity is logged, it suggests a Sigma use case. If both detection and logging are absent, the system recommends configuration adjustments to ensure future visibility.

In addition, security teams no longer need to manually perform Threat profiling to select the correct adversary TTPs. The system analyzes the target organization&#8217;s landscape and intelligently suggests the most relevant APT attack scenarios, or allows users to select one.

 The final output is a comprehensive report detailing the detection rate, logging rate, technique descriptions, and recommendations to enhance visibility by suggesting new Sigma rules and refining logging configurations.

This is not just another attack simulation tool, it&#8217;s a scalable and flexible AI-driven automation workflow that can be adapted depending on the technologies in your environment while continuously optimizing detection, helping defenders stay ahead of evolving threats.</abstract>
                <slug>bsidesluxembourg-2026-84864-goodbye-purple-team-hello-purple-bots</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='86072'>Patrick Mkhael</person><person id='93851'>Ralph El Khoury</person>
                </persons>
                <language>en</language>
                <description>AI and automation are powerful technologies that can be leveraged to enhance both offensive and defensive security strategies. This talk unveils a fully automated, AI-driven purple teaming Proof of Concept framework that simulates real-world APT attacks, evaluates detection capabilities, and enhances security defense, all in real time.

Join us as we unveil the next frontier of AI-driven adversary simulation framework, where offense and defense merge into an intelligent, automated cycle of continuous security enhancement.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links>
                    <link href="https://docs.google.com/presentation/d/17vYUiEbSEt5L05LFv9q1GDsx4x4o24xE/edit?usp=sharing&amp;ouid=115776622804364734079&amp;rtpof=true&amp;sd=true">Presentation</link>
                </links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/JRZGUH/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/JRZGUH/feedback/</feedback_url>
            </event>
            <event guid='5bcaa265-f28e-506c-86a5-cda40cff65c7' id='92380' code='PWCYXA'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Ferrari without fuel: Exorcise GIGO out of Logs Management</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T16:20:00+02:00</date>
                <start>16:20</start>
                <duration>00:40</duration>
                <abstract>Many SOCs invest into powerful Risk&amp;AI-based tools to generate and classify their alerts to &quot;**clear-out the noise**&quot; and **pin-point actual &quot;value&quot; out of the massive amount of data** they collect. It is not a secret that nowadays we&apos;re collecting on SIEM more data than we&apos;d ever thought possible decades ago, **most of which are of no real operational relevance**. Some even say &quot;SOC is dead&quot; as this model isn&apos;t humanly bearable. Some also offer flashy magic wands that may solve all these issues in a painless plug&amp;play way, while at the same time magically reducing cost (or not).
What&apos;s the solution, then? **Agentic-AI? Data Lakes? Cloud-first?** All valuable solutions, but there&apos;s **something we can also do upstream**: _On top of trying to clean a dirty river, decrease its source pollution_.

This approach allows also to **mitigate a lesser known risk, yet very serious**: **_unknown unknowns in data collection_**. In the same way alert-fatigue is correlated with False Positives figures/ratio, most CyberSecurity departments focus on the unsustainability of telemetry volumes and forget about False Negatives, hence the **useful logs you should be collecting but don&apos;t know you don&apos;t have**. _Caring for your car&apos;s longevity / performances means also not assuming any fuel would do and hope for the best_.

Our solution: **Governance and Data Quality**. It&apos;s not a coincidence that NIST recently added this as a new pillar into its CSF. With the &quot;**Identify**&quot; pillar you get &quot;informed&quot; decision, yet it&apos;s &quot;Governance&quot; that gives the &quot;**deliberate**&quot; element on what to collect, why, and if it&apos;s enough. Having no Logging Data-Compliance framework, or having one that doesn&apos;t take into account **business values** (e.g. BIA, crown-jewels, investments) ultimately results in **building Security Monitoring on sand**, or focusing in scopes that are so narrow that only security may benefit from it, fueling the &quot;working in silos&quot; approach and goes against the &quot;holistic observability&quot; and &quot;management buy-in&quot; elements.</abstract>
                <slug>bsidesluxembourg-2026-92380-ferrari-without-fuel-exorcise-gigo-out-of-logs-management</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='92618'>Stefano Amodio</person><person id='92652'>Elliot Parsons</person>
                </persons>
                <language>en</language>
                <description>**Why this talk**
How many times you&apos;ve been asked to onboard logs on a SIEM just by &quot;opening the flows&quot;, without any validation? Or even develop alerts on already provided logs without questioning them? Has any PenTest or Red Team exercise highlight that you had no visibility (let alone alerting) over certain actions, despite &quot;you had the logs&quot;? Have you ever saw a truncated log or one coming from the future? Or a logout without its previous login?

Nowadays, there is no golden standard for baseline or maturity assessments on log collection / coverage, except a few governmental exceptions (e.g. OMB M-21-31) or highly prescriptive yes/no audit-level compliance frameworks that don&apos;t meet the granular level needed to &quot;plug&quot; logging and detection/analysis seamlessly (e.g. NIST SP 800-53 AU Family). This is the same from developers&apos; &quot;**Security by Design**&quot; perspective, where best practices exist for narrow scopes but may not be ultimately enforced (e.g. OWASP Logging Cheat Sheet).

Historically, &quot;security&quot; has often been treated as an elite craft and a compliance checkbox - fertile ground for buzzwords and &quot;magic wand&quot; tooling narratives. Our experience is that every time the solution is &quot;just a new tool&quot; an analyst dies (joke intended; right?). &quot;Magic wands&quot; do not exist. A tool can help, but it cannot replace understanding: normal vs. corner cases, environment constraints, and informed decisional context.
This matters because the industry repeatedly shows that SIEM programs are fragile in practice: expensive volumes ingestion, yet broken detections, missing fields, parsing issues, and alerts overload. 

**Our thesis: &quot;shift-left&quot; inside the SOC**
Instead of starting from &quot;alerts&quot; and hoping SOAR + AI/LLMs will fix the rest (sometimes scaling more confusion than value), we shift-left by making upstream telemetry complete, useful, and normalized - the foundations of reliable detection engineering. We do so by enforcing a &quot;Compliance Data Model&quot; that is both the output of SIEM engineers and the input for Detection Engineers, a meeting point to build Use Cases on even when you don&apos;t have the logs (yet), and SIEM-vendor-agnostic.

We will deep-dive into:
&#8226; **Logs Management as a discipline / requirement**: end-to-end process of collecting, storing, processing/normalizing, **validating**, and monitoring log data, ultimately making sure &quot;**it represents reality**&quot; - as opposed to the common &quot;hydrant approach&quot; of indiscriminately turning on a firehose of logs and assuming the job is done (e.g. &quot;I&#8217;ve opened the flow. Are you getting some logs now? Yes? Great, we&#8217;re done&quot;).
&#8226; **Security Monitoring as a practice that is highly dependent on Logs Management**, either in its automated form (Use Case Management, UBA, etc.) and/or in its manual one (&quot;free-dive&quot; or Hypothesis-based Threat Hunting, etc.), regardless of the framework you may be using (e.g. OpenTide, MITRE, FI-ISAC NL MaGMa).
&#8226; **Visibility Depth vs Width**: many environments feel &quot;well integrated and monitored&quot; simply because a type of logs is collected from all hosts, but when laying out a matrix of which other logs are collected from where, and if they&apos;re normalized, a clear &quot;**wide-but-shallow**&quot; image shows up, and suddenly nobody agrees what &quot;critical app alerting&quot; means without app owners at the table.
&#8226; **Bridging the gap - Log Schema vs. Policy**: Deciding what to log (a logging policy) is just as important as how to structure it (a data schema / taxonomy). Many teams adopt common schemas like **Splunk CIM, OCSF, Elastic ECS, Microsoft ASIM**, etc. to **normalize** fields, which is important and ensures consistency, but they **cannot be used alone to audit visibility gaps**. If you never send a particular log type to your SIEM, the schema won&#8217;t complain, and even if you count the number of success/failures or logs with &quot;username&quot; or other fields, the **Logging Policy** (and thus upstream checks) is still needed to **set expectations** and **understand what is normal vs. anomalous.**

Useful resources for companies to draft their own Logging Policy are:
&#10148; **Prescriptive Standards**: **OMB M-21-31** (U.S. federal logging requirements, which explicitly lists log categories and retention periods agencies must collect for each security tier), **NIST SP&#160;800-53** (Audit &amp; Accountability controls, that mandates specific events that systems must log as a baseline), and **CIS Critical Security Controls** (especially Safeguard&#160;8.2, enumerating essential logs to collect to support security monitoring).
&#10148; **Threat-Informed Frameworks**: **MITRE ATT&amp;CK** provides a matrix of **data sources** needed to detect various adversary techniques at a high level. MITRE&#8217;s open-source DeTT&amp;CT can help score your log coverage. Even SIGMA rules include a &quot;logsource&quot; definition as requirement, although very high-level. CTI-based frameworks like Drago&apos;s CMF (Collection Management Framework). If you have an Attack Range Lab, more technical resources from PenTesters / Red-Teamers can be leveraged, like Atomic Red Team, testing techniques and adjusting logs verbosity up until meaningful activity is logged.
&#10148; **Application Layer Logs**: Logging isn&#8217;t just an IT operations concern; it starts with developers. We reference the **OWASP Logging Cheat Sheet** (and similar app-security guidance) which outlines what security-relevant events applications should generate - for example, input validation failures, authentication successes/failures, and access control violations. This highlights that effective logging requires collaboration between the Security/SOC and development teams (not just red&amp;blue teams).
&#10148; **Business Context**: Above compliance standards and threat frameworks are inherently generic. They assume all servers, applications, and data are equally important, or they focus solely on the likelihood of an attack. What they completely miss is the Business Impact (e.g. BIA - Business Impact Analysis, FAIR - Factor Analysis of Information Risk) - which is the exact language the Board of Directors (BoD) speaks. Each organization should craft a Logging Policy/Framework tailored to its unique context - considering its business model, &quot;crown jewel&quot; assets, regulatory requirements, and mix of IT vs. OT systems. For example, onboarding and normalizing upfront logs that grant visibility over a big project could provide Exploratory Data Analysis (EDA) capabilities and even give the opportunity to spot issues or misconfigurations before they happen, bringing unexpected added-value / ROI to top management and ultimately granting stronger mandates and economics internally in the organization (e.g. &quot;We noticed 40% of users are dropping off at this specific transaction point because of a backend timeout, impacting revenues&quot; or &quot;There is a misconfiguration causing the app to query the database 50 times per second per user, increasing API costs&quot;). Bringing those findings to management means transitioning Security from a &quot;cost center&quot; to a &quot;business enabler&quot;, providing QA and operational intelligence, not just blocking hackers.


**Disclaimer**
We acknowledge that not every organization can overhaul its logging overnight - real-world constraints exist. The session emphasizes incremental improvement and trade-offs, helping each attendee identify a few high-impact &quot;logging wins&quot; they can pursue back at work. We&#8217;re not promising a silver bullet (that would go against the entire premise!); instead, attendees will leave with fresh perspectives and actionable frameworks to gradually turn their own &quot;Ferrari&quot; into a well-fueled security machine.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links>
                    <link href="https://cheatsheetseries.owasp.org/cheatsheets/Logging_Cheat_Sheet.html">OWASP Logging Cheat Sheet</link>
                
                    <link href="https://csf.tools/reference/nist-sp-800-53/r5/au/">NIST SP 800-53, Revision 5 - AU: Audit and Accountability - Logging Compliance</link>
                
                    <link href="https://cybersecuritynews.com/best-practices-for-event-logging-threat-detection/">NSA&#x27;s Best Practices for Event Logging &amp; Threat Detection</link>
                
                    <link href="https://docs.cloud.gov/platform/compliance/m-21-31-compliance/">CISA / OMB M-21-31 Logging Compliance</link>
                
                    <link href="https://dragos.brightspotcdn.com/25/7d/1b77156441439a1914f82867af21/collection-management-frameworks-for-ics-12-18.pdf">Drago&#x27;s Collection Management Framework (CMF) - Methodology for prioritizing and managing information sources in cyber threat intelligence</link>
                
                    <link href="https://en.wikipedia.org/wiki/Garbage_in,_garbage_out">GIGO - Garbage IN, Garbage OUT</link>
                
                    <link href="https://www.elastic.co/blog/m-21-31-logging-compliance-challenges">Elastic.co on OMB M-21-31 Logging Compliance</link>
                
                    <link href="https://www.linkedin.com/posts/floroth_just-built-a-demo-monitoring-matrix-for-activity-7426163713130377216-18t1/">Florian Roth on wide-but-shallow visibility</link>
                
                    <link href="https://www.redhotcyber.com/post/il-soc-e-morto-lintelligenza-artificiale-sta-riscrivendo-la-cybersecurity/">SOC is Dead - AI is rewriting CyberSecurity (ITA)</link>
                
                    <link href="https://www.sans.org/posters/detection-engineering">SANS Hybrid Data Collection Strategy</link>
                </links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/PWCYXA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/PWCYXA/feedback/</feedback_url>
            </event>
            <event guid='cf29cf9e-1238-55c3-8ef6-859322b995f5' id='88370' code='C93MZK'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>The whistles go woo woo: SIEM alerts, threat detection and tuning unnecessary noise</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T17:00:00+02:00</date>
                <start>17:00</start>
                <duration>00:40</duration>
                <abstract>Security teams don&apos;t miss alerts because they don&apos;t care, they miss them because their SIEM never shuts up. Alerts fire constantly, at the wrong time, for expected behavior, until everything starts to sound the same. At some point, it&apos;s no longer an alarm. It&apos;s just noise.

This talk starts with a simple idea: when an alert fires matters just as much as what it detects. Like a whistle blaring at 2 a.m., many detections technically work, but fail operationally because they lack timing, throttling, or basic context. Alerts trigger during business hours, outside meaningful windows, or so often that everyone learns to ignore them.

Using practical examples, we&apos;ll look at common alerting mistakes, why &quot;more alerts&quot; doesn&apos;t mean better security, and how small changes, such as throttling, prioritization, and temporal context, can dramatically reduce noise.

From there, we&apos;ll walk through what alerts actually matter across application, network, Active Directory, and DNS telemetry, and how to design them so they fire when someone should actually care. The goal isn&apos;t silence, it&apos;s a SIEM that acts like an alarm clock, not a whistle that goes &#8220;woo woo&#8221; all night.</abstract>
                <slug>bsidesluxembourg-2026-88370-the-whistles-go-woo-woo-siem-alerts-threat-detection-and-tuning-unnecessary-noise</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='87302'>Melina Phillips</person>
                </persons>
                <language>en</language>
                <description>When then whistles go woo woo:
I typically like to start my presentation with a short story, a news article or some known fact and correlate it to the main topic.

In the early 2000s, residents in Seattle started complaining about a strange problem: cars driving through neighborhoods late at night, fitted with exhaust whistles so loud they could wake an entire block. 
When asked about the noise, one explanation stuck: the whistles go &quot;woo woo&quot;&#8230; but only in the morning. The noise wasn&#8217;t dangerous, but it was constant, badly timed, and impossible to ignore.
Twenty years later, many security teams are dealing with the same problem, just with SIEM alerts instead of cars. If this feels familiar, it should. Many SIEMs do the exact same thing: alerts firing constantly, without timing or context, until everything sounds urgent and nothing actually is.

Wait, what are we doing here?
Brief explanation of contextual alerting for SIEM implementations.

Drawing parallels:
Noisy SIEMS vs The Whistles

Okay but how does SIEM obtain data:
Log collection and aggregation

How do I know what I want my SIEM to alert me on?
Knowing what you want your SIEM to alert on starts with understanding what actually requires action. Alerts are not meant to document everything that happens in an environment, they exist to interrupt you when something needs attention. If an alert does not change a decision, a response, or a priority, it probably does not need to exist.

	- Unusual or anomalous behavior
	- Known IOCs
	- Signs of Privesc or lateral movement
	- Indicators of Data exfil
	- Repeated or unsuccessful actions.
	- Unusual application activity
	- Endpoint behavior
	- Compliance violations
	- Threat hunting
	

When alerts stop being alerts:

	&#8226; Alerts aren&apos;t ignored because analysts are lazy
	&#8226; They&#8217;re ignored because everything fires
	&#8226; When every event is &quot;urgent&quot; nothing actually is
	&#8226; Noise trains people to stop reacting.
	&#8226; American Horror Story: MSSP - sharing a story of when I worked for an MSSP and I saw some awful things with SIEM alerting.

Timing Matters More Than You Think
	&#8226; Alerts without time context are misleading
	&#8226; Expected behavior during business hours &#8800; malicious at 3 a.m.
	&#8226; The same signal can mean very different things depending on when it happens

Key learning:
When an alert fires is part of the detection logic, not an afterthought.

Throttle the noise before you add more alerts
	&#8226; Repeated alerts for the same behavior don&apos;t increase security
	&#8226; They just increase annoyance
	&#8226; Throttling prevents the SIEM from screaming about the same thing every five minutes

Examples: 
	&#8226; &quot;Alert once per user per time window&quot;
	&#8226; &quot;Suppress repeats unless behavior changes&quot;
	&#8226; &quot;Escalate only if it keeps happening&quot;


Context turns noise into signal
	&#8226; Raw events is not the same as actionable alerts
	&#8226; Alerts need:
		&#9675; user context
		&#9675; system role
		&#9675; expected behavior
		&#9675; related activity
Without context:
Everything looks suspicious.
With context:
You know what actually matters.


Designing your SIEM alerts:
	- Focus on high risk scenarios
	- Tune alerts over time
	- Use correlation rules
	- Threat intelligence is your bestie
	- Context is key


Alert prioritization:

Alert prioritization isn&apos;t about deciding what&#8217;s &quot;important&quot; on paper, it&apos;s about deciding what deserves attention right now. When everything is marked high priority, teams stop trusting the system. Good prioritization accepts that not all alerts are equal, and that urgency depends on timing, context, and impact. A SIEM that understands this doesn&apos;t shout, it speaks when it actually matters.
	- Critical:  Imminent high impact threat such as ransomware or a data breach.
	- High: Potential impact on core business operation or sensitive systems and direct evidence of malicious activity.
	- Medium: Unusual activity that could potentially be a threat
	- Low: Minor issue, security violation or potential false positive.


What logs do I need?

Deciding what logs you need is not about collecting everything, it is about collecting what helps you answer questions later. Logs should support detection, investigation, and response, not just exist for visibility. When logging is intentional, alerts become easier to design and noise becomes easier to control.

1. Windows Logs
2. Network Logs
4. Endpoint Detection and Response (EDR) Logs
5. Identity and Authentication Logs
6. Threat Intelligence Logs
7. Compliance and Audit Logs


Scrum for SIEM maintenance:

Knowing what you want your SIEM to alert on is not a one time decision, it is an ongoing process. Environments change, attackers change, and so does what actually deserves attention. Treating SIEM maintenance like a sprint forces teams to regularly ask what worked, what created noise, and what genuinely helped detect risk. Instead of reacting to every alert, the focus shifts to continuously refining what is worth waking someone up for.

	- Define your scrum team (owner, scrum master and development team. Yes, it all applies even if it&apos;s not a software development environment).
	- Create a &quot;product backlog&quot; (actionable items).
	- Sprint planning (high risk priority tasks).
	- Daily stand ups (share updates).
	- Sprint Review (showcase deliverables).</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments>
                    <attachment href="https://pretalx.com/media/bsidesluxembourg-2026/submissions/C93MZK/resources/whis_jqtDedU.pdf">Presentation draft. It&#x27;s in progress and it will be heavily improved.</attachment>
                </attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/C93MZK/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/C93MZK/feedback/</feedback_url>
            </event>
            <event guid='c408b37c-8cfc-5023-977b-d4f3b3aba1f4' id='88181' code='QJN3VK'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>From Manual Hunt to Mass Detection: Weaponising Nuclei Against Phishing</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T17:40:00+02:00</date>
                <start>17:40</start>
                <duration>00:30</duration>
                <abstract>Phishing is still the dominant attack vector, but detecting malicious sites at scale is difficult. This talk shows how open-source automation can make phishing detection fast and proactive. Using real examples from 200+ Nuclei templates, attendees will learn detection methods, template creation, and practical threat intelligence and OSINT use cases.</abstract>
                <slug>bsidesluxembourg-2026-88181-from-manual-hunt-to-mass-detection-weaponising-nuclei-against-phishing</slug>
                <track></track>
                
                <persons>
                    <person id='86678'>Rishi (@rxerium)</person>
                </persons>
                <language>en</language>
                <description>Phishing remains the dominant attack vector, yet detecting malicious sites at scale continues to challenge security teams. This talk demonstrates how open-source automation can transform phishing detection from a manual, reactive process into a scalable, proactive capability.

I developed and contributed 120+ phishing detection templates to the Nuclei project, enabling security teams worldwide to identify phishing sites impersonating major brands across thousands of hosts in seconds. In this session, I want to share this technique with attendees, covering the detection methodology, template creation, and practical applications for threat intelligence and OSINT research.

A live demonstration will showcase the approach in action, and attendees will leave with the knowledge to build their own detection capabilities using freely available tools.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/QJN3VK/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/QJN3VK/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='IFEN room 2, Workshops and AI Security Village  (Building D)' guid='a18bb72e-a1ae-5ea3-acfa-8ddd1c6b0d44'>
            <event guid='746d2514-7cb9-5ddf-a227-01d236d4f09a' id='92446' code='Q7CEUD'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>AI and Cryptography for Evasive Malware</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>00:35</duration>
                <abstract>As AV/EDR systems evolve to detect behavioral anomalies, offensive tradecraft must adapt beyond static obfuscation. This talk explores the convergence of Artificial Intelligence and advanced Cryptography in the development of next-generation evasive malware. We will move past traditional packing techniques to examine how lighweight LLMs and cryptographic primitives can be integrated directly into the malware lifecycle.

You will gain insight into:
- AI-Driven Polymorphism: Utilizing embedded or cloud-based AI agents to dynamically rewrite logic and variable structures at runtime, rendering signature-based detection obsolete.
- Cryptographic Context-Awareness: Implementing environmental keying and mathematical &quot;logic locking,&quot; where payloads remain cryptographically sealed until specific environmental conditions (verified by AI logic) are met.
- Entropy Reduction: Techniques to make encrypted payloads statistically indistinguishable from benign data or natural language using AI-generated steganography.

This talk bridges the gap between theoretical mathematics and practical weaponization, demonstrating how free, open-source AI models can be weaponized for stealth, and conversely, how defenders can prepare for the age of &quot;thinking&quot; malware.</abstract>
                <slug>bsidesluxembourg-2026-92446-ai-and-cryptography-for-evasive-malware</slug>
                <track>AI Security Village</track>
                <logo>/media/bsidesluxembourg-2026/submissions/Q7CEUD/image_s8htaua.webp</logo>
                <persons>
                    <person id='92537'>cocomelonc</person>
                </persons>
                <language>en</language>
                <description>Modern EDR and XDR solutions have moved the goalposts. Static signatures are a relic of the past; today&#8217;s fight is against behavioral telemetry and ML-driven heuristics. To survive on a target host, offensive tradecraft must evolve. This practice-oriented talk demonstrates how the convergence of Artificial Intelligence and non-standard Cryptography creates a &quot;thinking&quot; malware capable of adapting to Windows, Linux, and macOS environments.

We move beyond simple packing to explore a specialized Adversarial Dev Loop. By integrating lightweight LLMs and rare cryptographic primitives (Skipjack, Speck, Mars, Lucifer, Camellia), we demonstrate how to build malware that interviews its environment before revealing its true nature.

What you will learn through live demos and code analysis:
- The AI-Mutator Loop: How to use local AI agents to perform automated source-level polymorphism. I will demonstrate C/C++ code that rewrites its own logic, variable structures, and API resolution patterns for every new &quot;build,&quot; making hash-based and static ML detection impossible.

- Cross-Platform Residency: A deep dive into modern persistence - from macOS Dylib hijacking and WatchPaths to Linux eBPF-based hooks and Windows service subversion - all protected by Environmental Keying. I will show how payloads remain cryptographically sealed until AI-logic verifies the &quot;DNA&quot; of the target machine.

- Rare Crypto vs. Entropy Scanners: Why standard AES/ChaCha20 is a red flag. We will implement &quot;forgotten&quot; algorithms to bypass entropy-based detection and show how to use AI to generate &quot;Natural Language Steganography&quot; - hiding exfiltrated data inside AI-generated text that passes through Deep Packet Inspection (DPI) unnoticed.

- Breaking the Sandbox: Real-world examples of AI-driven sandbox detection. We demonstrate implants that exhibit &quot;benign mimicry&quot; when a virtualization artifact is detected, effectively poisoning the training data of automated sandboxes.

This talk isn&apos;t about theoretical future threats; it&apos;s about the weaponization of free, open-source AI models available today. Whether you are a Red Teamer looking to bypass top-tier EDRs or a Blue Teamer trying to understand the next wave of &quot;smart&quot; malware, you will leave with the C/C++ PoCs and forensic insights needed to operate in the age of the thinking malware.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/Q7CEUD/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/Q7CEUD/feedback/</feedback_url>
            </event>
            <event guid='a013d8dd-86d3-585c-aa8e-dafc5e60103b' id='85259' code='CDJP3Z'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Death By Pickle: &quot;Python&apos;s Betrayal ML&quot;</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T09:35:00+02:00</date>
                <start>09:35</start>
                <duration>00:40</duration>
                <abstract>In the original Matrix movie, Neo learned Kung Fu through an upload.  Imagine if your ML could learn the same way.  That&apos;s what a pickle file does for ML - &quot;I KNOW KUNG FU&quot; or whatever was in the file that was supposed to be &quot;learned&quot; by your ML model.
What if there was a plot twist where Agent Smith tampered with the Kung Fu module so that it included a fun &quot;bonus&quot; lesson that &quot;taught&quot; Neo to call Agent Smith every time he was   trying to find an exit?
That&apos;s what&apos;s happening in Pickle Files, and that&apos;s the setup for ML and AI.

This talk will step through the threat, some examples, and emerging detection capabilities.  You will KNOW Kung Fu when it&apos;s over.</abstract>
                <slug>bsidesluxembourg-2026-85259-death-by-pickle-python-s-betrayal-ml</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='86386'>Kadi McKean</person><person id='86387'>Frithjof Hoffmann</person>
                </persons>
                <language>en</language>
                <description>In The Matrix, Neo learns Kung Fu through an upload. In ML, pickle files let models &apos;learn&apos; similarly. But what if Agent Smith tampered with the module? That&apos;s what&apos;s happening in pickle files&#8212;malicious code can sneak in. This talk covers the threat and detection techniques. You&#8217;ll KNOW Kung Fu!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/CDJP3Z/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/CDJP3Z/feedback/</feedback_url>
            </event>
            <event guid='c7468f8a-893d-5685-8c28-fbd4a846e7db' id='89611' code='YTUTGD'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>What Does Threat Modeling Solve for AI Security?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T10:35:00+02:00</date>
                <start>10:35</start>
                <duration>00:40</duration>
                <abstract>AI rarely creates entirely new classes of risk. More often, it amplifies weaknesses that already exist in complex systems where architecture, data, and business decisions are tightly coupled. What changes is not the threat itself, but its reach, speed, and impact.

This session shows how threat modeling can be used as a leverage point in two parallel dimensions, in a way that remains accessible to newcomers while still grounded in real-world practice. On the technical side, threat modeling is presented as a concrete decision tool: identifying realistic attack paths, clarifying what actually needs to be tested, and guiding focused actions such as pentest scoping and security control prioritization. The emphasis is not on exhaustive models, but on developing the right security reflexes early, understanding where small inputs can create large business consequences.

In parallel, the same threat model is used as a framework validation layer. Instead of treating compliance as a documentation exercise, threat modeling helps explain how and why controls are applied where risk actually exists. Using approachable examples aligned with ISO 27001, the AI Act, and NIS2 expectations, the session demonstrates how threat modeling supports compliance efforts by making security decisions explicit, traceable, and defensible.

The session is designed for beginners and practitioners in application security, threat modeling, or software engineering, and assumes familiarity with AppSec and SDLC concepts. The focus is not on theory or abstract AI threats, but on real systems, plausible attackers, and practical threat models that help bridge technical security decisions and regulatory expectations from the start.</abstract>
                <slug>bsidesluxembourg-2026-89611-what-does-threat-modeling-solve-for-ai-security</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='90031'>Nathan Pembe</person>
                </persons>
                <language>en</language>
                <description>0&#8211;5 min : Context setting: Where AI really fits in the SDLC

The session starts by clarifying a frequent source of confusion: securing AI versus using AI for security. Using concrete system examples, I explain how AI is introduced into existing architectures and why it increases coupling between data, identity, APIs, and business workflows. The goal is to ground the audience in a system-level view before discussing threats. This section is fully accessible to beginners and does not assume prior AI security knowledge.

5&#8211;10 min ; Why AI Feels Destabilizing at System Level

This section explains why AI adoption often makes risk harder to reason about. AI does not introduce chaos by itself; it amplifies risk across an already uncontrolled attack surface. Using visual system comparisons, I show how adding AI components increases the blast radius of existing weaknesses (identity, APIs, data access, monitoring gaps). The key objective is to shift beginners away from &#8220;AI-specific threats&#8221; toward ecosystem-level risk thinking.

10&#8211;20 min : Scenario 1 (Technical Track): Testing Without Knowing Why

The first main scenario focuses on a realistic AI-driven e-commerce system where an ML recommendation engine directly impacts revenue. I walk through a common security dilemma: a limited pentesting budget with no shared understanding of what actually matters.
Step by step, I introduce a lightweight threat modeling approach:

- drawing a simple system diagram,
- identifying threat actors,
- reasoning in layers (Matryoshka-style): supply chain, network/APIs, identity, crown jewels, and mapping attack paths to business impact.

This leads to a concrete outcome: a risk-driven pentesting strategy that clearly differentiates deep testing, standard testing, and low-return testing areas. Beginners see how threat modeling directly informs technical decisions instead of producing abstract documentation.

20&#8211;30 min : Scenario 2 (Framework Track): Threat Modeling as a Compliance Validator

The second scenario shifts focus to compliance and governance challenges. I present a situation where multiple teams claim compliance (secure coding, code reviews, pentests), yet cannot demonstrate why controls are effective.

Using an ISO 27001 control (secure coding), I show how threat modeling reframes the question from &#8220;do we have this control?&#8221; to &#8220;where would insecure code actually hurt us?&#8221;. A concrete threat scenario is built around an input processing service in front of an ML model, illustrating how business-impacting abuse can occur even when traditional controls exist.

This logic is then extended to broader regulatory expectations (AI Act, NIS2): threat modeling provides a structured way to justify controls, expose blind spots (e.g., missing abuse-case testing or decision integrity checks), and explain partial compliance in a defensible manner.

30&#8211;35 min : Key Takeaways and Practical Guidance

I conclude by explicitly tying both tracks together. The same threat model supports: technical security decisions (what to test, where to invest effort), and compliance justification (why controls exist and what risk they mitigate).

The final takeaways focus on what beginners can apply immediately: modeling change rather than entire systems, prioritizing reachable attack paths, and using threat modeling as a living practice rather than a one-time deliverable.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YTUTGD/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YTUTGD/feedback/</feedback_url>
            </event>
            <event guid='69cf45b6-ab86-5fee-9c96-207a6960bed8' id='89159' code='GLKSMY'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Talk to a Shell : Exploiting AI agent in Real Time</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>00:30</duration>
                <abstract>AI agents are no longer simple chatbots&#8212;they&apos;re autonomous systems equipped with powerful tools including shell access, file operations, and database queries. But what happens when an attacker asks nicely?

In this talk, we present a real-world vulnerability discovered in a production AI platform where we achieved full system command execution through natural language conversation. Starting with simple reconnaissance. When the AI initially denied access, we researched and deployed a jailbreak technique that bypassed safety guardrails&#8212;all through conversation.

The result? Reading /etc/passwd, enumerating system information, and letting the AI run reconnaissance commands for us. No credentials. No exploits. Just conversation.

Attendees will learn:
- How AI agent architectures create new attack surfaces
- Practical jailbreak techniques for tool-enabled LLMs
- The &quot;Confused Deputy&quot; problem in AI systems
- Defense strategies for securing AI agents</abstract>
                <slug>bsidesluxembourg-2026-89159-talk-to-a-shell-exploiting-ai-agent-in-real-time</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='88891'>Parth Shukla</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/GLKSMY/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/GLKSMY/feedback/</feedback_url>
            </event>
            <event guid='7bf1e196-30bc-5d61-be04-6253e7cb3563' id='92261' code='LBYZCG'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Teaming, Trust, and Threats: How Humans Interact with Generative AI in Security</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T14:00:00+02:00</date>
                <start>14:00</start>
                <duration>00:40</duration>
                <abstract>Generative AI may not yet be stealing everyones jobs, but it is already impacting the way that we interact with computers, with important implications for cybersecurity. Difficult tasks like network analysis, social engineering defense, and writing safe software will require humans and AI to form teams while relying on mutual trust, and an understanding of the threats posed by the misuse of AI by bad actors.  This talk explores research in Human-Computer Interaction applied onto understanding teaming, trust, and threats of Generative AI in cybersecurity.</abstract>
                <slug>bsidesluxembourg-2026-92261-teaming-trust-and-threats-how-humans-interact-with-generative-ai-in-security</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='92495'>Tailia Malloy</person>
                </persons>
                <language>en</language>
                <description>In this talk, I will present research in Human Computer Interaction focusing on how people use Generative AI technologies like ChatGPT, Google&apos;s Gemini, and Antrhopic&apos;s Claude in cybersecurity contexts. This will begin with background in computational cognitive modeling, and how it is related to cybersecurity in my research. Next I will describe my past research into how these models of human learning onto designing better AI systems for anti-phishing social engineering training and network analysis recommendations. Finally, I will discuss my current and future research in human interaction with LLM agents applied on to software engineering and spear-phishing website generation.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/LBYZCG/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/LBYZCG/feedback/</feedback_url>
            </event>
            <event guid='7660af63-095e-5645-a475-2cdb0584e27f' id='91904' code='QW3PJK'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>The Agents of Chaos: AI Driven Malware Generation</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T14:40:00+02:00</date>
                <start>14:40</start>
                <duration>00:40</duration>
                <abstract>With the use of AI agents catching wind across the offensive security space, from phishing, to fuzzing and penetration testing, it was inevitable that malware would follow suit. While most discussions focus on using AI to generate malicious payloads at the malware&#8217;s runtime, or &quot;vibe coding&quot; it, we went a step further: we built a system where AI is the sole participant in the malware creation process itself.
We will begin by talking about how we got to this point, what sparked the idea, and jump into comparing different models - showing which gave the best code, which was most evasive, which prompts worked the best, and what we used in the agent.
We will then dig into the generation process itself &#8211; we will show the challenges with earlier implementations, and how we solve them, how to build the workflow to maximize the malware&#8217;s capability and randomization, and even how it managed to break signatures.
We will finish by showing how the resulting malware is performing, comparing different samples, and showing how each sample defeated several static malware analyzers, as well as talk about what&apos;s next for this agent, and what&apos;s next in the domain of AI-generated malware.</abstract>
                <slug>bsidesluxembourg-2026-91904-the-agents-of-chaos-ai-driven-malware-generation</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='91963'>Arad Donenfeld</person>
                </persons>
                <language>en</language>
                <description>Modern AI systems have moved far beyond rule-based automation and are now capable of generating complex, functional software. While most discussions focus on productivity benefits like code generation and vibe coding, the same capabilities can also be applied to offensive security. This session explores a research project that examines how AI models can be orchestrated to autonomously generate new malware samples, and what this means for both attackers and defenders.

The talk focuses on understanding the process and experimentation space behind AI-driven malware generation: how model behavior changes depending on prompts, model selection, validation workflows, and code restructuring techniques.

The main things that are explored in the presentation:

**Prompt design and task framing (what the model is asked to do)**
Directly asking a model to write ransomware often fails due to safety controls or poor results. By reframing tasks, such as generating behavioral descriptions first and then implementing them in code, it becomes possible to produce working implementations while avoiding many common failure modes.

**Model selection and orchestration (which models do what)**
Different models excel at different tasks. The agent combines uncensored local models for unrestricted generation, stronger coding models for fixes, and remote models for validation. This multi-model approach improves reliability compared to relying on a single model.

**Automated generation and validation loops (ensuring working output)**
Generated code is automatically compiled, tested, and fed back into models when errors occur. This loop allows the system to fix compilation issues, improve functionality, and rely on working samples without manual intervention.

**Code diversity and detection evasion (how &#8220;new&#8221; samples are created)**
By allowing models to choose different implementations, encryption methods, structures, and even programming languages, each generated sample can look structurally different while doing relatively the same task.

**Feature expansion (beyond basic malware behavior)**
When prompted appropriately, models sometimes add additional behaviors such as persistence, system discovery, evasion checks, or data exfiltration attempts, demonstrating how AI can generate increasingly complex malware variants.

What can you gain from this

- A practical view of how AI models can be chained together to generate functional malware samples.

- An understanding of how prompts, model choice, and validation workflows affect output reliability and detectability.

- A framework that researchers and defenders can use to generate diverse samples for testing detection systems.

While the presentation uses ransomware generation as the running example, the broader takeaway is about how generative AI changes the scale and variability of offensive tooling, and how the same techniques can also be leveraged by defenders to strengthen security systems.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/QW3PJK/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/QW3PJK/feedback/</feedback_url>
            </event>
            <event guid='7a68720c-eb9f-53c5-9b59-b56ab469a2d9' id='92577' code='TGFQH9'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>When LLMs Summarize Security Findings: The Tradeoffs You Can&#8217;t Ignore</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T15:40:00+02:00</date>
                <start>15:40</start>
                <duration>00:40</duration>
                <abstract>LLMs are often presented as a shortcut from &#8220;hundreds of findings&#8221; to &#8220;actionable summary.&#8221; In reality, getting useful and trustworthy output is less about a single prompt and more about understanding the knobs you can turn - and what typically happens when you turn them.

This talk uses vulnerability assessment results analysis as a concrete example task, but the goal is broader: a research-style exploration of the design space for LLM-assisted summarization. We&#8217;ll map the main control surfaces - goal definition, output constraints, input shaping, model selection, evaluation methods, and cost/latency budgets - and show how changing each one affects faithfulness, specificity, consistency, and failure modes.

The session offers a practical framework for experimenting safely: define measurable requirements, run iterative comparisons, and use structured judging to learn which combinations of knobs move you toward &#8220;useful&#8221; versus &#8220;confidently wrong.&#8221; Attendees leave with a repeatable way to reason about tradeoffs and a set of patterns they can apply to other security summarization problems.</abstract>
                <slug>bsidesluxembourg-2026-92577-when-llms-summarize-security-findings-the-tradeoffs-you-can-t-ignore</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='92790'>Andrey Lukashenkov</person>
                </persons>
                <language>en</language>
                <description>Security teams routinely face large vulnerability assessment reports that are rich in detail but hard to operationalize. LLMs look promising for making this information accessible, yet outcomes vary wildly: some summaries are crisp and helpful; others are vague, incomplete, or subtly inaccurate. This session is a research-driven tour of *why* that happens and *what you can control*.

The talk is not a &#8220;ship this to production tomorrow&#8221; story. It is a guide to the experimentation landscape - using vulnerability findings as an illustrative workload - focused on the knobs you can tune and the behaviors you should expect.

### The core idea: treat LLM summarization as a system with controllable parameters

We&#8217;ll explore six major knob categories:

1. Task framing (what &#8220;good&#8221; means)
    
If you don&#8217;t specify the purpose (e.g., executive risk overview vs. remediation triage vs. compliance-oriented highlights), the model will invent its own. We&#8217;ll discuss how tight vs. broad goals change output specificity and risk of omission.
    
2. Output constraints (how the answer must behave)
    
 Word limits, required sections, citation/evidence requirements, and &#8220;no new facts&#8221; rules are not cosmetics&#8212;they change error rates and the model&#8217;s tendency to hedge or hallucinate.
    
3. Input shaping (what the model actually sees)
    
The strongest lever is often preprocessing: deduplicating repetitive data, normalizing fields, extracting key evidence, compressing large reports into context-friendly representations, and moving deterministic operations (like counting/grouping) outside the model. This reduces failure modes and makes evaluation meaningful.
    
4. Model selection (speed, cost, and capability)
    
Different models fail in different ways. We&#8217;ll cover the practical implications of choosing &#8220;fast enough&#8221; versus &#8220;best possible&#8221; and what quality typically degrades first when you optimize for latency/cost.
    
5. Evaluation and judging (how you know it improved)
    
&#8220;Looks good to me&#8221; does not scale. We&#8217;ll outline a lightweight evaluation harness: a rubric that scores faithfulness, completeness, specificity, and usefulness; repeated runs to check consistency; and a structured judging approach to compare variants.
    
6. Iteration strategy (how you converge)
    
Prompt iteration works best when grounded in measurements. We&#8217;ll show a &#8220;vibe coding&#8221; loop that&#8217;s still research-minded: change one knob, rerun tests, observe shifts in failure modes, then decide whether the tradeoff is acceptable for the goal.    

### What attendees will take away

- A mental model of the main knobs available when applying LLMs to security summarization tasks
- Predictable &#8220;what happens when you turn it&#8221; patterns (which tweaks usually help, which create new failure modes)
- A repeatable experimentation framework for comparing prompts/models/input formats under real constraints
- A clear tradeoff map: reliability vs. speed vs. cost, plus the engineering consequences of tighter coupling to input structures

While vulnerability assessment results are the running example, the approach generalizes to other security contexts: incident write-ups, alert triage digests, control evidence summaries, and executive reporting.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/TGFQH9/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/TGFQH9/feedback/</feedback_url>
            </event>
            <event guid='d0e564b0-bec7-5629-9148-5dc54c962435' id='90759' code='D3T9SA'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Making a risk-informed LLM choice</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T16:20:00+02:00</date>
                <start>16:20</start>
                <duration>00:40</duration>
                <abstract>Every LLM has flaws. It&#8217;s been proven that the guardrails on every LLM can be bypassed. When you&#8217;re thinking about which ones to build your applications on, what are the key risks you need to be aware of?
In this talk, we will dive into our testing methodology for scanning the most popular LLMs for vulnerabilities where we generated hundreds of thousands of prompts across categories including prompt injection, malware, offensive language, and much more.

We&#8217;ll share our LLM risk matrix, and explain the best practices around minimizing the risk of hallucinations, malicious content, indirect prompt injection, and more as you build your LLM-powered applications.</abstract>
                <slug>bsidesluxembourg-2026-90759-making-a-risk-informed-llm-choice</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='90917'>Jeremy Snyder</person>
                </persons>
                <language>en</language>
                <description>Every LLM has risks, from malicious content generation to jailbreak, injection, misinformation and more. In this session, we&apos;ll discuss the approach that we used for categorizing the risk levels of the most popular LLMs that are available for application developers on the leading cloud platforms. We&apos;ll explain:

    What tools we used to do this testing
    How we use those tools
    What categories of problems we&apos;re able to identify
    How we turn the problems into understandable risk for developers and security practitioners to use for making decisions on which LLMs to adopt</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/D3T9SA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/D3T9SA/feedback/</feedback_url>
            </event>
            <event guid='2e876589-395c-510e-b844-d375f3f8e882' id='85885' code='F7UGVL'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Oh Shit I Accidentally Breached an Organization (or many) using AI</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T17:00:00+02:00</date>
                <start>17:00</start>
                <duration>00:40</duration>
                <abstract>In this session we are going to walk through how did one &quot;harmless&quot; search spiral into a multi-organization data breach and how did weaponized AI supercharge it into an even bigger leak of sensitive data.
In this session, we&#8217;ll unpack the whole story.</abstract>
                <slug>bsidesluxembourg-2026-85885-oh-shit-i-accidentally-breached-an-organization-or-many-using-ai</slug>
                <track>AI Security Village</track>
                <logo>/media/bsidesluxembourg-2026/submissions/F7UGVL/image_CTALa7q.webp</logo>
                <persons>
                    <person id='86969'>Panagiotis Fiskilis</person>
                </persons>
                <language>en</language>
                <description>During this session we are going to learn how we can weaponize AI for OSINT campaigns, how it can be used/abused by adversaries to perform spear phishing attacks (using the previously mentioned OSINT as a basis). We are going to talk about operational security considerations when weaponizing AI.
During this talk we are going to wear a purple hat by viewing the perspective of both an adversary and a defender.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/F7UGVL/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/F7UGVL/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='IFEN room 3 Workshops and AI Security Village (Building D)' guid='3ecced5f-5a05-593c-a612-364a5528f8d3'>
            <event guid='c388a02e-ccba-58c2-8329-5fef674090b6' id='93488' code='HY3QBJ'>
                <room>IFEN room 3 Workshops and AI Security Village (Building D)</room>
                <title>AI Security village - technical training and implementation</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-07T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>04:30</duration>
                <abstract>The technical track of the AI security village</abstract>
                <slug>bsidesluxembourg-2026-93488-0-ai-security-village-technical-training-and-implementation</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='88891'>Parth Shukla</person><person id='89865'>Nagarjun Rallapalli</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/HY3QBJ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/HY3QBJ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)' guid='6d57f409-6e10-5f49-9eb1-79fd7d149da7'>
            <event guid='1c73485f-2816-5370-ab3b-e895f9474034' id='90638' code='YGC7EA'>
                <room>Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)</room>
                <title>Dismantle The Bomb</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-07T10:00:00+02:00</date>
                <start>10:00</start>
                <duration>02:00</duration>
                <abstract>Dismantle the bomb by performng different taks</abstract>
                <slug>bsidesluxembourg-2026-90638-2-dismantle-the-bomb</slug>
                <track>Escape games!</track>
                
                <persons>
                    <person id='90958'>Stijn Tomme</person>
                </persons>
                <language>en</language>
                <description>Dismantle the bomb by performing different taks. The tasks will include:
- Solving ciphers
- Being genuine with a special flashlight
- lock picking 
- make a key with a lishi tool
- ...</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/feedback/</feedback_url>
            </event>
            <event guid='103df07c-102e-53b5-8bb6-6c1130477e21' id='90638' code='YGC7EA'>
                <room>Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)</room>
                <title>Dismantle The Bomb</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-07T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>02:00</duration>
                <abstract>Dismantle the bomb by performng different taks</abstract>
                <slug>bsidesluxembourg-2026-90638-3-dismantle-the-bomb</slug>
                <track>Escape games!</track>
                
                <persons>
                    <person id='90958'>Stijn Tomme</person>
                </persons>
                <language>en</language>
                <description>Dismantle the bomb by performing different taks. The tasks will include:
- Solving ciphers
- Being genuine with a special flashlight
- lock picking 
- make a key with a lishi tool
- ...</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/feedback/</feedback_url>
            </event>
            <event guid='e72321ee-f197-5689-b507-dc8549c22aa2' id='90638' code='YGC7EA'>
                <room>Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)</room>
                <title>Dismantle The Bomb</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-07T16:00:00+02:00</date>
                <start>16:00</start>
                <duration>02:00</duration>
                <abstract>Dismantle the bomb by performng different taks</abstract>
                <slug>bsidesluxembourg-2026-90638-4-dismantle-the-bomb</slug>
                <track>Escape games!</track>
                
                <persons>
                    <person id='90958'>Stijn Tomme</person>
                </persons>
                <language>en</language>
                <description>Dismantle the bomb by performing different taks. The tasks will include:
- Solving ciphers
- Being genuine with a special flashlight
- lock picking 
- make a key with a lishi tool
- ...</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops and Stage - Design Space (C1.05.12)' guid='1d52d5bc-e122-502d-8a62-7079b3f6d4a3'>
            <event guid='c889a26e-0d35-5a3b-8aca-b9095077e170' id='89334' code='A7AXTC'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>SPOT - Spear-Phishing Overwatching Tool</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T10:35:00+02:00</date>
                <start>10:35</start>
                <duration>00:40</duration>
                <abstract>Nowadays, the detection of generic mass-scale phishing attacks is quite
effective.  Techniques that leverage indicators of compromise (IOCs) collection
and sharing tools, such as MISP (the Open Source Threat Intelligence Sharing
Platform), are well established and give good results in the field. However,
detection of targeted attack attempts aka spear-phishing, is much more
challenging because the attackers exploit contextual information about the
targets they aim for.
By using up-to-date, relevant and precise information about the inner
operations of the targeted company, attackers can make their deception far more
effective.
SPOT makes use of state-of-the-art natural language
processing (NLP) techniques based on machine learning (ML) and large language
models (LLMs) in particular to try to detect and prevent spear-phishing
attack attempts.
This opensource project was co-financed by the LU-CID initiative by the Ministry
of Economy Luxembourg.</abstract>
                <slug>bsidesluxembourg-2026-89334-spot-spear-phishing-overwatching-tool</slug>
                <track></track>
                
                <persons>
                    <person id='88706'>Pauline Bourmeau (Cookie)</person><person id='89639'>William Robinet</person><person id='89801'>Thibaut Diels</person><person id='89867'>Mathieu Fourcroy</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/A7AXTC/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/A7AXTC/feedback/</feedback_url>
            </event>
            <event guid='aa0a7c5f-f3d4-55ab-bcb4-90ce8bea4beb' id='90254' code='VENKPF'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Mapping the Invisible: Why System Cartography Matters for Security and Compliance</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T11:20:00+02:00</date>
                <start>11:20</start>
                <duration>00:40</duration>
                <abstract>Modern infrastructures are increasingly complex, distributed, and opaque &#8212; making it difficult for security teams to answer a simple question: what exactly are we protecting?

System cartography provides an essential foundation for cybersecurity governance. It allows organizations to understand their architecture, dependencies, and data flows &#8212; the key to effective risk management, incident response, and compliance.</abstract>
                <slug>bsidesluxembourg-2026-90254-mapping-the-invisible-why-system-cartography-matters-for-security-and-compliance</slug>
                <track></track>
                <logo>/media/bsidesluxembourg-2026/submissions/VENKPF/image_I4p3ada.webp</logo>
                <persons>
                    <person id='90620'>Didier Barzin</person>
                </persons>
                <language>en</language>
                <description>This talk introduces these concepts through [Mercator](https://www.github.com/dbarzin/mercator) an open-source tool designed to map and visualize complex infrastructures. Mercator transforms data from existing sources (CMDB, inventories, scans) into interactive diagrams that help bridge the gap between technical visibility and strategic security management.

Rather than a technical demo, this 40-minute session offers a conceptual overview of how cartography supports risk management, incident response, and regulatory compliance, turning architecture into a living asset for cybersecurity.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/VENKPF/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/VENKPF/feedback/</feedback_url>
            </event>
            <event guid='6df6c494-4a4d-5c9e-b06e-8ec04bbbcbd9' id='89815' code='NQDVUB'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Cloud Misconfigurations: Poke Poke, Breach</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>00:40</duration>
                <abstract>Cloud misconfigurations still cause saying-it-out-loud 99% of cloud security failures, but in 2026 the mistakes have mutated. Today&#8217;s breaches are less &#8220;oops, public bucket&#8221; and more over-privileged identities, sketchy SaaS integrations, forgotten test environments, and dangerously helpful defaults in AI and Kubernetes.

This talk introduces a modern hierarchy of cloud misconfigurations based on late-2025 and early-2026 breach data, then flips the script from post-incident cleanup to pre-deployment prevention using Policy as Code (PaC). Instead of finding problems after attackers do, we stop insecure resources from ever being created. We&#8217;ll wrap with the Toxic Trilogy, a practical model for spotting cloud assets that are statistically doomed, and show how PaC quietly dismantles all three conditions before anyone has to open a ticket.</abstract>
                <slug>bsidesluxembourg-2026-89815-cloud-misconfigurations-poke-poke-breach</slug>
                <track>Cloud track</track>
                
                <persons>
                    <person id='90049'>Kat Fitzgerald</person>
                </persons>
                <language>en</language>
                <description>Cloud security has become very good at finding problems after they ship. Scanners run. Dashboards glow. Tickets multiply. Meanwhile, attackers stroll in through configurations that technically &#8220;passed&#8221; review. In 2026, misconfigurations still understand how to ruin everyone&#8217;s day, not because teams don&#8217;t care, but because cloud complexity has officially outrun human attention.

This session opens with the 2026 hierarchy of cloud misconfigurations, grounded in late-2025 and early-2026 breach data rather than folklore:

- Identity and entitlement overreach as the new breach starter pistol
- SaaS and API integrations quietly bypassing MFA, logging, and common sense
- Storage exposure that survived provider guardrails via authenticated access and CDNs
- Shadow environments and abandoned IaC resources that never got the security memo

From there, I stop poking the fluffy cloud creature and wondering why it bites back. Using the Guardrail Strategy and Policy as Code, security rules become executable laws of physics inside CI/CD pipelines. Public buckets fail builds. Admin-level service accounts get denied. Secrets never make it into source control. Production click-ops quietly undo themselves like a bad idea sobering up.

I&#8217;ll then introduce the Toxic Trilogy: cloud assets that are publicly exposed, highly privileged, and critically vulnerable. PaC&#8217;s real power in 2026 is context. By evaluating how these risks overlap, policies don&#8217;t just find problems, they prevent entire breach classes from ever existing.

The result is faster delivery, fewer incidents, and security that finally keeps up with cloud speed without becoming the team everyone avoids on Slack.

Key Takeaways

- Identify the top cloud misconfiguration patterns of 2026 based on real breach data
- Understand why identity and API integrations now outrank storage as breach drivers
- Recognize the Toxic Trilogy and why its overlap predicts breaches with scary accuracy
- Explain how Policy as Code shifts security from detection to prevention
- Apply a policy-first workflow to block risky cloud deployments before production
- Reduce misconfiguration risk without slowing developers or drowning in tickets</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/NQDVUB/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/NQDVUB/feedback/</feedback_url>
            </event>
            <event guid='3fd65e9a-985b-5218-b757-b21bf2967c95' id='88474' code='ABKXN7'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>In The Wild Cloud Exfiltration Paths You Might Not Expect</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T14:10:00+02:00</date>
                <start>14:10</start>
                <duration>00:40</duration>
                <abstract>As organizations migrate to the cloud, threat actors&apos; exfiltration tactics and techniques evolved and targeted the architectural boundaries of cloud service models (SaaS, PaaS, IaaS). Each service model presents different exfiltration options as the responsibility shifts between cloud providers and customers, creating distinct attack surfaces that threat actors use for exfiltration.

Drawing on hundreds of real-world cases from CrowdStrike incident response and threat hunting, this talk moves past the theory to showcase exfiltration techniques that catch even seasoned defenders off guard. We&apos;ll dive into:

- SaaS Stealth: Abusing Microsoft 365 via third-party apps and silently exfiltrating DocuSign documents using sync functionality.
- The PaaS Pivot: How ETL platforms could be misused for exfiltration.
- IaaS Tactics: Infrastructure tampering and cross-cloud data transfers. 

This session is designed for the defender who has the cloud basics covered but wants to know what they might be missing. Attendees will leave with a clear understanding of these evolved exfiltration paths and most importantly required telemetry and detection ideas.</abstract>
                <slug>bsidesluxembourg-2026-88474-in-the-wild-cloud-exfiltration-paths-you-might-not-expect</slug>
                <track>Cloud track</track>
                
                <persons>
                    <person id='89054'>Tomas Kabrt</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/ABKXN7/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/ABKXN7/feedback/</feedback_url>
            </event>
            <event guid='8bb7107d-82ac-5a7f-a21d-fad122741d4a' id='91186' code='AYMPND'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Cloud Sovereignty</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T14:50:00+02:00</date>
                <start>14:50</start>
                <duration>00:30</duration>
                <abstract>Presentation on why cloud sovereignty has become a board-level strategic issue, touching on foreign interference, platform lock-in, tech dependency, and the critical insight that not all cloud models are equal.
	&#8226;	Why sovereignty, autonomy, and resilience are executive-level concerns (regulatory mandates, legal exposure, operational continuity)
	&#8226;	The triple threat landscape (foreign interference via US CLOUD Act, platform lock-in costs, tech dependency risks)
	&#8226;	How the guide helps governments and critical organizations with risk mitigation frameworks and compliance mapping
	&#8226;	Two sovereign cloud operating models (Full EU Isolation vs. Guardrail Sovereign)
	&#8226;	Strategic alignment matrix showing how different cloud models match organizational needs
	&#8226;	EU regulatory context (DORA, NIS2, EU Data Act, upcoming Cloud &amp; AI Act)
	&#8226;	Technical controls and implementation priorities</abstract>
                <slug>bsidesluxembourg-2026-91186-cloud-sovereignty</slug>
                <track>Cloud track</track>
                
                <persons>
                    <person id='91429'>Catalin Tiganila</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/AYMPND/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/AYMPND/feedback/</feedback_url>
            </event>
            <event guid='a8b05598-7118-5143-9370-ab575a7e60bd' id='85027' code='YH7DVE'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Leaky API Keys, Log Tampering, and Account Takeover</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T15:40:00+02:00</date>
                <start>15:40</start>
                <duration>00:40</duration>
                <abstract>The talk will cover common techniques to upload client-side logs to AWS S3 buckets, integrations with third-party database services like Supabase, and server technologies commonly used for financial data processing, all of which result in leaked API keys when misconfigured.  Three distinct vulnerabilities will be demonstrated, each showcasing different variations of the core anti-patterns in multiple contexts. Attendees can expect to receive a structured framework for understanding how these flaws manifest across different technologies. The session will conclude with a comprehensive discussion of targeted fixes that address the root causes of the anti-pattern. It will move beyond surface-level patches to implement architectural solutions that prevent entire classes of similar vulnerabilities. These remediation strategies will include both immediate tactical fixes and longer-term architectural improvements that strengthen overall system security posture.</abstract>
                <slug>bsidesluxembourg-2026-85027-leaky-api-keys-log-tampering-and-account-takeover</slug>
                <track>Cloud track</track>
                
                <persons>
                    <person id='86205'>Aleksa Zatezalo</person>
                </persons>
                <language>en</language>
                <description>The talk will cover common techniques to upload client-side logs to AWS S3 buckets, integrations with third-party database services like Supabase, and server technologies commonly used for financial data processing, all of which result in leaked API keys when misconfigured.  Three distinct vulnerabilities will be demonstrated, each showcasing different variations of the core anti-patterns in multiple contexts. Attendees can expect to receive a structured framework for understanding how these flaws manifest across different technologies. The session will conclude with a comprehensive discussion of targeted fixes that address the root causes of the anti-pattern. It will move beyond surface-level patches to implement architectural solutions that prevent entire classes of similar vulnerabilities. These remediation strategies will include both immediate tactical fixes and longer-term architectural improvements that strengthen overall system security posture.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YH7DVE/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YH7DVE/feedback/</feedback_url>
            </event>
            <event guid='eae5a9f3-17f8-5687-aa4c-961aa351b19b' id='97341' code='VEEKAR'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Infostealer Emulation: Validating Detection of Credential Theft</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T16:20:00+02:00</date>
                <start>16:20</start>
                <duration>00:40</duration>
                <abstract>Infostealers silently harvest credentials, cookies, and sensitive data. This session demonstrates how to emulate infostealer behavior browser data theft, keylogging, clipboard monitoring, credential dumping to validate whether your endpoint controls, DLP, and network monitoring would detect the theft and exfiltration. Learn to test your defenses against one of the most prevalent and damaging threat categories.</abstract>
                <slug>bsidesluxembourg-2026-97341-infostealer-emulation-validating-detection-of-credential-theft</slug>
                <track></track>
                
                <persons>
                    <person id='90133'>Filipi Pires</person>
                </persons>
                <language>en</language>
                <description>Outline:

Introduction: The Infostealer Epidemic 
Infostealer TTPs (8 min)
Browser data, keylogging, clipboard, LSASS
DEMO: Browser Credential Theft Emulation (12 min)
DEMO: Keylogger Simulation (8 min)
DEMO: Credential Dumping (LSASS Access) (10 min)
DLP &amp; Network Monitoring Validation (7 min)
Q&amp;A (5 min)</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/VEEKAR/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/VEEKAR/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops and Stage - Gernsback (C1.05.02)' guid='b84d3f24-c35e-59bb-96b9-3b07464f6ab1'>
            <event guid='dc360cd8-9e54-5ef8-8a99-7ff323ec55e3' id='86943' code='SWS9NQ'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>Unraveling Failure - Lessons from an Avoidable Ransomware&#160;Attack</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T10:35:00+02:00</date>
                <start>10:35</start>
                <duration>00:40</duration>
                <abstract>A real-world ransomware attack on a non-IT company where cybersecurity wasn&#8217;t a priority. Learn how incident management and business continuity collapsed under pressure, what really happens during an attack, and the lessons leaders must learn shared from real cases presented at Bsides</abstract>
                <slug>bsidesluxembourg-2026-86943-unraveling-failure-lessons-from-an-avoidable-ransomware-attack</slug>
                <track></track>
                <logo>/media/bsidesluxembourg-2026/submissions/SWS9NQ/Mihai_tutulan_sbKCxnc.webp</logo>
                <persons>
                    <person id='87836'>Mihai Tutulan</person>
                </persons>
                <language>en</language>
                <description>Ransomware is no longer an abstract IT risk is an operational crisis. This talk presents a real-life ransomware attack against a large, non-IT industrial company where cybersecurity was not considered a business priority.

Through a chronological breakdown of the incident, we explore how a single phishing email escalated into a full IT blackout, shutting down operations, disrupting production, and paralyzing the business for months. The session focuses on incident management under pressure and the failure and rebuilding of the Business Continuity Plan.

Attendees will gain an inside view of:

What actually happens during a ransomware attack, beyond theory and frameworks
How organizational mindset and management decisions amplify impact
Why missing &#8220;basic&#8221; security controls turns incidents into disasters
Practical lessons learned during recovery and transformation
This talk is based on a real case, previously presented at BSides Chi&#537;in&#259;u and BSides Cluj(you can have feedback from the organizers if needed), and is aimed at both technical and non-technical audiences who want to understand ransomware from a business-impact perspective not just a technical one.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/SWS9NQ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/SWS9NQ/feedback/</feedback_url>
            </event>
            <event guid='2e09391c-6066-5d9a-97a6-570af2ce756b' id='90398' code='E7WLHY'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>From CAN Frames to Corporate Firewalls: Life of an Automotive Security Researcher</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T11:20:00+02:00</date>
                <start>11:20</start>
                <duration>00:40</duration>
                <abstract>Modern vehicles are no longer just mechanical machines&#8212;they are complex distributed systems with hundreds of electronic control units, multiple networks, and cloud-connected devices. In this talk, I will share the daily challenges of working as an automotive cybersecurity researcher and how real-world constraints shape security research in the automotive industry.

I will begin with a brief introduction to my role as a security researcher. My work involves analyzing vehicle hardware, telematics systems, IoT modules, and embedded firmware to identify vulnerabilities before attackers do. Unlike traditional IT security, automotive security requires deep knowledge of hardware, embedded systems, radio protocols, and real-time system constraints.

A key part of this talk will focus on automotive communication networks and interfaces. I will explain how in-vehicle networks operate, why security is challenging to implement, and how attackers can exploit weaknesses through message manipulation, spoofing, and denial-of-service techniques. I will also cover interfaces such as UART, JTAG, Bluetooth, cellular modules, and diagnostic ports, highlighting how each interface expands the attack surface.</abstract>
                <slug>bsidesluxembourg-2026-90398-from-can-frames-to-corporate-firewalls-life-of-an-automotive-security-researcher</slug>
                <track></track>
                
                <persons>
                    <person id='90729'>Hrishikesh Somchatwar</person>
                </persons>
                <language>en</language>
                <description>One major challenge in automotive security is that hardware changes are often restricted due to cost, certification, and production constraints. As a result, many security mitigations must be implemented at the firmware or software level.
Real-world case studies will be shared to demonstrate how fraud and attacks occur in connected vehicle ecosystems, including device spoofing, firmware tampering, GPS manipulation, and backend abuse. In manufacturing environments, even short security incidents can halt production lines, causing significant financial impact, highlighting why automotive cybersecurity is critical infrastructure protection.

I will also reflect on the difference between being a hardware hacker and working in corporate security environments where responsible disclosure, risk management, and compliance are essential alongside technical skills.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/E7WLHY/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/E7WLHY/feedback/</feedback_url>
            </event>
            <event guid='aac27f9e-bc4f-5b4d-860e-5bb1767ec747' id='95336' code='LW9DDS'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>Trust and Traceability : developer observability in the AI powered SDLC</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>00:40</duration>
                <abstract>Trust and Traceability: Developer Observability in the AI-Powered SDLC 

Safeguarding the enterprise with superior AI risk governance 

It has been over three years since AI coding tools first landed, and in 2026, more than three-quarters of developers are using them in their workflows... with or without the knowledge and blessing of the AppSec team. Rumors of developers being replaced entirely have been exaggerated, but crucially, the use of AI in enterprise environments has further uncovered the significant security skills gap that exists among them as they struggle to identify and mitigate vulnerable, AI-generated code. 

Security programs must evolve rapidly to reduce this emerging threat vector, but many CISOs lack the necessary data and insights to effectively empower their development cohorts. With AI coding tools touted as both a blessing and a curse for development and software security, there is no better time to ensure the enterprise security program is not just updated to accommodate the increased attack surface, but also actively optimized for SDLC efficiency and cyber defense. 

World-class security leaders must rise to the occasion and lead proactive security programs that utilize the right tech stack and strategy to manage developer risk through high observability of their security skills, as well as the security efficacy of their AI technology stack. Developers have immense potential to be central to a defensive security strategy, and they can be empowered with the right knowledge to transform their approach to coding and adopt a security-first mindset. This revolution is vital as the use of AI coding tools grows, and critical thinking from the developer is a must to deploy them safely in their workflow.

Based on AI experiments and key research with CISOs, the presentation reveals the critical pathways security leaders can take to execute incredible developer-focused training programs that reduce risk, shift negative security sentiment in the development cohort, and safely adapt AI technology with precision governance, including:

    Understanding comparisons between AI and human coding, what works, and what can affect enterprise security maturity.
    Navigating AI data quality issues and establishing safe pair programming with unprecedented developer observability.
    Developer upskilling, including benchmarking and growing key security skills with knowledge and governance that leads to better risk mitigation.
    How to establish a skills baseline among developers, and grow relevant competency quickly.
    The pitfalls of AI vulnerability detection, and the skillset your developers must master to overcome hallucination, insecure code generation and misconfiguration.</abstract>
                <slug>bsidesluxembourg-2026-95336-trust-and-traceability-developer-observability-in-the-ai-powered-sdlc</slug>
                <track>Secure Development track</track>
                
                <persons>
                    <person id='95894'>Omar Rachid</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/LW9DDS/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/LW9DDS/feedback/</feedback_url>
            </event>
            <event guid='c51f3ee8-014c-51e3-911a-c2f08555a2f0' id='85262' code='XMJTXP'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>Managing Uninvited Guests: Securing Open Source Dependencies</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T14:10:00+02:00</date>
                <start>14:10</start>
                <duration>00:35</duration>
                <abstract>Open source software is the ultimate neighborhood party&#8212;doors open, music playing, people bringing their best dishes (or code). Projects grow fast, the energy is contagious, and everyone benefits from the collective creativity. But in every good party, there&#8217;s risk: the friend-of-a-friend-of-a-friend who slips in unnoticed, doesn&#8217;t follow the house rules, and eventually leaves you with a hole in the drywall.

In the open source world, that&#8217;s dependency hell. It starts with a package you trust&#8212;but that package has its own dependencies, which have their own dependencies, and somewhere deep in that chain lurks outdated, vulnerable, or even malicious code. You didn&#8217;t invite it, you don&#8217;t know it&#8217;s there, but it&#8217;s living in your codebase rent-free. And attackers love this&#8212;because if they compromise just one small link in that long chain, they can crash your entire project.

In this session, we&#8217;ll dig into the messy reality of dependency hell and its role in software supply chain security incidents. We&#8217;ll examine real-world examples where hidden or neglected dependencies became the entry point for compromise, from typosquatting attacks to maintainer account takeovers. We&#8217;ll explore why it&#8217;s not just about malicious intent&#8212;sometimes the &#8220;bad guest&#8221; is simply an abandoned project with known CVEs that no one bothered to patch.</abstract>
                <slug>bsidesluxembourg-2026-85262-managing-uninvited-guests-securing-open-source-dependencies</slug>
                <track>Secure Development track</track>
                
                <persons>
                    <person id='86386'>Kadi McKean</person><person id='86387'>Frithjof Hoffmann</person>
                </persons>
                <language>en</language>
                <description>Open source is like a house party&#8212;everyone&#8217;s invited. But dependency hell is that friend-of-a-friend-of-a-friend who puts a hole in the wall. One rogue package can take down your whole project. Learn how to spot and block unwanted guests before they trash your software supply chain.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/XMJTXP/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/XMJTXP/feedback/</feedback_url>
            </event>
            <event guid='738a9faf-b737-5c4d-9b61-9acafc931562' id='92007' code='WDFHHV'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>When Filenames Become Attack Surfaces: Weaponizing NASA&#8217;s CFITSIO Extended Filename Syntax</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T14:45:00+02:00</date>
                <start>14:45</start>
                <duration>00:35</duration>
                <abstract>CFITSIO is a NASA-maintained library widely used for reading and writing FITS (Flexible Image Transport System) data across astronomy, astrophotography, and scientific software. The raw data behind the stunning images from Hubble and Webb telescopes &#8212; and even from casual backyard observatories &#8212; is stored in FITS format. CFITSIO is often embedded deep inside larger applications and services. One of its core features, **Extended Filename Syntax (EFS)**, turns what appears to be a simple filename into a powerful **mini-language** supporting virtual files, filtering, filesystem interaction, and network access.

This talk presents original security research into CFITSIO&#8217;s Extended Filename Syntax and shows how it quietly expands the attack surface of applications that rely on default CFITSIO APIs. I will demonstrate how EFS can be abused to enable multiple high-impact security primitives, including arbitrary file operations, server-side request forgery, protocol-level manipulation, and unintended data exposure.

These issues are not classic memory corruption bugs, but abuses of legitimate, documented features that are enabled by default and inherited by third-party software without explicit awareness or threat modeling. This research builds on earlier CFITSIO vulnerabilities I previously reported and highlights how feature-rich parsing logic can turn filenames into a **supply-chain attack surface**.</abstract>
                <slug>bsidesluxembourg-2026-92007-when-filenames-become-attack-surfaces-weaponizing-nasa-s-cfitsio-extended-filename-syntax</slug>
                <track>Secure Development track</track>
                
                <persons>
                    <person id='92264'>Adrian Denkiewicz</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/WDFHHV/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/WDFHHV/feedback/</feedback_url>
            </event>
            <event guid='1ef6c0da-0d0e-5a78-8351-1383a4f37d2c' id='89382' code='7HCSG3'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>Out of Security Exception - What to Do Without an Expert to Secure Your Software</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T15:40:00+02:00</date>
                <start>15:40</start>
                <duration>00:40</duration>
                <abstract>&#8220;We requested a review from security a month ago and there&#8217;s no feedback.&#8221; Does this sound familiar to you? Maybe you&#8217;ve heard that your security team is occupied with other tasks that are &#8220;higher priority&#8221; and your product is just not. &#8220;Nothing we can do, security is an expert&#8217;s job.&#8221; Or maybe you simply don&#8217;t have any dedicated security team in your company. So, your hands are bound and you can&#8217;t do anything anyways, right? 

What if you could, though? What if you could do a lot more than you might think to make your software more secure? What if you could save time and effort by taking security into your own hands?

In this talk, we&#8217;ll go through several activities that you might already do right now, and demonstrate how you can shape these to improve your product&#8217;s security posture. Let&#8217;s take a few examples: when you&#8217;re analyzing the next product changes, you can use threat modeling to also consider potential security issues and hence plan their implementation with security in mind. Collaborating across roles on developing the changes can help you detect security flaws before they make it to production. Investing in maintenance and reducing technical debt will at the same time make your product a less attractive target. When observing production, you can spot malicious actors probing your system enabling you to respond before harm is done.

If you apply good software development practices, they help you make your product more secure, and good security practices help you make software that provides more value and less harm. With and without an expert at hand.

Key learnings:
- Stop waiting for dedicated security experts and start acting yourself
- Understand how good software development practices support security practices and vice versa
- Gain insights on what an engineering team can do themselves to build secure enough products
- Learn how to use this newly found leverage of benefits on all sides when prioritizing which changes and activities to invest in</abstract>
                <slug>bsidesluxembourg-2026-89382-out-of-security-exception-what-to-do-without-an-expert-to-secure-your-software</slug>
                <track>Secure Development track</track>
                
                <persons>
                    <person id='89834'>Lisi Hocke</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/7HCSG3/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/7HCSG3/feedback/</feedback_url>
            </event>
            <event guid='b3db2f32-c012-515c-b372-1910e7365a75' id='94030' code='QVEUXA'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>Turnkey Code &#8211; Enhancing Secrets Management in Large Scale Organizations</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T16:20:00+02:00</date>
                <start>16:20</start>
                <duration>00:40</duration>
                <abstract>Everyone agrees leaked secrets are dangerous, yet most organizations still struggle to detect, triage, and fix them effectively. Scanners generate noise, developers ignore alerts, and real secrets slip through unnoticed.

This talk shares the real-world story of building a turnkey secrets scanning and triage platform from scratch, using and extending open-source tools. Designed for scale, the system focuses on reducing false positives, automating validation, and integrating seamlessly into CI/CD pipelines.

Through live demos and practical examples, attendees will see how to turn secrets detection from a checkbox into an actionable security program. The session focuses on real engineering decisions, lessons learned, and how the community can reuse these ideas to solve a problem many know exists, but few truly address.</abstract>
                <slug>bsidesluxembourg-2026-94030-turnkey-code-enhancing-secrets-management-in-large-scale-organizations</slug>
                <track>Secure Development track</track>
                
                <persons>
                    <person id='93906'>Diogo Lemos</person>
                </persons>
                <language>en</language>
                <description>This session will focus on the implementation, benefits, and challenges of building a scalable, open-source secrets scanning and management platform, designed to tackle a problem that is widely recognized but often ignored. I will start by describing the current state of secrets management in organizations: while most know exposed secrets are a serious risk, few have the processes, tooling, or awareness to handle them effectively. Existing scanners often produce too many false positives, lack context, or fail to integrate seamlessly into developer workflows, leaving teams frustrated and secrets at risk.

I will explain the motivation for creating Turnkey Code, emphasizing a passion for building practical solutions that are genuinely useful for other security engineers. Rather than buying a commercial tool, we approached the problem as a challenge: how to build a system that scales across repositories, integrates into CI/CD pipelines, and delivers actionable findings without overwhelming developers. I will cover the architecture, including scanning strategies, entropy-based detection, pattern rules, validation logic, and confidence scoring.

The session will also include a live demo, showing how the tool scans a real repository, identifies secrets, reduces false positives, and triages findings through dashboards. I will walk through automation workflows, integration with CI/CD, and how teams can track remediation and ownership. Throughout the talk, I will share lessons learned from deployment, including adoption hurdles, scaling challenges, and strategies for raising awareness about this underestimated risk.

Attendees will leave with practical knowledge of secrets management at scale, including actionable techniques, integration strategies, and access to an open-source tool they can use immediately. By sharing our approach, the session aims to raise awareness across the community, provide a repeatable method for handling secrets, and encourage engineers to build solutions that solve real problems.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/QVEUXA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/QVEUXA/feedback/</feedback_url>
            </event>
            <event guid='0950e315-d5af-545f-851f-f9f627a8108b' id='85609' code='KRDZWR'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>The Forgotten Fingerprint: DNS Based OSINT Techniques for Product &amp; Service Discovery</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-07T17:00:00+02:00</date>
                <start>17:00</start>
                <duration>00:35</duration>
                <abstract>This talk explores a DNS-based OSINT technique that uncovers hidden services and technology dependencies through large-scale TXT record analysis. Attendees will learn how these overlooked records can reveal valuable insights for both offensive and defensive security, and how to integrate this methodology into existing reconnaissance workflows using tools like Nuclei and OWASP Amass.</abstract>
                <slug>bsidesluxembourg-2026-85609-the-forgotten-fingerprint-dns-based-osint-techniques-for-product-service-discovery</slug>
                <track>Secure Development track</track>
                
                <persons>
                    <person id='86678'>Rishi (@rxerium)</person>
                </persons>
                <language>en</language>
                <description>I will present a DNS-based OSINT methodology for uncovering products and services through large-scale TXT record scanning. This previously unpublished approach shows how certain TXT records reveal more than domain ownership or validation details, exposing the presence of third-party services and platforms. For example, entries like google-site-verification, MS=msXXXX, or vendor-specific SPF includes can highlight dependencies on Google Workspace, Microsoft 365, or other cloud services.

By analysing these records programmatically across large DNS zones, security teams can create detailed maps of an organisation&#8217;s technology stack and supply chain affiliations. This intelligence is invaluable for identifying weaknesses and understanding attack paths, providing defenders actionable context while showing the scale of information accessible to attackers.

I integrated this scanning technique into open-source tools including Nuclei and OWASP Amass. These enhancements let security professionals incorporate TXT record reconnaissance into broader asset discovery workflows, improving the depth and precision of enumeration efforts.

This talk features a real-world case study from the August&#8211;September 2025 Salesloft breach, where this method identified the Drift service across infrastructure. Attendees will gain practical tactics, reproducible methods, and tooling to strengthen assessments and apply actionable insights in real-world engagements.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/KRDZWR/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/KRDZWR/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='3' date='2026-05-08' start='2026-05-08T04:00:00+02:00' end='2026-05-09T03:59:00+02:00'>
        <room name='Atrium (common area)' guid='fdf8693e-170e-5bb7-9e30-eff972c8b09d'>
            <event guid='e1ccf492-283d-5e9d-810c-e47a9110002f' id='85198' code='3CLCMG'>
                <room>Atrium (common area)</room>
                <title>Car Hacking Village</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-08T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>03:00</duration>
                <abstract>The Car Hacking Village offers attendees a hands-on, immersive environment to explore the security of modern vehicles. As cars continue to evolve into complex, connected computer systems, the need to understand their attack surfaces and defensive challenges grows. This village provides a safe and controlled space where participants can learn, experiment, and collaborate on real automotive cybersecurity techniques.</abstract>
                <slug>bsidesluxembourg-2026-85198-2-car-hacking-village</slug>
                <track>Villages in Atrium</track>
                
                <persons>
                    <person id='86349'>Roald Nefs</person>
                </persons>
                <language>en</language>
                <description>The village includes a fully equipped setup featuring simulated vehicle networks, CAN bus tooling, instrument clusters, ECUs, and other automotive components. Attendees can:

- Interact with the CAN bus and observe how in-vehicle communication works
- Capture, analyze, and replay automotive network traffic
- Reverse engineer messages sent to various vehicle subsystems
- Craft spoofed signals to manipulate components such as instrument clusters
- Explore common vulnerabilities in today&apos;s vehicle architectures
- Learn practical defensive considerations for securing automotive systems

All activities are guided and designed to be accessible to beginners while still offering depth for more experienced researchers.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/3CLCMG/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/3CLCMG/feedback/</feedback_url>
            </event>
            <event guid='c5ce6e4a-404e-53d5-b296-19fae17d09d7' id='85198' code='3CLCMG'>
                <room>Atrium (common area)</room>
                <title>Car Hacking Village</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-08T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>04:30</duration>
                <abstract>The Car Hacking Village offers attendees a hands-on, immersive environment to explore the security of modern vehicles. As cars continue to evolve into complex, connected computer systems, the need to understand their attack surfaces and defensive challenges grows. This village provides a safe and controlled space where participants can learn, experiment, and collaborate on real automotive cybersecurity techniques.</abstract>
                <slug>bsidesluxembourg-2026-85198-3-car-hacking-village</slug>
                <track>Villages in Atrium</track>
                
                <persons>
                    <person id='86349'>Roald Nefs</person>
                </persons>
                <language>en</language>
                <description>The village includes a fully equipped setup featuring simulated vehicle networks, CAN bus tooling, instrument clusters, ECUs, and other automotive components. Attendees can:

- Interact with the CAN bus and observe how in-vehicle communication works
- Capture, analyze, and replay automotive network traffic
- Reverse engineer messages sent to various vehicle subsystems
- Craft spoofed signals to manipulate components such as instrument clusters
- Explore common vulnerabilities in today&apos;s vehicle architectures
- Learn practical defensive considerations for securing automotive systems

All activities are guided and designed to be accessible to beginners while still offering depth for more experienced researchers.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/3CLCMG/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/3CLCMG/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Atrium (common room) 2' guid='663a9ff0-e9f4-52f8-95ae-2af2e2e913dd'>
            <event guid='0bc42683-1558-5137-9706-51b928c66cd7' id='92182' code='9FGWWQ'>
                <room>Atrium (common room) 2</room>
                <title>Lockpicking Village</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-08T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>03:00</duration>
                <abstract>Learn or practice your lockpicking skills in the lockpicking village.
Experts say that this has real-life impact, not only to red teamers!</abstract>
                <slug>bsidesluxembourg-2026-92182-2-lockpicking-village</slug>
                <track>Villages in Atrium</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>There will be all sorts of lockpicking equipment available for you to practice, guided by our volunteers.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/9FGWWQ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/9FGWWQ/feedback/</feedback_url>
            </event>
            <event guid='d860f819-c29b-5750-8e57-5856cc07c51b' id='92182' code='9FGWWQ'>
                <room>Atrium (common room) 2</room>
                <title>Lockpicking Village</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-08T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>04:30</duration>
                <abstract>Learn or practice your lockpicking skills in the lockpicking village.
Experts say that this has real-life impact, not only to red teamers!</abstract>
                <slug>bsidesluxembourg-2026-92182-3-lockpicking-village</slug>
                <track>Villages in Atrium</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>There will be all sorts of lockpicking equipment available for you to practice, guided by our volunteers.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/9FGWWQ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/9FGWWQ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Main Stage' guid='75d481b1-868b-58be-a3aa-7a08dfdaa6bb'>
            <event guid='62e90198-593e-51b3-ac5e-02799f070b3b' id='96099' code='X33JUT'>
                <room>Main Stage</room>
                <title>Killing Killnet</title>
                <subtitle></subtitle>
                <type>KEYNOTE</type>
                <date>2026-05-08T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>00:40</duration>
                <abstract>Killnet built its reputation as a decentralized Russian hacktivist force - loud, chaotic, and conveniently aligned with Kremlin objectives. But under the surface, it was something else entirely: a centralized operation controlled by a small group, using noise and hate as cover.

This is the inside story of how a team of just nine people delivered a kill shot to destroy this illusion.

Through targeted investigation and direct engagement, we exposed Killnet&#8217;s critical weakness: a financial link to Solaris, at that time, one of Russia&#8217;s largest dark web drug markets. By publicly tying their operations to organized cybercrime - we disrupted their narrative, broke internal trust, and triggered full collapse. The result? Loss of state support, severed financial channels, and a rapid implosion of the group&#8217;s infrastructure.

We&#8217;ll walk through how we tracked Killnet&#8217;s leadership, exposed its frontman &#8220;KillMilk,&#8221; and uncovered the criminal network behind the public facade. Along the way, you&#8217;ll get a firsthand look at the real tactics - OSINT, infiltration, pressure points - that brought down one of the most visible cyber collectives.

This isn&#8217;t just a postmortem. It&#8217;s a case study in strategic disruption, showing how small teams can go head-to-head with well-funded adversaries - and win.</abstract>
                <slug>bsidesluxembourg-2026-96099-killing-killnet</slug>
                <track></track>
                
                <persons>
                    <person id='92825'>Alex Holden</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/X33JUT/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/X33JUT/feedback/</feedback_url>
            </event>
            <event guid='3585bfa8-6774-51b7-b45e-89a01f7073a3' id='96226' code='89DT9B'>
                <room>Main Stage</room>
                <title>Building a &quot;Mythos-ready&quot; Security Program</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T09:40:00+02:00</date>
                <start>09:40</start>
                <duration>00:40</duration>
                <abstract>The briefing introduces a framework for organizational response organized across three time horizons, structured around five critical risks, seven high risks, and one medium risk. The framework defines 11 priority actions: Immediate (this week), Near-term (30-90 days), Strategic (6-12 months)

Being &quot;Mythos-ready&quot; does not mean reacting to one model or one announcement. It means permanently closing the gap between how fast vulnerabilities are found and how fast an organization can respond. The same AI capabilities that create this risk also create defensive opportunity: organizations can now find their own weaknesses before attackers do, review code at machine speed, and respond to incidents faster than any human team.

The industry has navigated systemic, hard-deadline threats before. Y2K required coordinated, disciplined effort &#8212; and the industry met it. The tools available to defenders today are substantially more powerful. Every action in this framework can begin this week.</abstract>
                <slug>bsidesluxembourg-2026-96226-building-a-mythos-ready-security-program</slug>
                <track></track>
                
                <persons>
                    <person id='91429'>Catalin Tiganila</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/89DT9B/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/89DT9B/feedback/</feedback_url>
            </event>
            <event guid='ad0e6590-b3b2-5a59-8418-424b8cbede6e' id='92597' code='DGHXCG'>
                <room>Main Stage</room>
                <title>Why I Go to the Dark Web Every Day</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T10:40:00+02:00</date>
                <start>10:40</start>
                <duration>00:40</duration>
                <abstract>The Dark Web is a scary place. In order to deter the cybercrime, I feel confident exploring its dangerous grounds and know well how to use the Dark Web to defend the victims. I want to invite you on this journey of venturing far beyond your defense perimeter, where cyber criminals are just planning their attacks, and teach you how you can use this knowledge as defensive skills to prevent attacks from happening in the first place.</abstract>
                <slug>bsidesluxembourg-2026-92597-why-i-go-to-the-dark-web-every-day</slug>
                <track></track>
                
                <persons>
                    <person id='92825'>Alex Holden</person>
                </persons>
                <language>en</language>
                <description>What do you need to know before going on the Dark Web? Preparation for the journey is not only technical skills but understanding of the Dark Web dynamics, linguistics, and social engineering.
Filled with practical examples of real-time exploitation of the threat actors on the Dark Web, we define a problem and start our journey.

As we travel along, we will identify meta-types of threat actors and actresses which we might encounter, discussing each type skills and threat types. How to approach each one of them without giving yourself away. What are possible gains and pitfalls? What drove these individuals to infamy and how their misdeeds changed the threat landscape forever.

Finally, the lessons &#8211; know your enemy. Know your enemy&apos;s weapons. Stop the threat actor = stop the crime.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/DGHXCG/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/DGHXCG/feedback/</feedback_url>
            </event>
            <event guid='1e1dec0a-3870-53d8-b696-4cca6ca1f5be' id='89633' code='UHLYXM'>
                <room>Main Stage</room>
                <title>Confound and Delay: Honeypot Chronicles from the Digital Battlefield</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T11:20:00+02:00</date>
                <start>11:20</start>
                <duration>00:40</duration>
                <abstract>Embark on a whirlwind tour of global cyber deception with a seasoned(?) security engineer who&apos;s been running honeypots in some of the world&apos;s most intriguing locales, including the bustling digital battleground of Ukraine. This talk will blend humor and hard-won wisdom to reveal the lessons learned from deploying, customizing, and maintaining honeypots across diverse environments. Participants will enjoy a lively narrative filled with tales of cyber trickery, cultural quirks, and the occasional mishap, all while gaining actionable insights into enhancing their own security strategies.</abstract>
                <slug>bsidesluxembourg-2026-89633-confound-and-delay-honeypot-chronicles-from-the-digital-battlefield</slug>
                <track></track>
                
                <persons>
                    <person id='90049'>Kat Fitzgerald</person>
                </persons>
                <language>en</language>
                <description>Imagine being a digital beekeeper, setting up traps for cyber threats in some of the most unexpected places around the globe, from the frosty landscapes of Ukraine to the bustling tech hubs of Tokyo. Over the years, I&#8217;ve had the peculiar pleasure of watching bad actors stumble into these traps, often with the same grace as a bull in a china shop. This talk is less about the &#8220;how&#8221; and more about the &#8220;what-the-heck-just-happened&#8221; moments that have made this journey unforgettable. Buckle up for a rollercoaster ride through the wild world of global honeypots, where every server tells a story, and sometimes, that story is downright hilarious.

Introduction: Setting the Scene
- Brief overview of honeypots and their purpose in cybersecurity.
- Introduction to me: a globe-trotting security engineer with a knack for storytelling and a passion for cyber deception.
- A quick teaser of the countries covered.

The Global Honeypot Experience
- A World Tour of Cyber Threats:
- Overview of the countries where honeypots were deployed.
- Brief anecdotes about the unique cyber threats and attack patterns observed in each location.
- Cultural and Environmental Considerations:
- How local culture and internet infrastructure impact honeypot deployment.
- Humorous tales of language barriers, time zone mix-ups, and unexpected technical challenges.

Customizing Honeypots for Different Environments
- One Size Does Not Fit All:
- Detailed examples of how honeypots were tailored to mimic local systems and applications.
- Creative tweaks and customizations that improved effectiveness.
- Lessons from the Field:
- Success stories and failures that provided valuable insights.
- Practical tips for customizing honeypots in various environments.

Operational Challenges and Triumphs
- Keeping the Honeypots Buzzing:
- Maintenance and monitoring strategies that worked (and those that didn&#8217;t).
- Tools and technologies that proved invaluable.
- Handling the Unexpected:
- Funny and frustrating incidents, from unexpected downtime to bizarre attack vectors.
- Lessons on resilience and adaptability.

Analyzing and Responding to Attacks
- From Data to Defense:
- How the data collected from honeypots informed broader security strategies.
- Real-life examples of attacks thwarted thanks to honeypot intelligence.
- The Human Element:
- Stories of interacting with curious researchers, bemused sysadmins, and relentless attackers.
- The importance of community and collaboration in the cybersecurity landscape.

Key Takeaways and Future Directions
- Summing Up:
- Recap of the most important lessons learned from the global honeypot project.
- Actionable advice for those looking to implement or enhance their own honeypot strategies.
- Looking Ahead:
- Emerging trends in cyber deception and honeypot technology.
- Exciting new challenges and opportunities on the horizon.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/UHLYXM/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/UHLYXM/feedback/</feedback_url>
            </event>
            <event guid='bd361656-349b-5a3a-a18e-6417b1205756' id='96304' code='MZLG9S'>
                <room>Main Stage</room>
                <title>Ransom-ISAC LOCK STAR Initiative</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2026-05-08T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>00:10</duration>
                <abstract>The ransomware ecosystem thrives in the shadows of fragmented intelligence and siloed expertise. Defenders do the hard work &#8212; forensic timelining of incidents, tracing cryptocurrency flows, reverse engineering payloads, negotiating with threat actors &#8212; yet that knowledge rarely travels far beyond the individual or organization that earned it. Ransom-ISAC&apos;s L.O.C.K. S.T.A.R. (Level of Critical Knowledge in Specialized Techniques on Advancements and Research) initiative was built to change that. This talk introduces L.O.C.K. S.T.A.R. as a community-driven recognition framework designed to surface, validate, and amplify the work of ransomware researchers and practitioners across eight critical domains &#8212; and explores how structured knowledge sharing can become one of our most powerful weapons against ransomware.</abstract>
                <slug>bsidesluxembourg-2026-96304-ransom-isac-lock-star-initiative</slug>
                <track></track>
                
                <persons>
                    <person id='86073'>Ellis Stannard</person>
                </persons>
                <language>en</language>
                <description>Ransomware is a team sport &#8212; but defenders have never played like one. As the founder of Ransom-ISAC, I&apos;ve spent years watching brilliant researchers do groundbreaking work in near-total obscurity &#8212; forensic timelines that cracked open major incidents, cryptocurrency tracing that followed the money to attribution, reverse engineering that exposed affiliate infrastructure &#8212; only for that knowledge to die in a private Slack channel or a closed incident report.

L.O.C.K. S.T.A.R. (Level of Critical Knowledge in Specialized Techniques on Advancements and Research) was built to fix that. It is Ransom-ISAC&apos;s community-driven recognition and credentialing framework &#8212; think Michelin stars for ransomware expertise &#8212; designed to surface, validate, and amplify the work of the practitioners and researchers who are actually moving the needle in this fight.
This session will walk attendees through why the initiative exists, how it works, and what it means for the broader defender community. L.O.C.K. S.T.A.R. recognition can be earned across eight domains: Infrastructure, Negotiations, HUMINT, Cryptocurrency, DFIR, Reverse Engineering, AI, and Quantum.
 
Rather than treating hard-won knowledge as a proprietary asset, the framework creates structured pathways &#8212; through novel workflow writeups and actionable intelligence contributions &#8212; for experts to share what they know while receiving the formal recognition they deserve.

The goal is simple but ambitious: if we can lower the barriers to knowledge sharing across the ransomware defender community, we compress dwell time, accelerate response, and make the ecosystem measurably harder for threat actors to operate in. Attendees will leave understanding how to contribute, how to apply, and why community-led credentialing may be one of the most underutilized tools in the fight against ransomware.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/MZLG9S/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/MZLG9S/feedback/</feedback_url>
            </event>
            <event guid='c4bcaecc-c7eb-5b46-b9f2-246b02ac4429' id='96162' code='GJTHDS'>
                <room>Main Stage</room>
                <title>How Secure is Secure Code Generation?  Putting the LLMs to the Test</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2026-05-08T13:40:00+02:00</date>
                <start>13:40</start>
                <duration>00:05</duration>
                <abstract>Large Language Models are increasingly used to assist developers in writing code, but how secure is the code they generate? This lightning talk explores the security risks introduced by LLM-generated code, from common vulnerability patterns to the challenges of evaluating and improving model outputs. Drawing from ongoing PhD research at TruX, SnT (University of Luxembourg), this talk offers a concise overview of the current landscape and open research questions in LLM-assisted secure software development.</abstract>
                <slug>bsidesluxembourg-2026-96162-how-secure-is-secure-code-generation-putting-the-llms-to-the-test</slug>
                <track></track>
                
                <persons>
                    <person id='95932'>Melissa TESSA</person>
                </persons>
                <language>en</language>
                <description>In this talk, I would like to present two of my works that challenge the way we think about security in LLM-generated code. The first asks an uncomfortable question: do secure code generation methods actually work? Through a systematic adversarial audit, we show that current evaluation practices create a dangerous illusion of security, and methods that look robust on paper fall apart under simple, realistic prompt perturbations. The second uncovers a quieter but equally dangerous threat: LLMs that confidently recommend software packages that simply do not exist, giving attackers the perfect opportunity to register these fabricated names on open source registries and serve malicious payloads to unsuspecting developers, a practice known as slopsquatting. Together, these works reveal that the security of AI-assisted development is more fragile and more nuanced than the field currently acknowledges.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/GJTHDS/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/GJTHDS/feedback/</feedback_url>
            </event>
            <event guid='d90e7010-2a4e-5b5e-8d6a-efaf27ba61c1' id='96132' code='YQRGVT'>
                <room>Main Stage</room>
                <title>Lighting Talk: MISP Workbench</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2026-05-08T13:45:00+02:00</date>
                <start>13:45</start>
                <duration>00:05</duration>
                <abstract>Built for the frontlines of cyber defense, our next-generation MISP Workbench empowers edge deployments and threat hunters with fast, lightweight, and actionable intelligence, anytime, anywhere.</abstract>
                <slug>bsidesluxembourg-2026-96132-lighting-talk-misp-workbench</slug>
                <track></track>
                
                <persons>
                    <person id='95893'>Luciano Righetti</person>
                </persons>
                <language>en</language>
                <description>https://github.com/MISP/misp-workbench</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YQRGVT/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YQRGVT/feedback/</feedback_url>
            </event>
            <event guid='de59de4b-4104-5a20-9003-199cedb86701' id='92939' code='Y3FG3M'>
                <room>Main Stage</room>
                <title>From CLI to Platform: Building NetCarapace, a Secure and Open Source URL Checking Ecosystem driven by Fondation Restena URL Shortener Use Case</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2026-05-08T13:55:00+02:00</date>
                <start>13:55</start>
                <duration>00:05</duration>
                <abstract>At OpenSourceLux 2025, we introduced url-checker-tools, a Python CLI toolkit for URL threat assessment through multi-source intelligence gathering, optional YARA-based local inspection, and configurable security scoring.
At BSides Luxembourg 2026, we present the next step: url-checker, a Python Flask web platform exposing a REST API that allows external services to submit URLs for automated verification before publication: initially built to prevent malicious URLs from reaching Fondation Restena&apos;s edu.lu shortener users. The platform orchestrates synchronous validation checks alongside asynchronous security assessments delegated to url-checker-tools via job queues, persists results in MariaDB, and includes a MISP integration proof-of-concept for community threat intelligence sharing.
We share our approach for the general Restena Use Case, overall design, production hardening lessons, and our roadmap toward an open, composable, self-hosted URL security infrastructure for the CSIRT community the NetCarapace concept (https://github.com/organizations/NetCarapace).</abstract>
                <slug>bsidesluxembourg-2026-92939-from-cli-to-platform-building-netcarapace-a-secure-and-open-source-url-checking-ecosystem-driven-by-fondation-restena-url-shortener-use-case</slug>
                <track></track>
                <logo>/media/bsidesluxembourg-2026/submissions/Y3FG3M/image_XbmxJu2.webp</logo>
                <persons>
                    <person id='93077'>C&#233;dric Renzi</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/Y3FG3M/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/Y3FG3M/feedback/</feedback_url>
            </event>
            <event guid='73dbe3bb-5724-5617-8c67-453814af99f1' id='89149' code='HJHWDS'>
                <room>Main Stage</room>
                <title>What You See Is (Not) What You Get</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T14:00:00+02:00</date>
                <start>14:00</start>
                <duration>00:40</duration>
                <abstract>When we are performing investigations (threat intel, hunting, forensics, malware analysis or anything else), our path is full of pitfalls or more commonly called, &#8220;biases&#8221;. We do you day to day job, we have our tools, processes and follow playbooks but are we certain that we are not missing crucial informations? In the first half of the talk, I&apos;ll explain how we can improve and use our senses in a better way: observe instead of see, listen instead of hear, etc. In the second part, I&apos;ll review some common issues that people do when performing malware analysis with real examples that I observed here and there. Even if the abstract mentions &#8220;malware analysis&#8221;, this is not a very technical talk but it will be helpful for all infosec practitioners.</abstract>
                <slug>bsidesluxembourg-2026-89149-what-you-see-is-not-what-you-get</slug>
                <track></track>
                
                <persons>
                    <person id='89636'>Xavier Mertens</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/HJHWDS/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/HJHWDS/feedback/</feedback_url>
            </event>
            <event guid='c9713f78-d231-58e9-8aa6-f84521b66d35' id='84865' code='PHH3EJ'>
                <room>Main Stage</room>
                <title>XCTDH Cross-Chain Transaction Data Hiding: Cyber Espionage and OPSEC Encounters</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T14:40:00+02:00</date>
                <start>14:40</start>
                <duration>00:40</duration>
                <abstract>This report presents the first documented analysis of Cross-Chain TxDataHiding (XCTDH), a novel command-and-control technique employed by DPRK-linked threat actors in cryptocurrency theft operations. The attack leverages multiple blockchain networks&#8212;TRON and Aptos as decentralized pointer systems, and Binance Smart Chain (BSC) for encrypted payload storage&#8212;to create virtually untraceable, takedown-proof malware infrastructure.Discovered during investigation of a malicious GitHub repository used in fake job recruitment campaigns, this technique represents a significant evolution from previously documented blockchain-based C2 methods. Unlike Etherhiding (which stores payloads in smart contract storage), XCTDH embeds malicious code within blockchain transaction input data across multiple chains, retrieved via standard RPC calls that are indistinguishable from legitimate cryptocurrency traffic.The attack chain begins with social engineering through fraudulent job postings, progresses through weaponized repositories containing heavily obfuscated JavaScript, and culminates in multi-stage payload delivery that evades modern EDR solutions. At an operational cost of approximately $1 USD, attackers establish resilient infrastructure that can dynamically update payloads, automatically failover between blockchain networks, and resist traditional takedown efforts&#8212;all while appearing as legitimate crypto wallet activity.This analysis details the technical mechanisms, attribution indicators linking the campaign to DPRK operations, economic asymmetries favoring attackers, and the strategic implications of blockchain-based C2 for the future threat landscape.</abstract>
                <slug>bsidesluxembourg-2026-84865-xctdh-cross-chain-transaction-data-hiding-cyber-espionage-and-opsec-encounters</slug>
                <track></track>
                
                <persons>
                    <person id='86073'>Ellis Stannard</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/PHH3EJ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/PHH3EJ/feedback/</feedback_url>
            </event>
            <event guid='1e14ba40-f04c-5d62-86a7-e881fe217689' id='92295' code='U7LPD7'>
                <room>Main Stage</room>
                <title>Startup Security 2020: Aged Like Wine or Milk?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T15:40:00+02:00</date>
                <start>15:40</start>
                <duration>00:40</duration>
                <abstract>What would you change if you could go back and rebuild your company&#8217;s security foundations from day one?

In 2020, I had the chance to build a security program from the ground up for a brand new company in the banking/fintech space. 

Some of the decisions we made aged well, and would still be relevant in 2026. 

Other decisions, or the lack of them, have not, or simply could not be made back then due to a different technological environment.

In this talk, we&apos;ll look at what worked great, what didn&apos;t, and what we&apos;d have to do differently if we tried again today.</abstract>
                <slug>bsidesluxembourg-2026-92295-startup-security-2020-aged-like-wine-or-milk</slug>
                <track></track>
                
                <persons>
                    <person id='92530'>Guillaume Ross</person>
                </persons>
                <language>en</language>
                <description>Building a new company in a highly regulated field facing &lt;buzzword&gt;sophisticated threat actors&lt;/buzzword&gt; brings its share of challenges, but also allows you to build things without worrying about legacy environments and problems. 

What you are building today will, however, become the legacy problem in the future.

Specifically, we will talk about decisions that were made in 2020 to build a secure company back then, and contrast that to 2026 and the decisions I believe we would make now.

Topics covered will include:

- Core architectural decisions that are &quot;one-way doors&quot;
- Programming languages and ecosystems
- Threat modeling from the beginning
- Immutable and ephemeral infrastructure
- Everything as code
- Identity
- Supply chain security and its downstream impact on endpoint security</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/U7LPD7/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/U7LPD7/feedback/</feedback_url>
            </event>
            <event guid='e50898b9-b767-589b-a274-9d48aaf3dc7f' id='85059' code='YHW98L'>
                <room>Main Stage</room>
                <title>Exploiting the Past: How Linguistic Redundancy weaponizes the Quantum Search Landscape</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T16:20:00+02:00</date>
                <start>16:20</start>
                <duration>00:40</duration>
                <abstract>What do _Niccol&#242; Machiavelli_ and _Grover&apos;s Algorithm_ have in common? More than you think. While one mastered the art of political manipulation in the 1500s, the other promises a quadratic speedup for quantum key search. But when these two worlds collide, something unexpected happens: **The quantum oracle misfires**.

In this talk, we build Grover search oracles directly from Renaissance Italian texts &#8212;
_Il Principe_, _Orlando Furioso_, _Il Cortegiano_, _I Ricordi_ &#8212; and measure exactly how much
linguistic redundancy contracts the cipher key space. We then simulate those oracles on a real quantum statevector and watch the standard iteration formula get it catastrophically wrong.

We will dive into:

- **The Corpus-Driven Oracle**: How character-level _n-gram_ redundancy defines the fraction of &quot;good&quot; keys _p_good_ &#8212; the sole parameter governing both classical exhaustive search and Grover oracle call count.
- **The Discrete Resonance Failure**: At one statistical threshold, the textbook formula predicts 2 optimal iterations. The real quantum simulation needs 24 &#8212; making quantum search **four times _slower_ than classical** at that point. We dissect why.
- **The L=600 Transition Zone**: An empirical anomaly where stylistic variance in 16th-century prose (Latin citations, proper-noun lists) creates a chaotic instability band that separates statistical noise from structural reality.
- **QUBO vs. Grover**: Why compressing a 23-letter alphabet to 7 letters breaks the annealer but leaves the quantum oracle unaffected &#8212; and what that tells us about attack-surface geometry.

Join us for a journey where orthography meets qubits, proving that whether you hold a quill or a
quantum processor, **redundancy is the enemy of secrecy &#8212; but discrete arithmetic is the enemy
of quantum speedup**.</abstract>
                <slug>bsidesluxembourg-2026-85059-exploiting-the-past-how-linguistic-redundancy-weaponizes-the-quantum-search-landscape</slug>
                <track></track>
                <logo>/media/bsidesluxembourg-2026/submissions/YHW98L/image_s30UzbD.webp</logo>
                <persons>
                    <person id='86237'>Alessio Di Santo</person><person id='93506'>Gabriella Lanziani</person>
                </persons>
                <language>en</language>
                <description>Cryptanalysis has always been a game of exploiting patterns. This session takes that principle
into quantum territory by pitting the rigid orthography of _Renaissance Italian_ against the
probabilistic mechanics of Grover amplitude amplification &#8212; and catching the algorithm in a
failure mode the textbook formula cannot predict.

### The Setup

We introduce a two-phase experimental framework built around a custom Python toolkit that
normalizes and models four 16th-century Italian corpora using character _n-gram_ language models.
Every candidate decryption key is scored against the corpus; the fraction of keys that score above
a statistical plausibility threshold &#8212; _p_good_ &#8212; becomes the marked fraction fed to the Grover
oracle. This transforms a linguistics measurement into a quantum complexity parameter.

**Phase 1** sweeps the full 23-letter alphabet across multiple cipher lengths and plausibility
thresholds, producing analytical Grover oracle estimates and classical exhaustive-search baselines.

**Phase 2** reduces the alphabet to 7 letters &#8212; making all 5 040 keys enumerable &#8212; and runs a
direct statevector simulation of Grover amplitude amplification. No analytical approximations.
Real quantum circuit behavior on a controlled key space.

### The Discovery: Discrete Resonance Failure

The headline finding is a failure mode the standard Boyer formula cannot anticipate. At one
threshold, _p_good_ produces an angle &#952; for which no small integer iteration count satisfies the
resonance condition. The formula confidently recommends stopping at iteration 2. The real
probability curve keeps oscillating and only peaks at iteration 24 &#8212; requiring 49 oracle calls
against a classical expectation of 12.5 trials. **Quantum loses by a factor of four.**

We walk through the forensic geometry of this collapse: why the sinusoidal Grover envelope
creates near-equal local maxima that fool the continuous approximation, and how to detect
near-resonant _p_good_ values before deploying the algorithm.

### The L=600 Anomaly

A separate empirical anomaly surfaces at cipher length L=600, where _p_good_ persistently
exceeds both shorter and longer ciphers across five of six tested thresholds. A targeted stability
analysis &#8212; sampling 20 distinct text segments at each length &#8212; identifies this as a **transition
zone of maximal within-length variance**: at L=600, local stylistic features of Renaissance prose
(Latin citations, enumerations, proper-noun clusters) produce segment-level fluctuations wide
enough to push _p_good_ above its expected trend. We show how to isolate structural data effects
from algorithmic noise.

### QUBO and the Landscape-Warping Effect

Parallel _Quadratic Unconstrained Binary Optimization_ (QUBO) annealing experiments reveal a
complementary insight: compressing a 23-letter alphabet to 7 letters cuts the trigram parameter
space by a factor of ~36, collapsing statistically distinct character patterns onto the same
symbols and creating **false energy attractors** &#8212; suboptimal keys surrounded by uphill barriers
the annealer cannot cross. The QUBO failure pattern inverts relative to the 23-letter case.
The Grover oracle, which only needs a binary marked/unmarked verdict, is structurally immune to
this distortion. The two attack paradigms probe entirely different properties of the key-score
landscape.

### What Attendees Will Take Away

1. How to construct a corpus-derived Grover oracle and measure _p_good_ empirically rather than
   assuming it.
2. How to detect discrete resonance conditions that cause the standard iteration formula to fail &#8212;
   and by how much.
3. Why reducing model complexity (smaller alphabet, lower-order n-grams) can **help** a quantum
   oracle while simultaneously **breaking** an annealing attack.
4. A reusable stability analysis method for distinguishing structural data features from
   algorithmic artefacts in any combinatorial search benchmark.

This talk is for anyone at the intersection of classical cryptanalysis, optimization heuristics,
and quantum security &#8212; no prior quantum computing background required.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YHW98L/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YHW98L/feedback/</feedback_url>
            </event>
            <event guid='679d179c-bd9f-5ba5-9703-ca31b2bdbd2e' id='93897' code='CAWHBG'>
                <room>Main Stage</room>
                <title>CTF Prize ceremony (and raffles if any etc.)</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T17:00:00+02:00</date>
                <start>17:00</start>
                <duration>00:15</duration>
                <abstract>This is where we hand out the awesome CTF prizes from SecuInfra and Defensive Security

the prizes: Secret until the CTF is published!</abstract>
                <slug>bsidesluxembourg-2026-93897-ctf-prize-ceremony-and-raffles-if-any-etc</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/CAWHBG/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/CAWHBG/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='IFEN room 1, Workshops and Detection Engineering village (Building D)' guid='d009362d-88e2-5587-ae2a-5051041602da'>
            <event guid='9f9f3536-275d-5fae-8dd5-60a4ddc7d6c9' id='90413' code='JUD9FP'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Mastering Incident Response with Kanvas</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>00:40</duration>
                <abstract>Imagine transforming chaotic incident response into a clear, visual story&#8212;no more spreadsheets, just streamlined collaboration and powerful timelines. Kanvas turns IR chaos into actionable insights, letting us map, share, and conquer incidents like never before. And the best thing, it&#8217;s Open-Source.</abstract>
                <slug>bsidesluxembourg-2026-90413-mastering-incident-response-with-kanvas</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='90743'>Ardit Beu</person>
                </persons>
                <language>en</language>
                <description>Stop wrestling with spreadsheets and disconnected tools. Kanvas brings your incident response to life.  Kanvas offers incident responders with an intuitive desktop workspace that unifies case management, timeline visualization, attack chain mapping, and threat intelligence lookups, all within a single, collaborative environment. See how Kanvas streamlines workflows, enables seamless multi-user collaboration, and exports powerful visuals for reporting. Whether you&#8217;re mapping MITRE ATT&amp;CK techniques, sanitizing sensitive data, or leveraging LLM assistance, Kanvas puts everything you need at your fingertips. Join this talk to discover how Kanvas is reshaping the way teams track, document, and conquer complex incident response and forensics.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links>
                    <link href="https://github.com/WithSecureLabs/Kanvas">Kanvas GitHub repo</link>
                </links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/JUD9FP/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/JUD9FP/feedback/</feedback_url>
            </event>
            <event guid='2bc99640-bfaf-5b6e-bf5e-b158cd9d5e00' id='94099' code='MB9KND'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Comprehensive Framework for Analyzing and Detecting Malicious Browser Extensions</title>
                <subtitle></subtitle>
                <type>Infosec lightning talks (6 x 5 minutes)</type>
                <date>2026-05-08T09:40:00+02:00</date>
                <start>09:40</start>
                <duration>00:30</duration>
                <abstract>Every day, millions of people rely on their web browsers, not only for work but also for study and daily life. Some of us also install browser extensions to utilize useful features. But what happens when those extensions are not as harmless as they seem?

In recent years, there has been a growing number of malicious browser extensions, particularly on platforms like the Chrome Web Store (CWS), affecting millions of users worldwide. Detecting these threats is not straightforward. Malicious extensions behave in many different and sometimes unpredictable ways. Another challenge is the limited availability of corresponding known malware samples, which restricts our ability to investigate these threats in depth. 

In this talk, I will share insights from my study that takes a closer look at this problem. I compiled a curated dataset of 460 malicious browser extensions removed from the CWS and analyzed how they behave. By integrating both static and dynamic analysis techniques, I identified a wide range of activities that raise privacy and security concerns, classified as tracking, redirecting, ad injecting, stealing, and unwanted actions. Leveraging static analysis using CodeQL and Python, the study could detect extensions setting cookies for external domains automatically.</abstract>
                <slug>bsidesluxembourg-2026-94099-comprehensive-framework-for-analyzing-and-detecting-malicious-browser-extensions</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='93963'>Van Nguyen</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/MB9KND/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/MB9KND/feedback/</feedback_url>
            </event>
            <event guid='d9315554-1d5d-549a-a1ee-2be16265161d' id='94131' code='K3C8T9'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Kunai: Open-Source Threat Detection on Linux</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T10:40:00+02:00</date>
                <start>10:40</start>
                <duration>00:40</duration>
                <abstract>This talk explores Kunai, an open-source security monitoring tool that brings threat-detection capabilities to Linux systems using eBPF technology. We begin with an overview of Kunai&apos;s purpose, architecture, and core monitoring capabilities. The session then dives into recent advancements, highlighting key features and improvements. Finally, we examine practical use cases in threat detection, incident response, and digital forensic analysis, demonstrating how Kunai enhances cyber incident investigations.</abstract>
                <slug>bsidesluxembourg-2026-94131-kunai-open-source-threat-detection-on-linux</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='94001'>Quentin JEROME</person>
                </persons>
                <language>en</language>
                <description>This talk presents Kunai, an open-source security monitoring tool developed in Luxembourg that brings Sysmon-like capabilities to Linux systems. Built specifically to address the often-overlooked security monitoring needs of Linux environments, Kunai leverages eBPF technology to provide comprehensive threat detection and incident response capabilities.

We&apos;ll explore how Kunai was designed from the ground up with incident response and threat detection requirements in mind, filling a critical gap in Linux security tooling. Given that Linux powers the majority of web-facing systems and cloud infrastructure, it has become a prime target for attackers - yet often lacks the sophisticated monitoring tools available for other platforms.

The session will cover Kunai&apos;s architecture, recent advancements, and practical applications including:
- Real-time threat detection across Linux environments
- Comprehensive event logging for incident investigations
- Container-aware monitoring capabilities
- Integration with existing security workflows

Attendees will learn how Kunai enhances visibility into Linux systems, enabling better threat detection, faster incident response, and more effective digital forensic analysis - all while maintaining the performance and reliability required for production environments.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/K3C8T9/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/K3C8T9/feedback/</feedback_url>
            </event>
            <event guid='1bce99ba-e171-5d3d-932d-aa53d4bd5e90' id='94139' code='LTSMAE'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Turbocharged SOC: DetectFlow and other innovative Open Source tools released by SOCPrime for detection engineering</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T11:20:00+02:00</date>
                <start>11:20</start>
                <duration>00:40</duration>
                <abstract>We will discuss practical use of open source tools for detection engineering built by SOC Prime team, including DetectFlow, Uncoder and how it combines with open source data pipeline stack like Kafka, Flink and Flink agent.  The goal of DetectFlow is to elevate role of Detection Engineers above SIEM stack, and gives us all signals, context, threat intelligence and building blocks to fully design and operate Detection and Response workflows. The architecture of Detection Pipelines furthermore&#160; makes work of Security Analysts curious and enjoyable again, as it eliminates large part of the routine work they did, and focuses on the main thing human does better than AI = understanding connections, specific to the cyber domain and specific to your organization. Our approach equips people to address tremendous complexity of the cyber domain, which now simply exceeds possible knowledge that any human can physically fit.</abstract>
                <slug>bsidesluxembourg-2026-94139-turbocharged-soc-detectflow-and-other-innovative-open-source-tools-released-by-socprime-for-detection-engineering</slug>
                <track>Actionable CTI and detection engineering village</track>
                <logo>/media/bsidesluxembourg-2026/submissions/LTSMAE/image_PnUujMJ.webp</logo>
                <persons>
                    <person id='94008'>Andrii Bezverkhyi</person>
                </persons>
                <language>en</language>
                <description>Open source DetectFlow turns Apache Kafka+Flink into a Detection Pipeline, adding 2-tier correlation, one for automated streaming of AI generated and human-made behavior Sigma rules mapped to ATT&amp;CK. This gives initial data labels and does not generate alerts. 2nd tier is a Flink agent which enables Agentic AI correlation across entire ATT&amp;CK,  Attack Flows and Attack Chains. This can be further refined and expanded by integrating with OpenTIDE. Attack Chains are made by human experts as a &quot;higher order Sigma rules&quot; correlating on ATT&amp;CK itself and lower level Sigma rule sequences. This together acts as a turbo-charger in front of SIEM engine, just like same thing in a car. With DetectFlow, which is essentially a low footprint, run anywhere provisioning tool with Agentic AI and MCP, we can run over 20,000 detection rules and nearly 500,000 behavior correlation patterns in front of ANY SIEM at millisecond speed. This exceeds capacity of any SIEM by 5 orders of magnitude. This shrinks mean time to detect and initial investigation stage from tens of minutes or even hours to a a few seconds. The conversion from raw log event to a tagged event is 7%, from a tagged event to an Attack Chain is 0.0007% or 0.00007 - and only that is alert material. This reduces the need to fine tune rules at DetectFlow level, as fine tuning becomes a context, which can be solved by any on premise AI Agent working with outputs of DetectFlow or SIEM. SIEM remains very useful for workflow, reporting, graph analysis and, for now, machine learning based anomaly detection, even though latter will move to pipelines too. It also takes care of data parsing via crowdsourcing and mapping via AI (can be ran locally).</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/LTSMAE/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/LTSMAE/feedback/</feedback_url>
            </event>
            <event guid='0e38bf3a-01b4-58cb-a2a3-60fe34aa532e' id='94138' code='YV7DJA'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Panel Discussion: The future of Detection Engineering</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>00:40</duration>
                <abstract>The purpose of this panel is discuss where the participants see the still-young, still-emergent discipline of Detection Engineering going.

The tools and know-how presented over the last 2 days in the village will be pitted against ideas from Diana (moderator) and the audience. 
The panelists will try to explore together how the detection engineering landscape might evolve over the next few years,</abstract>
                <slug>bsidesluxembourg-2026-94138-panel-discussion-the-future-of-detection-engineering</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    <person id='93138'>Diana Waithanji</person><person id='93489'>Ondrej Nekovar</person><person id='92828'>Remi Seguy</person><person id='94008'>Andrii Bezverkhyi</person>
                </persons>
                <language>en</language>
                <description>Panel discussion with leading Detection Engineering experts:

1. Ondrej Nekovar: Ondrej and the Boss have released innovative tooling and know-how on how to do detection engineering in 2026 in their talk - see &apos;CT(C)I-Driven detection against internal and external threats&apos;
2. Andrii Bezverkhyi: Found of SOCPrime, multiple innovative open-source tool releaser latest &apos;DetectFlow&apos; which enables detection engineering at the end of your pipeline before SIEM ingestion
3. Remi Seguy: Runs and operates the OpenTide project, which is a one-stop-shop for detection engineering teams and integrates with CTI and offensive teams + enables Multi-SOC collaboration</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YV7DJA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YV7DJA/feedback/</feedback_url>
            </event>
            <event guid='def10e4c-36e7-5f01-8610-40bfe925d3ed' id='89155' code='UCCYKR'>
                <room>IFEN room 1, Workshops and Detection Engineering village (Building D)</room>
                <title>Actionable CTI &amp; Detection Engineering village</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-08T14:10:00+02:00</date>
                <start>14:10</start>
                <duration>03:00</duration>
                <abstract>SOC cutting edge! 

The afternoon of May 8th will feature a &apos;village fair&apos; where the rooms will be split into demo &apos;Islands&apos;. 

The audience is invited to go see demos of the talks, tools, how-tos etc. presented over the last 1.5 days of the village! 
Go check out the tools and talks that you really liked, see how modern SOCs are run today.</abstract>
                <slug>bsidesluxembourg-2026-89155-0-actionable-cti-detection-engineering-village</slug>
                <track>Actionable CTI and detection engineering village</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>SOC cutting edge! 

The afternoon of May 8th will feature a &apos;village fair&apos; where the rooms will be split into demo &apos;Islands&apos;. 

The audience is invited to go see demos of the talks, tools, how-tos etc. presented over the last 1.5 days of the village! 
Go check out the tools and talks that you really liked, see how modern SOCs are run today.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/UCCYKR/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/UCCYKR/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='IFEN room 2, Workshops and AI Security Village  (Building D)' guid='a18bb72e-a1ae-5ea3-acfa-8ddd1c6b0d44'>
            <event guid='8943a40e-19f9-5591-bc0a-d99837bc9509' id='92923' code='PWM8ER'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>The High-Performance Fuel for Social Engineering (Now in AI Flavors!)</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>00:40</duration>
                <abstract>Every day, millions of data points about YOU, whether public, leaked, scraped, or sold, quietly feed into a largely legal ecosystem of personal information. For modern threat actors, Artificial Intelligence (AI) is no longer just a buzzword; it is a tool used to weaponize this data at scale against both individuals and their organisations. What once required a non-trivial skillset in OSINT and social engineering can now be executed by anyone with a prompt and a scraped data set (or worse, an autonomous team of AI agents).

This talk explores the intersection of privacy and offensive security, demonstrating how exposed personal information is harvested and amplified by AI to create highly convincing phishing, deepfake scams, and automated fraud. We will break down how your digital footprint becomes an attack surface and build a defensive strategy to counter it.

We will focus on helping individuals and security leaders identify the human exposure, human attack surface, and cyber risk. We will tie this into Cyber Threat Intelligence (CTI), with actionable techniques for the individual and the SOC alike. We&#8217;ll discuss practical tips to deal with exposure, limit data leakage, spot AI-driven targeting and explore actionable privacy practices, such as email masking, and ways to operationalize techniques and services to exercise your GDPR right to be forgotten. Attendees will leave with a clear understanding of the emerging threat landscape and the defensive techniques to remove or reduce the &quot;fuel&quot; attackers use in order for individuals and organizations to protect themselves.</abstract>
                <slug>bsidesluxembourg-2026-92923-the-high-performance-fuel-for-social-engineering-now-in-ai-flavors</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='90938'>Glen Sorensen</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/PWM8ER/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/PWM8ER/feedback/</feedback_url>
            </event>
            <event guid='38b0b89d-4810-5ad4-9b68-20723009aec2' id='90584' code='XXRJ8Z'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>The challenges of AI-as-a-Service logging</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T09:40:00+02:00</date>
                <start>09:40</start>
                <duration>00:40</duration>
                <abstract>AI-as-a-Service adoption is surging, yet 90% of it is unmanaged &apos;Shadow AI,&apos; leaving organizations exposed to novel threats like the OWASP LLM Top 10. This session dives into the critical gap in current AI logging platforms and APIs, detailing why traditional security controls fail and offering a path to centralized visibility for effective detection and response.</abstract>
                <slug>bsidesluxembourg-2026-90584-the-challenges-of-ai-as-a-service-logging</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='90917'>Jeremy Snyder</person>
                </persons>
                <language>en</language>
                <description>LLM logs are a subset of API logs, but they come from 2 different perspectives - client-side logs and server-side logs. 
    Add to that challenge that most logs aren&apos;t really designed for security analysis perspectives, and it becomes hard to know what to do and how to do it.
    Note - I gave a version of this talk at fwd:CloudSec North America 2025. https://www.youtube.com/watch?v=AccsDqmHPdU&amp;list=PLCPCP1pNWD7M-hHBOymDR5vkPib0tkZd9&amp;index=18</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/XXRJ8Z/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/XXRJ8Z/feedback/</feedback_url>
            </event>
            <event guid='e78b5665-3b65-5e35-a2c3-28b68f1160e5' id='94622' code='HCRD3Y'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>AI in Cybersecurity: How can we make best use of it?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T10:40:00+02:00</date>
                <start>10:40</start>
                <duration>00:40</duration>
                <abstract>This Birds of a Feather session will focus on how AI tools are being used to secure environments, the training necessary for teams to identify security issues and the impact of AI on job security for security jobs. Participants will discuss and share experiences on:

- AI Tools in Cybersecurity: Explore how AI tools are currently enhancing security and the most effective tools available today.
- Training and Skill Development: Discuss recommended training programs and certifications that help teams leverage AI in cybersecurity.
- Job Security and AI: Debate whether AI will replace certain roles or create new opportunities, and how professionals can stay relevant.

At the end of this session, participants will leave with ideas on using AI tools, available training for their teams, and strategies to remain irreplaceable in an AI-driven world.
This open discussion invites all cybersecurity professionals regardless of the experience level.</abstract>
                <slug>bsidesluxembourg-2026-94622-ai-in-cybersecurity-how-can-we-make-best-use-of-it</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='93138'>Diana Waithanji</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/HCRD3Y/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/HCRD3Y/feedback/</feedback_url>
            </event>
            <event guid='83d5cbce-2630-56d5-8967-a3822c00e006' id='89417' code='UGKRML'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>The Agent Had a Plan&#8212;So Did I: Top Attacks on OWASP Agentic AI Systems</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T11:20:00+02:00</date>
                <start>11:20</start>
                <duration>00:40</duration>
                <abstract>AI agents are different from regular LLM apps &#8212; they plan steps, call tools, and chase goals across multiple interactions. This added complexity introduces new kinds of security risks that aren&#8217;t widely understood yet.

In this talk, I&#8217;ll walk through demos of vulnerabilities from the OWASP Agentic AI Threats. These include goal hijacking, alignment faking, orchestration misuse, and time-based attacks that exploit how agents behave over multiple steps or sessions. I&#8217;ll show how attackers can trick agents into following the wrong goals, leaking data, or using tools in unsafe ways &#8212; all through practical examples.</abstract>
                <slug>bsidesluxembourg-2026-89417-the-agent-had-a-plan-so-did-i-top-attacks-on-owasp-agentic-ai-systems</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='88891'>Parth Shukla</person><person id='89865'>Nagarjun Rallapalli</person>
                </persons>
                <language>en</language>
                <description>Here&apos;s the flow:

Intro to Agentic AI Systems
- What are agentic AI systems?
- How do they differ from regular AI tools?
- Use cases / Popular frameworks: LangChain, AutoGen, BAML.

Vulnerabilities:
#1: Agent Goal and Instruction Manipulation
- Exploiting how attackers can manipulate AI agent goals and instructions to make them act against their intended purposes.

#2: Agent Temporal Manipulation and Time based attacks
- Exploiting time-dependent behaviors in AI agents to manipulate scheduling, timestamps, and decision-making, leading to desynchronization and timing attacks.

#3: Agent Orchestration and Multi-Agent Exploitation
- Exploiting vulnerabilities in how multiple AI agents interact, coordinate, and communicate, compromising entire agent networks.

#4: Checker-out-of-the-Loop Vulnerability
- Showing how agents can operate outside system limits without alerting human operators or oversight systems.

#5: Agent Covert Channel Exploitation
- Demonstrating how agents can exploit covert channels to leak data or escalate privileges without detection.

#6: Agent Alignment Faking
- Demonstrating how agents can fake adherence to rules during monitored phases but deviate when unmonitored.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/UGKRML/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/UGKRML/feedback/</feedback_url>
            </event>
            <event guid='e840ef78-9b96-50a1-87b1-7df966ed9790' id='96675' code='UEJDNE'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Building the Ultimate AI Firewall: Inside SovereignShield, IntentShield, and LogicShield</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>00:40</duration>
                <abstract>As AI agents evolve from simple chatbots into autonomous systems capable of executing code and making API calls, traditional security boundaries are failing. We can no longer rely on brittle regex filters or the &quot;black box&quot; safety rails of LLM providers. In this session, I will unveil the architecture behind the SovereignShield ecosystem a multi-layered, deterministic defense framework for modern AI applications. We will break down the engineering mechanics of our three core products: IntentShield (outbound action auditing), LogicShield (semantic enforcement), and the unified SovereignShield firewall.</abstract>
                <slug>bsidesluxembourg-2026-96675-building-the-ultimate-ai-firewall-inside-sovereignshield-intentshield-and-logicshield</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='96376'>mattijs moens</person>
                </persons>
                <language>en</language>
                <description>This 35-minute technical session is an architectural deep-dive into the SovereignShield product suite, designed to show developers and security engineers how to mathematically secure AI endpoints.

We will cover the ecosystem in three distinct technical phases:

**LogicShield: Securing the Cognitive Layer (10 mins)**

Why traditional syntax filters fail against semantic attacks (like prompt injection and jailbreaks).
How LogicShield enforces deterministic logical boundaries on AI reasoning before an output is even generated.

**IntentShield: Outbound Action Auditing (10 mins)**

The danger of autonomous AI agents executing destructive API commands or exfiltrating data.
Deep dive into the ActionParser and Conscience modules. How IntentShield intercepts, audits, and blocks malicious intent at the execution layer.

**SovereignShield: The Unified Firewall (10 mins)**

Bringing it all together. How the core SovereignShield layer acts as a bidirectional proxy.
Live architecture breakdown of our 4-layer defense model (Inbound Input Filtering + Outbound Action Auditing) protecting a production API.

**Conclusion &amp; Q&amp;A (5-10 mins)**

How the community can integrate the SovereignShield suite into their own LLM pipelines today.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/UEJDNE/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/UEJDNE/feedback/</feedback_url>
            </event>
            <event guid='5eefd719-05f3-5b2a-a038-879a677cb61e' id='96750' code='SDCESA'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Security for AI: AIDR Bastion as open source LLM firewall / AI prompts reverse proxy</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T14:10:00+02:00</date>
                <start>14:10</start>
                <duration>00:30</duration>
                <abstract>One of the top concerns in the age of AI is cyber attacks, and one of the weak links in defense is AI itself. From prompt injections to agents -self organizing into botnets or far worse, we need some basic level of security for any AI workloads. And while we have seen a cohort of startups being acquired in the space through 2025, is the issue really solved? Does security for AI has to be yet another budget spend, or can we do better with open source and open standards? We will discuss an open source project, AIDR bastion, which was made inside our own SOC and released to the world, things which work and shortcomings. Goal of the talk is to discuss issues and possibilities.</abstract>
                <slug>bsidesluxembourg-2026-96750-security-for-ai-aidr-bastion-as-open-source-llm-firewall-ai-prompts-reverse-proxy</slug>
                <track>AI Security Village</track>
                <logo>/media/bsidesluxembourg-2026/submissions/SDCESA/image_Iq3oeyc.webp</logo>
                <persons>
                    <person id='94008'>Andrii Bezverkhyi</person>
                </persons>
                <language>en</language>
                <description>AIDR bastion is an open source comprehensive GenAI protection system designed to safeguard against malicious prompts, injection attacks, and harmful content. Source code is available at GitHub: https://github.com/socprime/AIDR-Bastion 
The system incorporates multiple detection engines that operate sequentially to analyze and classify user inputs before reaching GenAI applications.

- The system supports Roota and Sigma rules, enabling the application of detection logic from multiple sources such as SigmaHQ (around 1,200 compatible free community Sigma rules available at release), SOC Prime (with up to 3,000 additional compatible rules), and other third-party repositories. Sigma rules can be applied to detect use cases where malware leverages a local LLM to generate malicious code for execution.
- SOC Prime Uncoder AI integration further extends functionality by translating Sigma rules into Semgrep format, providing standardized and reusable detection pipelines (requires a free account).
- Roota rules power the regex-based pipeline.
- The architecture supports rule extensibility, seamlessly integrating organization-specific signatures and external detection content.
- The system can also function as a local logging sensor, recording user and agent prompts and enabling diagnostics, incident discovery, and cyber attack investigation.
- Detection logic aligns with industry frameworks such as MITRE ATLAS and OWASP Top 10 for LLMs, ensuring standardized coverage against adversarial techniques.
- Actions include allow, block, or notify, depending on rule matches and policy configuration.
- This layered detection approach delivers defense-in-depth against evolving adversarial prompt engineering and other AI-focused attack vectors. Inspired by LlamaFirewall.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/SDCESA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/SDCESA/feedback/</feedback_url>
            </event>
            <event guid='f2e31181-6f32-5cc3-ad8c-ccf7989919cc' id='97333' code='SRHCSS'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Every Guardrail Everywhere All at Once: Designing and Testing Guardrails for LLM Applications</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T14:40:00+02:00</date>
                <start>14:40</start>
                <duration>00:40</duration>
                <abstract>GenAI applications have moved from being single prompt wrappers to long chains of LLM calls, tools, and agentic workflows. In these systems, guardrails cannot live on a single isolated prompt. They need to be designed based on how data flows through the application, how permissions are enforced, and which risks are relevant for the use case.

This talk shares practical experience from helping teams design and test guardrails for LLM applications. Prompt-based guardrails tend to fail under determined attackers, so they must be combined with application-level controls and feedback mechanisms that allow the system to detect and respond to prompt attacks.

Rather than evaluating models in isolation, the focus is on testing the application itself. This includes testing how inputs and outputs propagate through LLM chains, how intermediate results are reused, and how guardrails interact across different stages of a workflow. The talk shows how this can be tested in practice using spikee (https://spikee.ai), an open source tool built to test LLM applications for prompt-based attacks.</abstract>
                <slug>bsidesluxembourg-2026-97333-every-guardrail-everywhere-all-at-once-designing-and-testing-guardrails-for-llm-applications</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='96940'>Donato Capitella</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/SRHCSS/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/SRHCSS/feedback/</feedback_url>
            </event>
            <event guid='d7562e2b-dc04-51e2-a237-f776ca0f77b4' id='93021' code='8WLHGS'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>Building Secure AI: Making Threat Modeling a Core Part of Development</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T15:40:00+02:00</date>
                <start>15:40</start>
                <duration>00:40</duration>
                <abstract>As AI systems evolve, integrating security from the design phase is crucial, following the &quot;shift left&quot; approach to prevent vulnerabilities. This session offers an overview of threat modeling for AI systems, including organizing engaging sessions, using appropriate tools, and applying methodologies such as STRIDE. Participants will learn to proactively address security concerns and in turn ensure robust protection by identifying and mitigating potential threats specific to AI technologies - with reference to OWASP research. The session will also provide tips on making threat modeling sessions interesting and interactive in order to ensure active participation and effective outcomes. The goal is to make security a foundational element in AI system development rather than an afterthought.</abstract>
                <slug>bsidesluxembourg-2026-93021-building-secure-ai-making-threat-modeling-a-core-part-of-development</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='93138'>Diana Waithanji</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/8WLHGS/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/8WLHGS/feedback/</feedback_url>
            </event>
            <event guid='0db435a2-170c-5d87-a26e-9ecc26bf05e7' id='89418' code='8ACVB3'>
                <room>IFEN room 2, Workshops and AI Security Village  (Building D)</room>
                <title>AI Security Village - Open Village/Q&amp;A</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-08T16:20:00+02:00</date>
                <start>16:20</start>
                <duration>01:00</duration>
                <abstract>Event Strategy &amp; Structure

Core Mission: A 2-day, open-floor &quot;village&quot; dedicated to exploring real-world security risks in Agentic AI, Model Context Protocol (MCP) architectures, and LLM workflows.

Alignment: All content and threat models are strictly aligned with OWASP guidance (LLM Top 10 &amp; AI Security Exchange).

Dynamic Flow: Unlike traditional linear training, this is an exploratory space. The schedule is fluid; organizers will pivot topics, attack scenarios, and deep dives in real-time based on what attendees find most interesting.

Village Logistics

Open Access: The village runs continuously for two days with no fixed start/stop times.
Drop-in Format: Attendees are free to enter, observe, leave, and return at will. This supports the casual, &quot;hallway con&quot; culture of BSides events.
Parallel Tracks: Multiple activities (demos, labs, discussions) happen simultaneously, allowing for natural scaling of depth from beginner to advanced levels.

Organizer Responsibilities (The Blue Team/Red Team)

Live Operations: Organizers act as facilitators, maintaining intentionally vulnerable infrastructure (LLMs, RAG pipelines, Autonomous Agents, MCP Servers).

Interactive Walkthroughs: Instead of formal talks, organizers provide short, continuous breakdowns of attacks, explaining why a specific trust boundary failed or how a design choice created a vulnerability.

Adaptive Defense: Based on audience feedback, organizers will live-patch systems or remove mitigations to demonstrate how security controls impact attack feasibility.

Attendee Experience (The Red Team)
Hands-on Exploitation: Attendees can directly interact with deployed systems to attempt prompt injection, logic-based attacks, and tool abuse.
Feedback Loop: Attendees actively shape the curriculum by voting on which systems to attack next or requesting deeper focus on specific failure modes.
Collaborative Defense: A key component is discussing defenses; attendees can propose architecture changes or guardrails, which organizers can discuss or implement live.

Hands-on Labs &amp; Infrastructure
Self-Paced Playgrounds: Dedicated stations will run continuously for independent learning.
Dreadnode Crucible: Focuses on practical exploitation of LLMs and agents.
Lakera Gandalf / Agent Breaker: Gamified challenges covering prompt injection, goal hijacking, and instruction drift.
Purpose: These labs ensure that even if the live demo is advanced, beginners have a place to start learning fundamentals.

Agenda: 

Breaking LLM Systems
Theme: Fundamentals of LLM vulnerabilities and the OWASP LLM Top 10.
Live Targets: Minimalist LLM deployments and chat interfaces.
Deep Dives:
Guardrails: Examining internal mechanics and demonstrating how to bypass practical limitations.
RAG Security: attacking Vector Databases and poisoning retrieval contexts (RAG-specific threats).

Agenda: Agentic AI &amp; MCP Security
Theme: The core focus of the village&#8212;Autonomous Agents and the Model Context Protocol (MCP).
Complex Workflows: Demos will feature multi-step agents that can plan, execute, and interact with external tools.
Key Attack Vectors:
Instruction Hijacking: Forcing an agent to deviate from its original goal.
Tool Abuse: Exploiting over-privileged MCP capabilities (e.g., an agent with unrestricted file access).
Trust Boundaries: Analyzing failures in the handshake between Agents and MCP servers.</abstract>
                <slug>bsidesluxembourg-2026-89418-0-ai-security-village-open-village-q-a</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='88891'>Parth Shukla</person><person id='89865'>Nagarjun Rallapalli</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/8ACVB3/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/8ACVB3/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='IFEN room 3 Workshops and AI Security Village (Building D)' guid='3ecced5f-5a05-593c-a612-364a5528f8d3'>
            <event guid='38a20e1b-f11c-57ae-b875-2fdecb6f2747' id='93488' code='HY3QBJ'>
                <room>IFEN room 3 Workshops and AI Security Village (Building D)</room>
                <title>AI Security village - technical training and implementation</title>
                <subtitle></subtitle>
                <type>Village, 2d (2days x 8h)</type>
                <date>2026-05-08T09:00:00+02:00</date>
                <start>09:00</start>
                <duration>03:00</duration>
                <abstract>The technical track of the AI security village</abstract>
                <slug>bsidesluxembourg-2026-93488-1-ai-security-village-technical-training-and-implementation</slug>
                <track>AI Security Village</track>
                
                <persons>
                    <person id='88891'>Parth Shukla</person><person id='89865'>Nagarjun Rallapalli</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/HY3QBJ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/HY3QBJ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)' guid='6d57f409-6e10-5f49-9eb1-79fd7d149da7'>
            <event guid='25bba9c7-3080-5d35-b15b-c044e6231c71' id='90638' code='YGC7EA'>
                <room>Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)</room>
                <title>Dismantle The Bomb</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-08T10:00:00+02:00</date>
                <start>10:00</start>
                <duration>02:00</duration>
                <abstract>Dismantle the bomb by performng different taks</abstract>
                <slug>bsidesluxembourg-2026-90638-5-dismantle-the-bomb</slug>
                <track>Escape games!</track>
                
                <persons>
                    <person id='90958'>Stijn Tomme</person>
                </persons>
                <language>en</language>
                <description>Dismantle the bomb by performing different taks. The tasks will include:
- Solving ciphers
- Being genuine with a special flashlight
- lock picking 
- make a key with a lishi tool
- ...</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/feedback/</feedback_url>
            </event>
            <event guid='7122c32c-0e57-54b7-a432-22efd28bb9d3' id='90638' code='YGC7EA'>
                <room>Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)</room>
                <title>Dismantle The Bomb</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-08T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>02:00</duration>
                <abstract>Dismantle the bomb by performng different taks</abstract>
                <slug>bsidesluxembourg-2026-90638-6-dismantle-the-bomb</slug>
                <track>Escape games!</track>
                
                <persons>
                    <person id='90958'>Stijn Tomme</person>
                </persons>
                <language>en</language>
                <description>Dismantle the bomb by performing different taks. The tasks will include:
- Solving ciphers
- Being genuine with a special flashlight
- lock picking 
- make a key with a lishi tool
- ...</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/feedback/</feedback_url>
            </event>
            <event guid='b9f1b007-4ad3-534f-922a-231429249277' id='90638' code='YGC7EA'>
                <room>Workshops May 6th, Speaker&apos;s room May 7+8th (C1.02.13)</room>
                <title>Dismantle The Bomb</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-08T15:35:00+02:00</date>
                <start>15:35</start>
                <duration>02:00</duration>
                <abstract>Dismantle the bomb by performng different taks</abstract>
                <slug>bsidesluxembourg-2026-90638-7-dismantle-the-bomb</slug>
                <track>Escape games!</track>
                
                <persons>
                    <person id='90958'>Stijn Tomme</person>
                </persons>
                <language>en</language>
                <description>Dismantle the bomb by performing different taks. The tasks will include:
- Solving ciphers
- Being genuine with a special flashlight
- lock picking 
- make a key with a lishi tool
- ...</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/YGC7EA/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops and Stage - Design Space (C1.05.12)' guid='1d52d5bc-e122-502d-8a62-7079b3f6d4a3'>
            <event guid='b336dc18-622e-5594-a822-ce84c82129ae' id='90255' code='LKLWWX'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Spreading malware with USB keys - does it still work ?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T09:40:00+02:00</date>
                <start>09:40</start>
                <duration>00:40</duration>
                <abstract>Does end-users spontaneously connect USB sticks fiund in public places to their personal or professional computers ? 

To this end, a controlled experiment was carried out in Luxembourg, where 250 USB sticks were voluntarily &#8220;lost&#8221;. The results revealed a high success rate, estimated around 20%, with the first connection recorded in just a few minutes. We believe that these users are acting out of curiosity or altruistic intent, seeking to identify or restore the owner of the key. 

However, they do not perceive the risks associated with their gesture. The study highlights the persistence of USB key attacks as an effective intrusion vector, and underscores the need to make users more aware of the dangers they represent.</abstract>
                <slug>bsidesluxembourg-2026-90255-spreading-malware-with-usb-keys-does-it-still-work</slug>
                <track></track>
                
                <persons>
                    <person id='90620'>Didier Barzin</person><person id='90655'>Mathieu Vajou</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/LKLWWX/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/LKLWWX/feedback/</feedback_url>
            </event>
            <event guid='f94cfa0c-2b1f-550f-97da-2176bf28b046' id='92264' code='SSCME8'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Forensic Challenges in Real-World Cases of Digital Manipulation</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T10:40:00+02:00</date>
                <start>10:40</start>
                <duration>00:40</duration>
                <abstract>With a 308% increase in AI-generated fake content between 2024 and 2025, the justice system faces an authenticity crisis. This talk explores real-world cases: from voice cloning for scams in Brazil to lack of a convergent pattern in spoofing crime investigations in Portugal, how can we empower professionals to identify synthetic evidence and understand the limits of the admissibility of expert evidence in the age of Artificial Intelligence?</abstract>
                <slug>bsidesluxembourg-2026-92264-forensic-challenges-in-real-world-cases-of-digital-manipulation</slug>
                <track></track>
                
                <persons>
                    <person id='92499'>Thiago Vieira</person>
                </persons>
                <language>en</language>
                <description>Case Study: Portugal (Spoofing &amp; Investigation)
The Challenge: Real case with no &quot;convergent pattern.&quot; Calls that can originate abroad with forged national IDs, making it impossible for local operators to assign responsibility or for investigators to find a consistent &quot;fingerprint.&quot; What impact it does to the 

Case Study: Brazil (Vishing)
The Mechanism: Scammers harvest video from old people and make loans on their behalf.
Impact: Financial losses in Brazil due to digital fraud reached R$10.1 billion in late 2024. Half of all fraud attempts in 2025 were linked to &quot;vishing&quot; and social engineering.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/SSCME8/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/SSCME8/feedback/</feedback_url>
            </event>
            <event guid='07600967-1b7f-5e30-8dd1-0787f1b79748' id='96448' code='QPVJLF'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>500 Incidents Later: Real-World Cyber Defense</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T11:20:00+02:00</date>
                <start>11:20</start>
                <duration>00:40</duration>
                <abstract>**Our CSIRT found that in 4 out of 5 security incidents, there were pre-existing alerts.**

Most organizations don&apos;t get breached because they lack tools. They get breached because of predictable, repeatable mistakes. The kind our SOC and CSIRT teams at ACEN see across 500+ incidents in European organizations.

This session breaks down the patterns and numbers that matter: where attackers consistently get in, what organizations consistently miss, how many hours go into responding to an incident, and what separates the ones that contain a breach from the ones that don&apos;t.</abstract>
                <slug>bsidesluxembourg-2026-96448-500-incidents-later-real-world-cyber-defense</slug>
                <track></track>
                
                <persons>
                    <person id='96167'>Federico</person>
                </persons>
                <language>en</language>
                <description>When you provide security at scale, it&apos;s critical to identify patterns and what actually works.
At ACEN, our SOC and CSIRT teams have handled over 500 security incidents and currently protect more than 40 organizations on a daily basis.  That hands-on experience has taught us what works, what doesn&apos;t, and how to avoid the pitfalls that lead to a breach.

In this session you&apos;ll discover:
- **Statistics from the trenches:** Incident patterns and data from real European cases, straight from our experience.
- **Real-world case studies:** Common attack scenarios, walked through step by step, showing exactly what went wrong.
- **How to avoid common pitfalls:** The key missteps organizations make and how to prevent them.
- **A proactive approach:** How these incidents could have been prevented, and how that same thinking can protect your organization.

You&apos;ll leave with a clear plan to improve your security posture, and the right questions to ask before someone else finds the gaps first.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/QPVJLF/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/QPVJLF/feedback/</feedback_url>
            </event>
            <event guid='cd6e984f-f329-55c9-815c-79d2de3c9bf8' id='93085' code='L9Y9PM'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Third Party Risk Management</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>00:40</duration>
                <abstract>Identifying and managing the third party risk while continuing to comply with business needs and regulatory requirements.</abstract>
                <slug>bsidesluxembourg-2026-93085-third-party-risk-management</slug>
                <track></track>
                
                <persons>
                    <person id='93198'>Jyoti Upadhyay</person><person id='96481'>Parveen Rajpurohit</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/L9Y9PM/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/L9Y9PM/feedback/</feedback_url>
            </event>
            <event guid='b66415f4-502c-5ee5-b0cc-e8ecf353bf94' id='92823' code='CERTQC'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Agnoletti &amp; Trump:  Gaming Playing to Win at Cyber</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T14:10:00+02:00</date>
                <start>14:10</start>
                <duration>00:40</duration>
                <abstract>Two blokes. One strategy. Train to Win or don&#8217;t bother playing

There is little excuse for organisational failure when executing incident response as nearly every possible cyber security scenario has not only been documented but could be &quot;role played&quot;  by your team well in advance of an actual incident.

Join Klaus Agnoletti &amp; Ian Thornton-Trump for a talk focused on creating role playing experiences for your organization - based on the latest adversary threat intel. 

Specific Take Aways include:
- Listening at the Door
 - Is there a sleeping Panda, Kitten,  Bear or Spider lurking in the network?
- Checking for Traps
  - Can IR activities be carried out without alerting the threat actor?
- Containment
 - Can the threat actor be contained, or will they run and bring in reinforcements?
- Clearing the Room
 - The threat actor may put up a fight, do you need to bring in additional help?
- Looting the Room
 - The treasure is the experience, the coin is your pay check

A hilarious RPG focused talk combining the best elements of scenario driven IR training with a creative spin.</abstract>
                <slug>bsidesluxembourg-2026-92823-agnoletti-trump-gaming-playing-to-win-at-cyber</slug>
                <track></track>
                
                <persons>
                    <person id='93002'>Klaus Agnoletti</person><person id='93122'>Ian Thornton-Trump</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/CERTQC/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/CERTQC/feedback/</feedback_url>
            </event>
            <event guid='41606a6d-2f79-55f4-8c81-dd2a2fccacf3' id='89734' code='KFW9CC'>
                <room>Workshops and Stage - Design Space (C1.05.12)</room>
                <title>Weaponizing PDF Files: Advanced Exploitation Techniques for Red Teams</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T15:40:00+02:00</date>
                <start>15:40</start>
                <duration>00:40</duration>
                <abstract>This is a hands-on presentation that will guide you through the world of PDF exploitation, showcasing how this ubiquitous document format can serve as a vessel for malicious JavaScript malware. Dive into real-world vulnerabilities that have been leveraged to execute harmful code directly through PDF files posing major threats in today&apos;s cybersecurity landscape.

Key exploit techniques explored will include:

Data Exfiltration Tactics: Discover methods for covertly extracting sensitive data, such as email addresses and system information, from unsuspecting users.
Embedding Malware in PDFs: Learn how adversaries embed malicious scripts within PDF files, tricking users into triggering exploits in Adobe Reader through typical file interactions.
We&apos;ll dissect techniques including shellcode injection, buffer overflow attacks, Adobe Reader exploitation, and memory manipulation each engineered to deliver and execute malware efficiently.

This session is ideal for offensive security professionals, penetration testers, and threat emulation experts seeking to elevate their understanding of PDF-based threats and enhance their testing skills. Uncover how these sophisticated attacks work and walk away with actionable strategies to counter them.

More information about the presentation can be found in this article: https://labs.segura.blog/unmasking-the-threat-a-deep-dive-into-the-pdf-malicious-2/</abstract>
                <slug>bsidesluxembourg-2026-89734-weaponizing-pdf-files-advanced-exploitation-techniques-for-red-teams</slug>
                <track></track>
                
                <persons>
                    <person id='90133'>Filipi Pires</person>
                </persons>
                <language>en</language>
                <description>Outline
1. Introduction
- Welcome &amp; Objectives
- Importance of PDF Security in Today&#8217;s Threat Landscape
Overview of Hands-On Approach
2. Anatomy of a PDF File
- PDF File Structure Overview
- Common Features Abused by Attackers
- JavaScript Capabilities Within PDFs
3. Real-World Vulnerabilities
- Demo: Analyzing a Malicious PDF Sample
4. Key Exploit Techniques
- Heap Spray Attacks
- Concept and Mechanism
- Demo: Shellcode Injection via Heap Spray
- Data Exfiltration Tactics
- Covert Data Extraction Methods
- Demo: Harvesting User Data from PDF Interaction
- Embedding Malware in PDFs
- Techniques for Payload Embedding
- Demo: Triggering Exploits Through User Actions
5. Advanced Attack Vectors
- Shellcode Injection &amp; Buffer Overflows
- Memory Manipulation in Adobe Reader
- Demo: Exploiting Adobe Reader Vulnerabilities
6. Hands-On Exercise
- Guided Lab: Analyzing and Crafting Malicious PDFs
- Indicators of Compromise (IoCs)
- Safe Testing Practices</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/KFW9CC/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/KFW9CC/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshops and Stage - Gernsback (C1.05.02)' guid='b84d3f24-c35e-59bb-96b9-3b07464f6ab1'>
            <event guid='9c9a739e-23a2-5dff-abb1-91f32223af18' id='85260' code='7DGVSU'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>Curating Secure Software: The Art of Selecting Safe Dependencies</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T09:40:00+02:00</date>
                <start>09:40</start>
                <duration>00:40</duration>
                <abstract>Imagine curating an art gallery&#8212;you wouldn&#8217;t hang just any painting on the wall. Each piece is carefully selected, verified for authenticity, and preserved to ensure a valuable experience for visitors. The same meticulous approach applies to software development.
Secure curation of open source isn&#8217;t about stifling creativity; it&#8217;s about ensuring that the dependencies we bring into our applications are secure, well-maintained, and reliable. As an art curator protects against forgeries and deterioration, developers must assess third-party components for malware, tampering, vulnerabilities, licensing risks, and long-term sustainability.
This talk will explore why curation is the foundation of secure software supply chains. We&#8217;ll discuss practical strategies for evaluating dependencies, maintaining a trusted repository, and leveraging free tools to automate the process. By adopting a safe curation mindset, developers can sleep better at night, knowing their applications rest on a foundation of safe, high-quality components.</abstract>
                <slug>bsidesluxembourg-2026-85260-curating-secure-software-the-art-of-selecting-safe-dependencies</slug>
                <track>Secure Development track</track>
                
                <persons>
                    <person id='86386'>Kadi McKean</person><person id='86387'>Frithjof Hoffmann</person>
                </persons>
                <language>en</language>
                <description>Curating software is like curating art&#8212;every dependency must be verified, authentic, and secure. This talk explores how careful selection, evaluation, and automation can help developers build safer apps and maintain a strong, trustworthy software supply chain.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/7DGVSU/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/7DGVSU/feedback/</feedback_url>
            </event>
            <event guid='be43d266-039e-535f-b043-c8939f86a0cc' id='92248' code='8LNSCC'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>Spyware: The Invisible Threat</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T10:40:00+02:00</date>
                <start>10:40</start>
                <duration>00:40</duration>
                <abstract>Commercial spyware like Pegasus can compromise mobile devices without any user interaction (zero-click attacks) that bypass traditional security. 
With thousands of confirmed infections and 50,000 suspected targets since 2016, this threat extends beyond journalists and activists to strategic sectors: energy, transport, telecommunications, and defence. 
Learn how nation-state spyware works, see real evidence of infections, and discover how forensic-grade detection tools can protect executive teams and board members in high-value organisations.</abstract>
                <slug>bsidesluxembourg-2026-92248-spyware-the-invisible-threat</slug>
                <track></track>
                
                <persons>
                    <person id='92485'>Julien vander Straeten</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/8LNSCC/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/8LNSCC/feedback/</feedback_url>
            </event>
            <event guid='e9340e13-d7e1-56e2-89cb-1393cf8643bc' id='86901' code='DL9Z8C'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>From Phishing to Mitigation: An Early-Career Incident Response</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T11:20:00+02:00</date>
                <start>11:20</start>
                <duration>00:40</duration>
                <abstract>Early in my career, while working as a junior engineer at an emerging AI startup in Seattle, Washington, USA, during the first wave of commercial AI adoption, our company suddenly became the target of an extreme and highly disruptive phishing campaign. Shortly after we received public attention as a &#8220;hot startup,&#8221; phishing volume surged to the point that it flooded employee mailboxes and interfered with normal operations. The messages were convincing enough that at one point an employee ran through the office claiming that our CEO was stranded at an airport and urgently needed financial help.

What initially felt like an uncontrollable background problem became a significant security and operational risk. Rather than accepting it as inevitable, we began analyzing the phishing emails in detail&#8212; treating them as data rather than noise. By correlating sender IP addresses and examining publicly available IP allocation and routing information, we discovered that although the emails appeared to originate from many different sources, the traffic consistently traced back to a small number of allocated IP blocks.

We mitigated the immediate risk by blocking those ranges at the email gateway, which dramatically reduced the volume of phishing. Digging further into the upstream infrastructure revealed that the IP space was associated with a data center in Luxembourg, operating email security and anti-spam systems. At the time, I was in the process of reclaiming my Luxembourg citizenship through ancestry on my mother&apos;s side, and the situation prompted a different line of thinking: if similar infrastructure under my supervision was being abused, I would want to know about it.

Instead of assuming malicious intent, we reached out directly to the infrastructure operator, shared sanitized examples of the phishing messages, and coordinated a responsible disclosure. Despite internal skepticism that this amounted to &#8220;talking to the attackers,&#8221; the response was professional, the issue was investigated, and the phishing activity largely stopped. We also filed a report with the regional internet registry.

Looking back, this incident shaped how I think about security problems that seem impossible or overwhelming. Not every issue is solved with more tooling or escalation. Sometimes, careful deduction paired with human communication and empathy can break deadlocks that technology alone cannot.</abstract>
                <slug>bsidesluxembourg-2026-86901-from-phishing-to-mitigation-an-early-career-incident-response</slug>
                <track></track>
                
                <persons>
                    <person id='87795'>Chris Beckman</person>
                </persons>
                <language>en</language>
                <description>A recounting of an early-career security incident involving a disruptive phishing campaign, traced through IP allocation data and addressed through responsible disclosure with upstream infrastructure &#8212;highlighting how technical analysis and human communication helped resolve a problem that initially felt unsolvable.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/DL9Z8C/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/DL9Z8C/feedback/</feedback_url>
            </event>
            <event guid='14f4c713-2e6a-5775-94cd-0198458f2f9d' id='94029' code='ZQWC7Y'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>Building vs. Buying &#8211; A Tale of Developing an In-House SCA Tool</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T13:30:00+02:00</date>
                <start>13:30</start>
                <duration>00:40</duration>
                <abstract>Most organizations run Software Composition Analysis, yet very few actually use the results effectively. Alerts pile up, developers ignore findings, and security teams drown in noise.

This talk tells the story of building an in-house SCA platform from scratch using open-source tooling, designed to scale across large organizations while focusing on what actually matters. We&#8217;ll explore how to normalize results, prioritize vulnerabilities based on real risk, and integrate SCA into CI/CD in a way developers don&#8217;t hate.

Backed by real production usage and a live demo, this session focuses on practical techniques, not theory, to turn SCA from a checkbox into something teams can act on. Attendees will leave with ideas, patterns, and open-source approaches they can apply immediately.</abstract>
                <slug>bsidesluxembourg-2026-94029-building-vs-buying-a-tale-of-developing-an-in-house-sca-tool</slug>
                <track>Secure Development track</track>
                
                <persons>
                    <person id='93906'>Diogo Lemos</person>
                </persons>
                <language>en</language>
                <description>In this session, I will take the audience through the complete journey of designing, building, and deploying an open-source Software Composition Analysis (SCA) tool from scratch. I will start by highlighting the common challenges teams face when using commercial SCA tools, such as opaque scoring systems, overwhelming volumes of alerts, inconsistent results across different repositories and ecosystems, and the difficulty in prioritizing what matters most. I will explain the motivation behind building an in-house, open-source tool: to give security and development teams transparency, control, and flexibility, and to create a practical, actionable approach to managing dependencies at scale.

Next, I will dive into the technical architecture and design decisions that guided the tool&#8217;s development, showing how it discovers dependencies, including transitive ones, across multiple ecosystems. I will cover how the tool integrates public vulnerability sources, including CVE databases, advisories, and metadata, and how it normalizes results to provide consistent, actionable insights. I will explain the scoring system we developed to prioritize vulnerabilities based on severity, exploitability, and update cadence, enabling teams to focus on what actually matters.

The session will include a live demo showing a real repository being scanned, vulnerabilities being discovered, scored, and surfaced in dashboards. I will walk through how results are integrated into CI/CD pipelines to block risky builds, automate updates, and generate actionable reports for developers. Along the way, I will share lessons learned from real-world deployment, including challenges in adoption, maintaining open-source tools, and improving developer engagement.

By the end of the session, attendees will understand the full lifecycle of building and using an open-source SCA tool, including practical integration strategies, risk prioritization techniques, and how to deploy it effectively in their own environments. I will provide links to the open-source code and supporting materials, so participants can explore and experiment immediately.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/ZQWC7Y/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/ZQWC7Y/feedback/</feedback_url>
            </event>
            <event guid='8b121069-db84-552e-9504-affbf21172b3' id='85028' code='LHVQCJ'>
                <room>Workshops and Stage - Gernsback (C1.05.02)</room>
                <title>What&apos;s Old is New: Exploiting Classic Vulnerabilities in GraphQL APIs</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-05-08T14:45:00+02:00</date>
                <start>14:45</start>
                <duration>00:35</duration>
                <abstract>SQL injection and broken authentication remain persistent threats in modern web applications, yet many developers continue to assume that new technologies are immune to classic attacks. This presentation examines a real-world penetration test where we discovered critical SQL injection and authentication bypass vulnerabilities in a production GraphQL API backed by PostgreSQL&#8212;proving that architectural shifts don&apos;t eliminate fundamental security flaws.</abstract>
                <slug>bsidesluxembourg-2026-85028-what-s-old-is-new-exploiting-classic-vulnerabilities-in-graphql-apis</slug>
                <track>Secure Development track</track>
                
                <persons>
                    <person id='86205'>Aleksa Zatezalo</person>
                </persons>
                <language>en</language>
                <description>Organizations migrating to GraphQL often operate under a false sense of security, believing modern frameworks inherently protect against legacy vulnerabilities. This case study proves otherwise.

We&apos;ll walk through the complete exploitation chain&#8212;from GraphQL schema enumeration and identifying injection points in resolvers, to executing time-based blind SQL injection that achieved PostgreSQL superuser access. We&apos;ll also demonstrate how broken authentication patterns in GraphQL&apos;s authorization layer enabled unauthorized data access. 

The talk will include a live demo of GrapeQL, an open-source tool for automated GraphQL vulnerability scanning, with practical demonstrations of effective testing workflows. Attendees will learn GraphQL-specific mitigation strategies including parameterized queries in resolvers, proper input validation for nested structures, resolver-level authorization, rate/depth limiting, and security-focused schema design patterns.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/LHVQCJ/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/LHVQCJ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='CTF players room (C1.03.05 6+8th or C1.04.02 7th)' guid='9a60e791-5cf1-5ead-a5d6-59d101667e5a'>
            <event guid='c2f0a07d-b927-5551-9c29-66067e72880d' id='92883' code='MXSRZ9'>
                <room>CTF players room (C1.03.05 6+8th or C1.04.02 7th)</room>
                <title>BsidesLuxembourg 2026 CTF Walkthrough Session</title>
                <subtitle></subtitle>
                <type>Workshop 2h</type>
                <date>2026-05-08T14:00:00+02:00</date>
                <start>14:00</start>
                <duration>02:00</duration>
                <abstract>The BSides CTF Walkthrough Session is a live, introductory tour of some of the selected challenges of this yearly BSides Luxembourg Capture-the-Flag competition. During this interactive activity, we will not walk through every challenge step by step, instead we will very specifically discuss the tasks that the participants found most interesting and frustrating, this could be a web exploit, LPE, OSINT or crypto puzzle, so that by the end of the session both those with little experience and those with more experience have a more overall idea of how to think during a CTF.</abstract>
                <slug>bsidesluxembourg-2026-92883-bsidesluxembourg-2026-ctf-walkthrough-session</slug>
                <track></track>
                
                <persons>
                    <person id='93035'>MUHAMMED WASEEM VILLAN</person>
                </persons>
                <language>en</language>
                <description>Instead of a lecture where the speaker tells the audience all the answers, the session is constructed in a form of a conversation with the players of the CTF. We will begin with a brief summary of the BSides Luxembourg 2026 CTF: types, difficulty tiers, and some statistics (solves, first bloods, most/least solved challenges). Following that, it will be audience-driven: we will request the participants to tell which issues they would like to rediscover and then untie them, on the spot.

For each chosen challenge, we will:

- Explain the core idea and what clue in the statement pointed to it.
- Show the critical steps of the solution, highlighting typical mistakes and dead ends.
- Discuss alternative approaches, tooling, and how similar bugs appear in real&#8209;world systems.

This formatting allows the session to be useful regardless of whether you were able to solve many flags or couldn&apos;t get through: you can take your questions, learn how other people tackled the same problem, and learn useful tips on how to solve CTF problems practically, which you can apply to future CTF events.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsidesluxembourg-2026/talk/MXSRZ9/</url>
                <feedback_url>https://pretalx.com/bsidesluxembourg-2026/talk/MXSRZ9/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
