BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesluxembourg-2026//speaker//UFEVPR
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-VEEKAR@pretalx.com
DTSTART;TZID=CET:20260507T162000
DTEND;TZID=CET:20260507T170000
DESCRIPTION:Infostealers silently harvest credentials\, cookies\, and sensi
 tive data. This session demonstrates how to emulate infostealer behavior b
 rowser data theft\, keylogging\, clipboard monitoring\, credential dumping
  to validate whether your endpoint controls\, DLP\, and network monitoring
  would detect the theft and exfiltration. Learn to test your defenses agai
 nst one of the most prevalent and damaging threat categories.
DTSTAMP:20260502T115827Z
LOCATION:Workshops and Stage - Design Space (C1.05.12)
SUMMARY:Infostealer Emulation: Validating Detection of Credential Theft - F
 ilipi Pires
URL:https://pretalx.com/bsidesluxembourg-2026/talk/VEEKAR/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidesluxembourg-2026-KFW9CC@pretalx.com
DTSTART;TZID=CET:20260508T154000
DTEND;TZID=CET:20260508T162000
DESCRIPTION:This is a hands-on presentation that will guide you through the
  world of PDF exploitation\, showcasing how this ubiquitous document forma
 t can serve as a vessel for malicious JavaScript malware. Dive into real-w
 orld vulnerabilities that have been leveraged to execute harmful code dire
 ctly through PDF files posing major threats in today's cybersecurity lands
 cape.\n\nKey exploit techniques explored will include:\n\nData Exfiltratio
 n Tactics: Discover methods for covertly extracting sensitive data\, such 
 as email addresses and system information\, from unsuspecting users.\nEmbe
 dding Malware in PDFs: Learn how adversaries embed malicious scripts withi
 n PDF files\, tricking users into triggering exploits in Adobe Reader thro
 ugh typical file interactions.\nWe'll dissect techniques including shellco
 de injection\, buffer overflow attacks\, Adobe Reader exploitation\, and m
 emory manipulation each engineered to deliver and execute malware efficien
 tly.\n\nThis session is ideal for offensive security professionals\, penet
 ration testers\, and threat emulation experts seeking to elevate their und
 erstanding of PDF-based threats and enhance their testing skills. Uncover 
 how these sophisticated attacks work and walk away with actionable strateg
 ies to counter them.\n\nMore information about the presentation can be fou
 nd in this article: https://labs.segura.blog/unmasking-the-threat-a-deep-d
 ive-into-the-pdf-malicious-2/
DTSTAMP:20260502T115827Z
LOCATION:Workshops and Stage - Design Space (C1.05.12)
SUMMARY:Weaponizing PDF Files: Advanced Exploitation Techniques for Red Tea
 ms - Filipi Pires
URL:https://pretalx.com/bsidesluxembourg-2026/talk/KFW9CC/
END:VEVENT
END:VCALENDAR
