BSidesLuxembourg 2026

SPOT - Spear-Phishing Overwatching Tool
2026-05-07 , Workshops and Stage - Design Space (C1.05.12)

Nowadays, the detection of generic mass-scale phishing attacks is quite
effective. Techniques that leverage indicators of compromise (IOCs) collection
and sharing tools, such as MISP (the Open Source Threat Intelligence Sharing
Platform), are well established and give good results in the field. However,
detection of targeted attack attempts aka spear-phishing, is much more
challenging because the attackers exploit contextual information about the
targets they aim for.
By using up-to-date, relevant and precise information about the inner
operations of the targeted company, attackers can make their deception far more
effective.
SPOT makes use of state-of-the-art natural language
processing (NLP) techniques based on machine learning (ML) and large language
models (LLMs) in particular to try to detect and prevent spear-phishing
attack attempts.
This opensource project was co-financed by the LU-CID initiative by the Ministry
of Economy Luxembourg.


Do you consent for this presentation to be recorded and posted online ?:

Pauline Bourmeau is an independent security researcher specializing in the intersection of artificial intelligence, cognitive psychology, and threat intelligence. She has consulted on multilingual natural language processing, led deep learning and NLP workshops, and created training materials blending STEM with human factors. As founder of DEFCON Paris and contributor to the MISP project, she actively advances collaborative cybersecurity practices.
Previously, Pauline worked as a Threat Intelligence Analyst conducting OSINT, HUMINT, and SOCINT analysis to profile threats and investigate APTs. She holds a Master’s in Criminology with a thesis on cybersecurity intelligence sharing, and a background in sociolinguistics and computer science from Sorbonne and School 42.

This speaker also appears in:

William manages the technical team behind AS197692 at Conostix S.A. in Luxembourg. He’s been working in cybersecurity using free and opensource software on a daily basis for more than 25 years. Recently, he presented his work on SSL/TLS toolkits at Nullcon 2025 in Goa and Hack.lu 2025 in Luxembourg. He contributed to the cleanup and enhancement efforts done on ssldump lately. He particularly enjoys tinkering with open (and not so open) hardware. Currently he likes playing around with new tools in the current ML scene, building, hopefully, useful systems for fun and, maybe, profit. When not behind an intelligent wannabe machine, he's doing analog music with his band of humans.

Systems/Infrastructure Developer during the day.
Game Developer at night.
Passionate about ice/roller skating, video games, linux ricing and music.

Tech nerd, gamer, living in the past (on purpose)