Version 0.34 Oct. 2, 2023
We released a new schedule version!
We have new sessions!
We had to move some sessions, so if you were planning on seeing them, check their new dates or locations:
- “Kunai: your new Threat Hunting tool for Linux” by Quentin JEROME (Oct. 18, 2023, 5 p.m. → Oct. 19, 2023, 5:15 p.m.)
- “Dismantle the bomb” by Stijn Tomme (Oct. 17, 2023, 10:30 a.m., Schengen 1 and 2 → Oct. 17, 2023, 4:30 p.m., Echternach&Diekirch)
- “Your unknown Twins: Identity in the era of Deepfakes, AI and mass Biometrics exposure” by Vladimir Kropotov (Oct. 19, 2023, 5:15 p.m. → Oct. 18, 2023, 5 p.m.)
Version 0.33 Oct. 2, 2023
We released a new schedule version!
We have new sessions!
- “Dismantle the bomb”
- “Dismantle the bomb”
- “Dismantle the bomb”
- “Dismantle the bomb”
- “Dismantle the bomb”
- “Dismantle the bomb”
- “Dismantle the bomb”
We had to move some sessions, so if you were planning on seeing them, check their new dates or locations:
- “The new Sigma Toolchain” by Thomas Patzke (Echternach&Diekirch → Hollenfels)
- “Build your own malware analysis pipeline using open source tools” by Michał Praszmo, psrok1, Jarosław Jedynak (Echternach&Diekirch → Vianden&Wiltz)
- “Dismantle the bomb” by Stijn Tomme (Oct. 19, 2023, 10 a.m., Schengen 1 and 2 → Oct. 19, 2023, 2 p.m., Echternach&Diekirch)
- “DFIRTrack - The Incident Response Tracking Application” by Mathias Stuhlmacher, Lionne Stangier (Echternach&Diekirch → Vianden&Wiltz)
Version 0.32 Sept. 29, 2023
We released a new schedule version!
We had to move some sessions, so if you were planning on seeing them, check their new dates or locations:
- “Embedded Threats: A Deep Dive into the eSIM World” by Markus Vervier (Oct. 19, 2023, 2 p.m. → Oct. 18, 2023, 2 p.m.)
- “Open Wounds: The last 5 years have left Bluetooth to bleed” by Xeno Kovah (Oct. 18, 2023, 2 p.m. → Oct. 19, 2023, 2 p.m.)
Version 0.31 Sept. 27, 2023
We released a new schedule version!
Version 0.30 Sept. 25, 2023
We released a new schedule version!
We have moved a session around: “Yeti - old dog, new tricks” by Thomas Chopitea, Sébastien Larinier (Oct. 16, 2023, 5 p.m. → Oct. 17, 2023, 5:55 p.m.)
Version 0.29 Sept. 21, 2023
We released a new schedule version!
We have a new session: “Non-state actors’ cyber activity in Armed Conflict: impact, implications and remediation” by Aleksandra Kulikova, Mauro Vignati, Elena Rückheim .
Version 0.28 Sept. 19, 2023
We released a new schedule version!
Version 0.27 Sept. 18, 2023
We released a new schedule version!
Version 0.26 Sept. 18, 2023
We released a new schedule version!
We have a new session: “Internet exposure of satellite modems, and their vulnerabilities” by Patrice Auffret, Arnaud Girault .
Version 0.25 Sept. 18, 2023
We released a new schedule version!
Version 0.24 Sept. 18, 2023
We released a new schedule version!
Version 0.23 Sept. 16, 2023
We released a new schedule version!
We have a new session: “CTI is dead, long live CTI!” by David .
Version 0.22 Sept. 15, 2023
We released a new schedule version!
Version 0.21 Sept. 14, 2023
We released a new schedule version!
We have a new session: “Your unknown Twins: Identity in the era of Deepfakes, AI and mass Biometrics exposure” by Vladimir Kropotov .
Version 0.20 Sept. 14, 2023
We released a new schedule version!
Version 0.19 Sept. 14, 2023
We released a new schedule version!
We have moved a session around: “CyberChef: Enhancing Existing Operations and Adding New Operations” by Didier Stevens (Oct. 18, 2023, 2 p.m. → Oct. 19, 2023, 2 p.m.)
Version 0.18 Sept. 14, 2023
We released a new schedule version!
We have a new session: “Customize Your Own Command & Control: Design and Code Your Own Implant in a Real Infrastructure” by Guillaume Prigent, Adrien Barchapt-Perrot .
We have moved a session around: “An Introduction to ARM64 Assembly and Shellcode” by Saumil Shah (Hollenfels → Vianden&Wiltz)
Version 0.17 Sept. 14, 2023
We released a new schedule version!
We have a new session: “How Digital Technologies are Redefining Warfare and Why It Matters” by Mauro Vignati .
Version 0.16 Sept. 13, 2023
We released a new schedule version!
We have a new session: “How Crowdsec is building a collaborative, trustable, and crowdsourced CTI to change the cybersecurity landscape” by Matthieu Mazzolini .
Version 0.15 Sept. 11, 2023
We released a new schedule version!
We have new sessions!
Version 0.14 Sept. 11, 2023
We released a new schedule version!
We have a new session: “Yeti - old dog, new tricks” by Thomas Chopitea, Sébastien Larinier .
Version 0.13 Sept. 11, 2023
We released a new schedule version!
Version 0.12 Sept. 8, 2023
We released a new schedule version!
We have a new session: “FOSStering an ISAC: Enabling a Community with Open-Source Tools” by JJ Josing .
Version 0.11 Sept. 8, 2023
We released a new schedule version!
We have new sessions!
Version 0.10 Sept. 7, 2023
We released a new schedule version!
We have new sessions!
- “Ensuring IoC quality at CERT-FR”
- “Defeating VPN Always-On”
- “Managing spam, phishing and other boring tasks with your users and constituents”
- “Managing spam, phishing and other boring tasks with your users and constituents”
- “Reviving our oldest Tool - Using Bayesian inference to detect cyber attacks”
- “MISP42: connecting CTI and SOC teams”
- “Digital Tug of War: Unraveling the Cyber Battle Between Ukraine and Russia”
- “Detecting VPNs/proxies by analyzing their attack patterns over time”
- “He is everywhere: A tale of Lazarus and his family”
- “Building an evil phone charging station.”
- “Secure Coding: Fix from the root”
- “DFIRTrack - The Incident Response Tracking Application”
- “The rise of malicious MSIX file”
- “JTAN - data sharing network”
- “Embedded Threats: A Deep Dive into the eSIM World”
- “The new Sigma Toolchain”
- “Build your own malware analysis pipeline using open source tools”
- “Operation Duck Hunt - A peak behind the curtain of DuckTail”
- “Using systematic code reuse analysis to create robust YARA rules”
Version 0.9 Sept. 5, 2023
We released a new schedule version!
We have a new session: “Raiders of the Lost Arts” by Stefan Hager .
Version 0.8 Sept. 5, 2023
We released a new schedule version!
We have new sessions!
Version 0.7 Sept. 5, 2023
We released a new schedule version!
Version 0.6 Sept. 5, 2023
We released a new schedule version!
We have new sessions!
Version 0.5 Sept. 5, 2023
We released a new schedule version!
We have a new session: “Cratos - Use your bloody indicators” by Dennis Rand .
Version 0.4 Sept. 5, 2023
We released a new schedule version!
We have a new session: “Dismantle the bomb” by Stijn Tomme .
We had to move some sessions, so if you were planning on seeing them, check their new dates or locations:
- “ACME: benefits of deploying an Internet Security protocol inside your corporate network” by Christophe Brocas (Oct. 18, 2023, 2:30 p.m. → Oct. 18, 2023, 3:30 p.m.)
- “Turbocharging IOC validation: Become a more efficient CTI analyst” by Arwa Alomari (Oct. 16, 2023, 3:30 p.m. → Oct. 17, 2023, 2:30 p.m.)
- “Almost 2 years after log4j .. if your PSIRT has survived, Are the Lessons learned or not learned on security incident & vulnerability management ?” by FrederiqueD (Oct. 18, 2023, 3:30 p.m. → Oct. 19, 2023, 9:30 a.m.)
- “Threat actors & surveillance companies targeting telecom operators” by Alexandre De Oliveira (Oct. 17, 2023, 5 p.m. → Oct. 17, 2023, 4:45 p.m.)
- “Pyrrha: navigate easily into your system binaries” by Eloïse Brocas (Oct. 17, 2023, 4:30 p.m. → Oct. 17, 2023, 4:15 p.m.)
- “PHP filter chains: How to use it” by Rémi Matasse (@_remsio_) (Oct. 18, 2023, 5 p.m. → Oct. 18, 2023, 5:30 p.m.)
- “Permissionless Universal Overlays” by Dimitrios Valsamaras (Oct. 19, 2023, 11 a.m. → Oct. 19, 2023, 10:40 a.m.)
Version 0.3 Sept. 5, 2023
We released a new schedule version!
We have new sessions!
- “Malware AV evasion tricks. Cryptography in malware”
- “ACME: benefits of deploying an Internet Security protocol inside your corporate network”
- “Why does the CTI industry struggle with communicating uncertainties?”
- “Almost 2 years after log4j .. if your PSIRT has survived, Are the Lessons learned or not learned on security incident & vulnerability management ?”
- “Threat actors & surveillance companies targeting telecom operators”
- “Turbocharging IOC validation: Become a more efficient CTI analyst”
- “Open Wounds: The last 5 years have left Bluetooth to bleed”
- “How to operationalize CTI - A real world example”
- “Avoiding the basilisk's fangs: State-of-the-art in AI LLM detection”
- “Cryptocurrency & Web3 OSINT Workshop”
- “IPFS Unveiled: Exploring Data Collection, Analysis, and Security”
- “Permissionless Universal Overlays”
- “Analyzing Cobalt Strike Beacons, Servers and Traffic”
- “CyberChef: Enhancing Existing Operations and Adding New Operations”
Version 0.2 Sept. 4, 2023
We released a new schedule version!
We have new sessions!
- “An Introduction to ARM64 Assembly and Shellcode”
- “The Renaissance of Cyber Physical Offensive Capabilities”
- “Pyrrha: navigate easily into your system binaries”
- “Ongoing EvilEye Campaigns Targeting CCP Adversaries”
- “Using Apple Sysdiagnose for mobile forensics and integrity checks”
- “Modern IOCs matching with Suricata”
Version 0.1 Sept. 4, 2023
We released our first draft schedule!