Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Research
Case Studies and Incidents Analysis talks at BSides
626 talks tagged
Case Studies and Incidents Analysis
from 90 chapters of BSides events worldwide.
Related topics
Threat Intel
Research
Talk
Malware Analysis
Technical
Intermediary
47:15
Closed For Business: Taking Down Darknet Markets
John Shier
BSides London
· 2019
War Stories
Intro
Blue
Case Studies and Incidents Analysis
Talk
Open →
2019-06
28:38
Bluetooth Warwalking: Hacking Devices Around You with Just Your Phone
Matt Miller
BSides SLC
· 2026
Technical
OSINT
Wireless Security
Intermediary
Red
Case Studies and Incidents Analysis
Empirical Research
Demo
+1
Open →
2026-04
47:57
Exploit Development Is Dead, Long Live Exploit Development!
Connor McGarr
BSides KC
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-11
50:57
Kevin Breen - DarkComet From Defense To Offense - Identify your Attacker
Kevin Breen
BSides London
· 2015
Technical
Case Studies and Incidents Analysis
Talk
Open →
2015-07
54:05
The Road to Hell is Paved with Bad Passwords
Chris Kubecka
BSides Las Vegas
· 2019
War Stories
DFIR
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2019-10
28:41
Measuring Cybersecurity Maturity with the NIST CSF
Josh Sokol
BSides Vancouver
· 2021
Technical
GRC
Threat Modeling
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2021-06
47:26
Smokeloader: The Pandora's box of tricks, payloads and anti-analysis
Pim Trouerbach
BSides PDX
· 2022
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-10
30:27
David Bianco - The Secret Origins of the Pyramid of Pain
David Bianco
BSides Augusta
· 2022
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-10
44:35
Anti-forensics Techniques Used By Threat Actors In The Wild
Hela Lucas
BSides London
· 2024
Technical
DFIR
Malware Analysis
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-02
15:37
Tale of Chaining Bugs for Account Takeover
Harsh Bothra
BSides Ahmedabad
· 2022
Technical
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Talk
Open →
2023-02
41:58
BotProbe - botnet traffic capture using IPFIX
Mark Graham
Adrian Winkles
BSides London
· 2018
Technical
Malware Analysis
Network Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-06
38:26
The Woman Who Squashed Terrorists When an Embassy Gets Hacked
Chris Kubeka
BSides Cape Town
· 2019
War Stories
DFIR
Threat Intel
Blue
Case Studies and Incidents Analysis
Keynote
Open →
2019-12
39:30
Pwning Cloud Contexts: From GitHub Token to Compromising an Entire GCP Organization
Ayoub Fathi
BSides Ahmedabad
· 2024
Technical
Cloud IAM
Supply Chain Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-04
37:13
Phishing With Phineas (Again) Hack Recreation On Steroids
George Karantzas
Constantinos Patsakis
BSides Athens
· 2022
Technical
Advanced
Purple
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-06
31:02
Phineas Fisher: A Timeline of Hacktivism
BSides Leeds
· 2020
War Stories
OSINT
Reverse Engineering
Threat Intel
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2020-07
23:08
Hacking Back Scammers - BSides Prishtina 2022
Megi Bashi
Ryan Dinnan
Jacob Abraham
Joshua Pardhe
BSides Prishtina
· 2022
Technical
Case Studies and Incidents Analysis
Talk
Open →
2022-05
44:04
Noooooooooo touch!
Michael Rodger
BSides Cape Town
· 2023
Technical
Hardware Hacking
Physical Security
Reverse Engineering
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-12
6:51
Playing with Fake Emails for Fun and Profit
Sayaan Alam
BSides Ahmedabad
· 2022
Technical
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Talk
Open →
2023-02
36:18
Macabre Stories of a Hacker in the Public Health Sector (Chile)
Philippe Delteil
BSides Cape Town
· 2019
War Stories
DFIR
Privacy
Vulnerability Research
Blue
Case Studies and Incidents Analysis
Talk
Open →
2019-12
56:10
Continuous Integration: Stalking Vulnerabilities with Puma Scan
Eric Johnson
BSides Iowa
· 2017
Technical
DevSecOps
Vulnerability Research
Case Studies and Incidents Analysis
Talk
Open →
2017-04
26:43
Pwning Android Apps at Scale
Sparsh
Shashank
BSides Ahmedabad
Research
Technical
Mobile Security
Supply Chain Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2023-02
52:48
Navigating Bug Bounties: From NAs to P1s
Animesh Acharya
BSides Canberra
· 2025
Career
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Talk
Open →
2025-11
59:16
0-day Research Disassembled
Chris Lyne
David Wells
Jimi Sebree
BSides DC
· 2019
Research
Advanced
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2019-11
27:38
Linux Under Siege: Analyzing the Latest Cyber Espionage Tactics and Malware Trends
Marc Rivero Lopez
BSides Budabest
· 2024
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-01
33:46
How to Lose a Container in 10 Minutes
Sarah Young
BSidesSF
· 2019
Technical
Cloud IAM
Container Security
Case Studies and Incidents Analysis
Talk
Open →
2019-03
42:37
Impose Cost: Our Defences Eventually Fail & We Need to Take the Fight to the Criminals
Dominic White
BSides Cape Town
· 2023
Policy
Case Studies and Incidents Analysis
Keynote
Open →
2023-12
51:35
Red Team Handcuffs
Caleb McGary
BSides Seattle
· 2020
Technical
Supply Chain Security
Red
Case Studies and Incidents Analysis
Talk
Open →
2020-11
30:07
GSuite Digital Forensics and Incident Response
Megan Roddie
BSides SATX
· 2018
Technical
Cloud IAM
DFIR
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2018-07
56:19
Content Security Policy — Lessons Learned at Yahoo
Binu Ramakrishnan
BSides DC
· 2015
Technical
Web AppSec
Case Studies and Incidents Analysis
Talk
Open →
2015-11
27:24
Cold Case — Catch a Killer in 16 Bytes
Iggy
BSides Canberra
· 2021
Technical
War Stories
DFIR
Hardware Hacking
Reverse Engineering
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2021-04
48:43
Inside Google's Discovery & Remediation of a Critical CPU Vulnerability
Yousif Hussin
BSides Lisbon
· 2024
Research
Technical
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-12
19:06
Hacking a Hackathon for Fun and Profit
Alexei Kojenov
Alex Ivkin
BSides PDX
· 2018
Technical
Supply Chain Security
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Talk
Open →
2018-03
20:43
Application Fingerprinting with Kitsune
Peter Vicherek
BSides Toronto
· 2015
Technical
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2015-11
40:56
How to Hack OAuth
Aaron Parecki
BSides PDX
· 2019
Technical
Web AppSec
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2019-11
26:35
Lazarus On The Rise: Insights From SWIFT Bank Attacks
Saher Naumaan
BSides Belfast
· 2018
Research
Case Studies and Incidents Analysis
Talk
Open →
2018-10
48:31
Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone
Nick Stephens
BSides DC
· 2018
Technical
Hardware Hacking
Mobile Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+2
Open →
2018-11
54:37
We Take Your Security Seriously. Or Do We?
The Beer Farmers
BSides London
· 2019
War Stories
Intro
Case Studies and Incidents Analysis
Talk
Open →
2019-06
48:38
Opening Acts: How Attackers Get Their Big Breaks
Chuck Willis
Evan Peña
BSides DC
· 2014
Technical
Case Studies and Incidents Analysis
Talk
Open →
2014-10
26:29
Finding & Exploiting Client-Side Prototype Pollution in the Wild
BSides Ahmedabad
· 2021
Technical
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-02
50:58
Threat hunting: Using MITRE ATT&CK against Carbanak malware
Amol Sarwate
BSidesSF
· 2022
Technical
Detection Engineering
Malware Analysis
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2022-07
24:15
Take all my money – penetrating ATMs
Fredrik Sandström
Jonathan Fischer
BSides Las Vegas
· 2025
War Stories
Hardware Hacking
Physical Security
Reverse Engineering
Red
Case Studies and Incidents Analysis
Talk
Open →
2025-12
31:32
Maersk: The Ransomware Survivors
Endrin Musa
BSides Prishtina
· 2017
Technical
DFIR
Malware Analysis
Supply Chain Security
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2023-05
28:47
Learning from AWS Customer Security Breaches
Rami McCarthy
Bsides CT
· 2020
Technical
Cloud IAM
DFIR
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2020-11
45:29
The Practical Application Of Indirect Prompt Injection Attacks
David Willis-Owen
BSides London
· 2025
Technical
Red
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2025-02
54:50
Well well well, if it isn't the consequences of my own actions
Justin Steven
BSides Canberra
· 2025
Technical
Cryptography
Supply Chain Security
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
50:28
Estonian Electronic Identity Card and its Security Challenges
Arnis Paršovs
BSides Tallinn
· 2021
Research
Cryptography
DFIR
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-10
33:30
MITRE D3FEND and How to Master It
Saba Bagheri
BSides Sydney
· 2025
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2025-02
19:20
Profiling the attacker - using offender profiling in SOC environments - James Stevenson
James Stevenson
BSides London
· 2018
Technical
Case Studies and Incidents Analysis
Talk
Open →
2018-06
8:38:00
Cyber Crash Investigations: Seizing the Opportunity to Learn from Fast Crisis
Julia Wigton
David Stokes
BSides Las Vegas
· 2023
Research
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-08
26:05
CoinMiner Are Evasive - Omri Segev Moyal & Thomas Roccia
Omri Segev Moyal
Thomas Roccia
BSides TLV
· 2018
Technical
Detection Engineering
Malware Analysis
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-07
53:30
Unmasking Cybercriminals on the Open Internet
Paul Melson
BSides Augusta
· 2017
Technical
Case Studies and Incidents Analysis
Talk
Open →
2017-09
30:48
A Two-part Saga: Continuing the Journey of Hacking Malware C2s
Vangelis Stykas
BSides Prague
· 2024
Technical
Malware Analysis
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-04
47:19
The Dangers of Working in Cyber Security
Simon Whittaker
BSides Belfast
· 2017
War Stories
Career & Soft Skills
DFIR
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2017-10
40:14
When Malware Becomes Creative: A Survey of Advanced Android Detection Evasion Tactics
Dimitrios Valsamaras
José Leitão
BSides Lisbon
· 2024
Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
46:53
Enemies of the West - Neil Lines
Neil Lines
BSides London
· 2014
Technical
War Stories
Case Studies and Incidents Analysis
Demo
Talk
Open →
2017-06
44:00
The Nation State Actor Ate My Homework!
Liam Smit
BSides Cape Town
· 2019
Research
Hardware Security
Malware Analysis
Reverse Engineering
Threat Intel
Advanced
Case Studies and Incidents Analysis
Empirical Research
+2
Open →
2019-12
26:12
GT - The New Cat and Mouse Game: Attacking and Defending Machine Learning Based Software - Joshua Sa
Joshua Saxe
BSides Las Vegas
· 2017
Research
Technical
AI Security
Malware Analysis
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-09
20:37
From MS08-067 to EternalBlue
Denis Isakov
BSides Manchester
· 2017
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-08
55:50
Practical Serialization Attacks
Nicky Bloor
BSides Manchester
· 2017
Technical
Reverse Engineering
Vulnerability Research
Web AppSec
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2017-08
29:14
Alex Kirk - Incident response and threat hunting using Bro/Zeek data
Alex Kirk
BSides Augusta
· 2019
Technical
DFIR
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2019-10
29:51
Decoding Fraud: The Evolution and Impact of Netflix's Fraud Metrics
Aditi Gupta
Yue Wang
BSidesSF
· 2024
Technical
Case Studies and Incidents Analysis
Talk
Open →
2024-07
32:13
What We Can Learn from Google's Fight with Phishing
Neal Mueller
BSidesSF
· 2018
Research
Web AppSec
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-04
26:09
Life of a Bug: An Insight on the GitHub Bounty Program
Jeffrey Guerra
Caitlin Buckshaw
BSidesSF
· 2023
Technical
Vulnerability Research
Blue
Case Studies and Incidents Analysis
Talk
Open →
2023-05
43:53
Pwning Electric Motorcycles
Mitchell Marasch
Persephone Karnstein
BSides Seattle
· 2026
Research
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2026-03
41:46
The Expanding Universe of Cyber Threats
Dr. Xena Olsen
BSidesSF
· 2023
Technical
Threat Intel
Intro
Case Studies and Incidents Analysis
Keynote
Open →
2023-05
26:00
Exposed Secrets — How Public Git Repositories and Docker Images Expose Millions of Secrets
Mackenzie Jackson
BSidesSF
· 2022
Research
DFIR
Supply Chain Security
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-07
31:52
A Case Study of MacOS Supply Chain Compromise
Jason Craig
Michael George
BSidesSF
· 2018
Technical
Detection Engineering
Malware Analysis
Supply Chain Security
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-04
14:18
EmailShell: A War Story On Leveraging Server Side Template Injection (SSTI) To Hack Into GCP
Phillip
BSides London
· 2025
Technical
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Talk
Open →
2026-03
47:19
Attacking Patient Health: The Anatomy of Hospital Exploitation
Jacob Holcomb
BSides DC
· 2016
Research
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2016-10
55:55
Tales from the Breach
Jason Haddix
BSides Seattle
· 2024
War Stories
Cloud IAM
Supply Chain Security
Case Studies and Incidents Analysis
Talk
Open →
2024-05
28:33
Hook, Line, and Tinker: A Dive into Phishing Campaign Sites
Rick Ramgattie
BSidesSF
· 2024
Technical
OSINT
Threat Intel
Web AppSec
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2024-07
19:44
Uncommon And Advanced Techniques For Account Takeover Attacks by Ayoub Safa
Ayoub Safa
BSides Leeds
Technical
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Talk
Open →
2023-07
41:09
Blowing up Gas Stations for fun and profit
Pedro Umbelino
BSides Lisbon
Research
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
45:41
Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign Against a Foreign Government
Mark Parsons
BSides Charleston
· 2024
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-11
23:55
A Study on Intrusion Detection Systems with a Practical Experiment on Snort - Vigneshwar Sethuraman
Vigneshwar Sethuraman
BSides Vancouver
· 2021
Technical
Detection Engineering
Network Security
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-06
52:17
The Current State of Microsoft Identity Security: Common Security Issues
Sean Metcalf
BSides Charm
· 2024
Technical
Active Directory
Cloud IAM
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-06
36:35
Hunting Threat Actors using OSINT Forensics
Abi Waddell
BSides NYC
· 2023
Technical
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-06
31:05
Advanced Persistent Teenagers: Understanding the Lapsus$ Playbook
Benjamin Hering
BSidesSF
· 2024
Technical
Active Directory
Social Engineering
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2024-07
17:35
WiFi Recon: Corporate Espionage with Evil Twin
Amilton Justino
BSides São Paulo
· 2025
Technical
Network Security
OSINT
Wireless Security
Red
Case Studies and Incidents Analysis
Talk
Open →
2025-06
59:11
Vehicle Cyber Security and Innovative Assessment Techniques
Andy Davis
David Claire
BSides Manchester
· 2016
Technical
War Stories
Hardware Hacking
Reverse Engineering
Vulnerability Research
Wireless Security
Advanced
Red
+3
Open →
2016-10
48:22
An Attack & a Defense in the Context of Security of Digital ICs
Mahesh Tripunitara
BSides Toronto
· 2015
Research
Technical
Hardware Hacking
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-11
13:54
MITRE ATLAS: Exploring AI Vulnerabilities
Arthur Frost
BSides London
· 2025
Technical
AI Security
Threat Modeling
Case Studies and Incidents Analysis
Talk
Open →
2025-02
29:53
Google Pay, Drug Bots, & SIM Swaps: How Old Leaks Power New Attacks
Sarit Yerushalmi
Ron Masas
BSides London
· 2025
Research
Technical
OSINT
Social Engineering
Vulnerability Research
Web AppSec
Advanced
Case Studies and Incidents Analysis
+2
Open →
2026-03
24:50
Layers of Cloud: Azure and the Mishandling of Secrets
Katie Knowles
BSides Toronto
· 2022
Technical
Cloud IAM
Web AppSec
Case Studies and Incidents Analysis
Talk
Open →
2022-10
26:19
Scraping after HiQ Labs v. LinkedIn
Hannah Zhao
BSidesSF
· 2023
Policy
Privacy
Case Studies and Incidents Analysis
Talk
Open →
2023-05
42:18
What Botnet Is This?
Tiago Pereira
BSides Lisbon
· 2015
Technical
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-07
30:26
Snow Nor Rain Nor Dependency Confusion: How to Deliver the Right Package
Jessica Smith
Justin Engler
BSidesSF
· 2024
Technical
Supply Chain Security
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2024-07
27:34
Goldilocks and the Three ATM Attacks
David M. N. Bryan
BSidesSF
· 2019
Technical
Physical Security
Reverse Engineering
Vulnerability Research
Red
Case Studies and Incidents Analysis
Talk
Open →
2019-03
23:48
OEMs Considered Harmful: Hello New 0Days!
Adam Donenfeld
BSides London
· 2016
Technical
Advanced
Red
Case Studies and Incidents Analysis
Demo
Talk
Open →
2016-07
31:30
Keep it Like a Secret: When Android Apps Contain Private Keys
Will Dormann
BSidesSF
· 2018
Research
Cryptography
Mobile Security
Supply Chain Security
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-04
40:11
You're Not Broken...Just Different - Chris Culling
Chris Culling
BSides KC
Career
Community
Intro
Case Studies and Incidents Analysis
Talk
Open →
2022-10
15:28
No Distribute Scanners:
Florian Murschetz
Mathieu Gaucheler
BSides Munich
· 2021
Research
Malware Analysis
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-06
21:18
2017 - How To Obtain 100 Facebook Accounts Per Day Through Internet Searches by Guillermo & Yael
BSides Manchester
· 2017
Technical
Vulnerability Research
Web AppSec
Intermediary
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-08
37:08
BSidesSF 2022 - Practical Threat Hunting With Machine Learning (Omid Mirzaei)
Omid Mirzaei
BSidesSF
· 2022
Technical
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-07
26:50
Digital Transformation of the Illicit Economy and Outsourced Crime Providers
Bex Nitert
BSides Perth
· 2021
Research
War Stories
Case Studies and Incidents Analysis
Talk
Open →
2021-09
29:16
The Insider: Physical Social Engineering and On-Site Access
Neil Lines
BSides Scotland
· 2018
Technical
Physical Security
Social Engineering
Red
Case Studies and Incidents Analysis
Talk
Open →
2018-05
29:43
BOLA, IDOR, MA, BFLA: Welcome to the OWASP API Top 10
Adam Fisher
BSides SLC
· 2020
Technical
OWASP
Web AppSec
Case Studies and Incidents Analysis
Talk
Open →
2020-03
46:30
Script All the Things, Reverse All the Malware: Jython-Enhanced Reverse Engineering with Ghidra
Byron Roosa
BSidesSF
· 2020
Technical
Malware Analysis
Reverse Engineering
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2020-03
27:59
Fuzzing Malware for Fun & Profit
Maksim Shudrak
BSidesSF
· 2019
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2019-03
25:31
An analysis of data leaks in Kosovo's Universities - Kastriot Fetahaj
Kastriot Fetahaj
BSides Prishtina
· 2023
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-05
View all 626 talks tagged Case Studies and Incidents Analysis →