Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Research
Empirical Research talks at BSides
152 talks tagged
Empirical Research
from 53 chapters of BSides events worldwide.
Related topics
Research
Talk
Threat Intel
Vulnerability Research
AI Security
Technical
28:38
Bluetooth Warwalking: Hacking Devices Around You with Just Your Phone
Matt Miller
BSides SLC
· 2026
Technical
OSINT
Wireless Security
Intermediary
Red
Case Studies and Incidents Analysis
Empirical Research
Demo
+1
Open →
2026-04
44:55
Malware Behavior Catalog
Desiree Beck
Haley Bui-Nguyen
BSides DC
· 2019
Research
Empirical Research
Methodology
Talk
Open →
2019-10
26:43
Pwning Android Apps at Scale
Sparsh
Shashank
BSides Ahmedabad
Research
Technical
Mobile Security
Supply Chain Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2023-02
25:38
Race Against the Machine: Rapid Exploit Development via LLMs
Matthew Deluca
BSides Augusta
· 2023
Research
Technical
AI Security
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2023-10
25:10
All Your Containers Are Belong to Us
James Condon
BSidesSF
· 2019
Research
Cloud IAM
Empirical Research
Talk
Open →
2019-03
39:46
Exploit Prediction Scoring System (EPSS) - The User Guide - Chris Madden
Chris Madden
BSides Dublin
· 2024
Technical
Threat Intel
Vulnerability Research
Empirical Research
Methodology
Talk
Open →
2024-06
38:31
The Next Generation of Web Exploits: From Cache Poisoning to Multi-Layer Fingerprinting
Steve Sprecher
Bsides CT
· 2025
Technical
Vulnerability Research
Web AppSec
Empirical Research
Technical Deep-dives
Talk
Open →
2025-12
28:13
An Open Source Malware Classifier and Dataset
Phil Roth
BSidesSF
· 2018
Research
Empirical Research
Technical Deep-dives
Talk
Open →
2018-04
58:26
I for one welcome our new Cyber Overlords! An intro to ML in cybersecurity
BSides Lisbon
· 2016
Research
Technical
Intro
Empirical Research
Technical Deep-dives
Talk
Open →
2016-11
44:00
The Nation State Actor Ate My Homework!
Liam Smit
BSides Cape Town
· 2019
Research
Hardware Security
Malware Analysis
Reverse Engineering
Threat Intel
Advanced
Case Studies and Incidents Analysis
Empirical Research
+2
Open →
2019-12
32:13
What We Can Learn from Google's Fight with Phishing
Neal Mueller
BSidesSF
· 2018
Research
Web AppSec
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-04
26:00
Exposed Secrets — How Public Git Repositories and Docker Images Expose Millions of Secrets
Mackenzie Jackson
BSidesSF
· 2022
Research
DFIR
Supply Chain Security
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-07
47:21
Analysis and Defense of Automotive Networks
Samuel Hollifield
BSides Knoxville
· 2020
Technical
Hardware Security
Network Security
Reverse Engineering
Empirical Research
Technical Deep-dives
Talk
Open →
2020-05
36:35
Hunting Threat Actors using OSINT Forensics
Abi Waddell
BSides NYC
· 2023
Technical
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-06
31:30
Keep it Like a Secret: When Android Apps Contain Private Keys
Will Dormann
BSidesSF
· 2018
Research
Cryptography
Mobile Security
Supply Chain Security
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-04
15:28
No Distribute Scanners:
Florian Murschetz
Mathieu Gaucheler
BSides Munich
· 2021
Research
Malware Analysis
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-06
25:31
An analysis of data leaks in Kosovo's Universities - Kastriot Fetahaj
Kastriot Fetahaj
BSides Prishtina
· 2023
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-05
27:40
Ferris Bueller's Guide to Abuse Domain Permutations
Rob Ragan
Kelly Albrink
BSidesSF
· 2019
Technical
OSINT
Social Engineering
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2019-03
51:16
Rosetta 2: Keeping Mac Malware Alive for Years to Come
Raphaela Mettig
Charles Glass
BSides Dallas/Fort Worth
· 2022
Research
Technical
DFIR
Malware Analysis
Reverse Engineering
Advanced
Empirical Research
Technical Deep-dives
+1
Open →
2022-11
34:45
BSidesSF 2018 - Crimeware Chaos: Empirical Analysis of HTTP-Based Botnet C&C Panels (Aditya K Sood)
Aditya K Sood
BSidesSF
· 2018
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-04
56:59
Clustering Of Web Attacks: A Walk Outside The Lab
Gilad Yehudai
BSides Leeds
· 2018
Research
Web AppSec
Empirical Research
Technical Deep-dives
Talk
Open →
2018-01
21:37
How We Got Into A Unicorn's Private Codebase
Ashikka Gupta
Arshit Jain
BSides Munich
Research
Technical
Mobile Security
Supply Chain Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2022-05
39:24
5 Gaps Exposed In 30+ Real-World Tabletop Exercises - Ashu Savani
Ashu Savani
BSides London
· 2025
Research
Technical
Detection Engineering
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2026-03
31:50
Who Makes the Rules?
Meghna Vikram
BSides Knoxville
Research
Technical
AI Security
Supply Chain Security
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2024-07
25:14
The Power of Guardrails: How to slash your risk of XSS in half
Colleen Dai
Grayson Hardaway
BSidesSF
· 2022
Technical
Vulnerability Research
Web AppSec
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-07
1:01:05
When the Magic Wears Off: Flaws In ML For Security Evaluations - Lorenzo Cavallaro
Lorenzo Cavallaro
BSides London
Research
Advanced
Empirical Research
Methodology
Talk
Open →
2019-06
22:49
Taking D-Bus to Explore the Bluetooth Landscape
Paul Wortman
BSides Las Vegas
· 2024
Research
Technical
Reverse Engineering
Wireless Security
Advanced
Empirical Research
Technical Deep-dives
Talk
Open →
2024-09
17:33
AI Package Hallucination
Bar Lanyado
BSides Berlin
· 2023
Research
Technical
AI Security
Supply Chain Security
Vulnerability Research
Red
Empirical Research
Technical Deep-dives
+1
Open →
2024-01
35:56
Repo Jacking: How GitHub Exposes Over 70,000 Projects to Remote Code Injection
Indiana Moreau
BSides Las Vegas
· 2021
Research
Technical
Supply Chain Security
Vulnerability Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-08
27:36
Tell Me Who You Are and I Will Tell You Your Lock Pattern
Marte Løge
BSides Las Vegas
· 2015
Research
Mobile Security
Empirical Research
Talk
Open →
2016-12
44:47
Email security with DANE: Empirical Analysis of DANE for SMTP in the wild
Aniketh Girish
BSides Delhi
· 2020
Research
Cryptography
Empirical Research
Technical Deep-dives
Talk
Open →
2020-11
31:30
Bugs Are Shallow: Finding Vulnerabilities In Top GitHub Projects
Laurence Tennant
BSides London
Research
Technical
OWASP
Vulnerability Research
Web AppSec
Red
Empirical Research
Methodology
+1
Open →
2024-02
44:28
I Had a (Bot) Farm in Africa
Charl van der Walt
BSides Cape Town
· 2025
Research
Case Studies and Incidents Analysis
Empirical Research
Keynote
Open →
2025-12
50:25
Zen and the Art of Cognitive Defense: Zero-Trust Mindsets and Cyber-Mindfulness
Anna Collard
Christine Gordon-Bennett
BSides Cape Town
· 2025
Research
Technical
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-02
38:30
Maximising the Impact of OSINT in Investigations
Ruth McAlister
BSides Belfast
· 2023
Research
Technical
DFIR
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-11
50:37
The Power of Guardrails: How to Slash Your Risk of XSS in Half
Colleen Dai
Grayson Hardaway
BSides Las Vegas
· 2021
Technical
Vulnerability Research
Web AppSec
Empirical Research
Technical Deep-dives
Talk
Open →
2021-08
30:42
Malware, Cats and Cryptography
Zhassulan Zhussupov
BSides Sofia
· 2024
Research
Technical
Cryptography
Malware Analysis
Reverse Engineering
Advanced
Red
Empirical Research
+2
Open →
2024-04
41:46
Clean Forensics: Analyzing Network Traffic of Vacuum Bots
Karan Dwivedi
BSides Las Vegas
· 2022
Technical
IoT
Network Security
Privacy
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-09
24:39
Why I am (still) finding secrets in your code
Luke Marshall
BSides Canberra
· 2025
Research
Technical
DevSecOps
Supply Chain Security
Vulnerability Research
Blue
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2025-12
22:29
Reassessing 50k Vulnerabilities: Insights from SSVC Evaluations in Japan's Largest Telco
Hirofumi Kawauchi
BSides Las Vegas
Research
Technical
Threat Intel
Vulnerability Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2024-09
24:58
What's Inside The Open Directory From 96 Different Threat Actors?
Alana Witten
BSides London
· 2025
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-02
41:41
Hack, Patch, Repeat: Insider Tales from Android's Bug Bounty
Maria Uretsky
Camillus Cai
BSidesSF
· 2025
Technical
Mobile Security
Vulnerability Research
Blue
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-06
53:27
Unparalleled Remote Desktop Monitoring: Revealing Attackers' Tradecraft
Olivier Bilodeau
Adrian Beron
BSides Augusta
· 2023
Research
DFIR
Malware Analysis
Network Security
Threat Intel
Blue
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2023-10
38:33
BSidesBUD2022: Github Actions Security Landscape
Alex Ilgayev
Ilia Shkolyar
BSides Budabest
· 2022
Technical
DevSecOps
Supply Chain Security
Empirical Research
Technical Deep-dives
Talk
Open →
2023-06
40:44
Social Engineering: Training The Human Firewall
Reanna Schultz
BSides Knoxville
· 2023
Research
Detection Engineering
Social Engineering
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-05
28:23
State of API Security 2024: Insights from Analyzing 1 Million Domains
Tristan Kalos
Antoine Carossio
BSides Seattle
· 2024
Research
Empirical Research
Talk
Open →
2024-10
43:10
Parser Differentials
Imre Rad
BSides Budabest
· 2023
Research
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2023-07
33:12
Watching the Watchmen: An Introduction to Certificate Transparency Logs
Luis Grangeia
BSides Lisbon
· 2025
Technical
OSINT
Threat Intel
Web AppSec
Empirical Research
Technical Deep-dives
Talk
Open →
2025-12
22:10
AI Agents: Your New Security Team Members Or Biggest Threat?
Michael Ifeanyi
BSides Toronto
· 2025
Technical
AI Security
Detection Engineering
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-10
55:34
Measuring the IQ of Your Threat Intelligence Feeds
Kyle Maxwell
Alex Pinto
BSides Las Vegas
· 2014
Research
Technical
Threat Intel
Empirical Research
Methodology
Talk
Open →
2016-12
42:16
The Fellowship of the Ring0: Driver Risk Scoring for Vulnerability Detection
Dana Behling
BSides Charm
· 2024
Research
Technical
Detection Engineering
Malware Analysis
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2024-06
40:29
Detecting Log4J on a Global Scale Using Collaborative Security
Klaus Agnoletti
BSides Las Vegas
· 2022
Technical
Threat Intel
Vulnerability Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-09
22:10
GT - What Do We Learn When We Scan the Internet every hour?
Ariana Mirian
BSides Las Vegas
Research
Network Security
Threat Intel
Empirical Research
Technical Deep-dives
Talk
Open →
2024-09
46:30
The Russia-Ukraine War: A Retrospective
Jared Naude
BSides Cape Town
· 2022
Policy
Research
Malware Analysis
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-10
30:30
Dynamic Analysis of Malware Using Runtime Opcodes
Domhnall Carlin
BSides Belfast
· 2016
Technical
Malware Analysis
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2017-09
17:18
How Secure Are Webinar Platforms?
Michał Ogorzałek
BSides Berlin
· 2021
Technical
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-09
35:47
Patterns, Trends And Practises In Software Security by Elisa Cavatorta
Elisa Cavatorta
BSides London
Research
Vulnerability Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-05
37:22
Large-scale Security Analysis of IoT Firmware
Daniel Nussko
BSides Budabest
· 2021
Research
Empirical Research
Technical Deep-dives
Talk
Open →
2022-03
36:54
Lost in Translation? Making Pentest Reports Speak the Client's Language
Maria P Murumaa
Katarina Galanska
BSides Tallinn
· 2025
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-10
17:34
AI in the Human Loop: GenAI in Security Service Delivery
Preeti Ravindra
BSides Las Vegas
· 2024
Research
AI Security
Detection Engineering
Empirical Research
Methodology
Talk
Open →
2024-09
32:16
The Internet Is Talking To You, But Do You Listen?
Tiago Henriques
Florentino Bexiga
BSides Lisbon
· 2019
Research
Technical
Malware Analysis
Network Security
Threat Intel
Blue
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2019-12
22:12
Is ChatGPT a friend or foe to CTF competitions?
Heloise Meyer
BSides Joburg
· 2024
Community
Technical
AI Security
CTF
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-02
48:03
Collecting Threat Data using Distributed Deception
Michael Edie
BSides Augusta
· 2022
Technical
Malware Analysis
Threat Intel
Threat Modeling
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-10
48:00
GT - Playing Games with Cybercriminals
Jonathan Lusthaus
BSides Las Vegas
Policy
Empirical Research
Methodology
Talk
Open →
2023-10
50:08
Static Detection of Novel Malware Using Transfer Learning with Deep Neural Networks
Emily Rexer
Henry Reed
BSides Las Vegas
· 2021
Research
Technical
AI Security
Malware Analysis
Empirical Research
Technical Deep-dives
Talk
Open →
2021-08
47:34
Threat Actors' Interest in AI — Separating Hype from Reality
Rachel James
BSides PDX
· 2024
Research
AI Security
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2024-11
48:35
Hiding in Plain Sight: The Untold Story of Hidden Vulnerabilities
Yotam Perkal
Ofri Ouzan
BSides Las Vegas
· 2023
Research
Container Security
Supply Chain Security
Vulnerability Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-10
22:11
Screaming About Detection Coverage in ALLCAPS
Evan Perotti
BSides Philly
· 2025
Technical
Detection Engineering
Threat Modeling
Purple
Empirical Research
Methodology
Talk
Open →
2026-02
17:54
Bots Combine!: Behind the Modern Botnet
Andrea Scarfo
BSides Amsterdam
· 2017
Research
Empirical Research
Technical Deep-dives
Talk
Open →
2017-09
53:59
SQL Injection Is a Thing of the Past… and Other Lies We Tell Ourselves
BSides Charm
· 2025
Technical
Vulnerability Research
Web AppSec
Empirical Research
Talk
Open →
2025-05
43:44
Don't Make This Mistake: Painful Learnings of Applying AI in Security
Kirill Efimov
Eitan Worcel
BSides Las Vegas
· 2024
Technical
AI Security
DevSecOps
Web AppSec
Empirical Research
Technical Deep-dives
Talk
Open →
2024-09
23:11
Analyzing User Decision Making on Phishing Sites Using Mouse Data and Keyboard Dynamics
Sanne Maasakkers
BSides Las Vegas
· 2019
Research
Empirical Research
Technical Deep-dives
Talk
Open →
2019-10
33:32
Open by Default: The Hidden Cost of Convenience in Network Security
Aurelio Picon Lopez
BSides Budabest
· 2024
Technical
Empirical Research
Talk
Open →
2025-02
23:20
Talk 1 - Cameras, CACs & Clocks: Enterprise IoT Security Sucks - A Story of Two Million Interrogated
Brian Contos
BSides Athens
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-06
18:25
Is Your Voice Private? Security Concerns With Voice Assistants
Zafrin Malek Mithila
BSides Bristol
· 2025
Research
IoT
Privacy
Vulnerability Research
Intro
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2024-11
44:36
GT - Navigating the Changing Cyber Landscape: Trends, Costs, and Risk Mitigation Strategies
Wendy Hou-Neely
BSides Las Vegas
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2024-09
37:30
Insights on Using a Cloud Telescope to Observe Internet-Wide Botnet Propagation Activity
Fabricio Bortoluzzi
BSides Las Vegas
· 2024
Research
Cloud IAM
Malware Analysis
Threat Intel
Empirical Research
Technical Deep-dives
Talk
Open →
2024-09
56:15
Dominating the DBIR Data
Anastasia Atanasoff
Gabriel Bassett
BSides Las Vegas
· 2016
Research
Empirical Research
Methodology
Talk
Open →
2016-08
45:44
Developing a cybersecurity framework for commercial banks in South Africa - Tlhologelo Mphahlele
Tlhologelo Mphahlele
BSides Joburg
· 2024
Research
Case Studies and Incidents Analysis
Empirical Research
Methodology
Talk
Open →
2024-10
49:31
Cameras, CACs & Clocks: Enterprise IoT Security Sucks
Brian Contos
BSides Knoxville
Technical
IoT
Threat Intel
Vulnerability Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-05
23:47
OAuth Third-Party Persistence: Bypassing Cloud App Mitigations
Gadi Z Naveh
Alon Rosenblum
BSides Las Vegas
· 2022
Research
Technical
Cloud IAM
Web AppSec
Intermediary
Red
Empirical Research
Technical Deep-dives
+1
Open →
2022-09
50:09
Back to Basics: Using Descriptive Statistics to Study the Shape of the Internet
Emily Austin
BSides Las Vegas
· 2022
Research
Threat Intel
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2022-09
22:29
Human or Machine? The Voight Kampff Test for Web Application Vulnerabilities
Vanessa Sauter
BSides Athens
· 2020
Technical
Vulnerability Research
Web AppSec
Intermediary
Blue
Empirical Research
Technical Deep-dives
Talk
Open →
2020-06
16:50
Unveiling the Hidden: Discovering RDP Vulnerabilities using PDF Files
Dor Dali
BSides Las Vegas
· 2023
Research
Technical
Network Security
Vulnerability Research
Advanced
Empirical Research
Technical Deep-dives
Talk
Open →
2023-10
33:39
I Won't Allow My Child to Have a Smartphone: Why Smart Parents Make Not-So-Smart Children
Arun Vishwanath
BSides Las Vegas
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2024-09
28:49
Exploring Discrepancies In CISO Job Advertisements: An Analysis - Leonhard Kurthen and Daniel Fall
Leonhard Kurthen
Daniel Fall
BSides Munich
· 2023
Career
Research
Career & Soft Skills
GRC
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-10
19:04
Can LLMs Take Our Jobs? AI-Assisted Detection Research
Maam Khan
Darsh Smith
Uday Mayapan
RC Oric
BSides PDX
· 2024
Research
Technical
AI Security
Detection Engineering
Threat Intel
Blue
Empirical Research
Technical Deep-dives
+1
Open →
2024-11
35:21
Container Crisis 3: More Containers More Problems
Caprico
BSides Dallas/Fort Worth
· 2022
Technical
War Stories
Container Security
Malware Analysis
OSINT
Threat Intel
Blue
Red
+3
Open →
2022-11
24:25
Enhancing Incident Response with AI: Leveraging ML for OT/IoT/IIoT Attack Detection and Prevention
Prof. Atdhe Buja
BSides Philly
· 2025
Research
Technical
AI Security
Detection Engineering
IoT
Malware Analysis
Empirical Research
Technical Deep-dives
+1
Open →
2026-02
19:07
Broke but Breached: Secret Scanning at Scale on a Student Budget
Raviteja
Ming Chow
BSides Las Vegas
· 2025
Research
Technical
DevSecOps
Supply Chain Security
Vulnerability Research
Intermediary
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2025-12
25:23
Phishing Kit Finder
Qasim Khan
BSides Wellington
· 2017
Research
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-02
38:18
Understanding Human Behavior to Improve InfoSec
Alexandre Sieira
Matthew Hathaway
BSidesSF
· 2016
Empirical Research
Talk
Open →
2016-04
43:30
Hype vs. Hands-On: What GenAI Actually Brings to ID & Response
Marvin Ngoma
BSides Tallinn
· 2025
Research
Empirical Research
Talk
Open →
2025-10
45:28
Building The ATT&CK Pipeline For Linux - Tim Wadhwa-Brown
Tim Wadhwa-Brown
BSides London
· 2025
Research
Technical
Blue
Purple
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-02
16:06
Gorillas in Our Midst: The Runtime Secrets of Evasive IoT Malware
Carl Fitzpatrick
BSides Belfast
· 2025
Research
Technical
IoT
Malware Analysis
Reverse Engineering
Advanced
Empirical Research
Technical Deep-dives
+1
Open →
2025-12
50:04
Bad Neighborhoods – Data-Driven Detection of Malicious Internet Infrastructure
Tamás Vörös
Richard Arang
George Sacks
BSides Las Vegas
· 2021
Research
Technical
Advanced
Empirical Research
Technical Deep-dives
Talk
Open →
2021-08
30:57
Under the Hood of Ransomware.live: Building an Open-Source Ransomware Observatory
Julien Mousqueton
BSides Bournemouth
· 2025
Research
Technical
Malware Analysis
OSINT
Threat Intel
Intermediary
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2025-09
34:07
The Cloud is for Launching Cyber Attacks
Raymond Cazanese
BSides Philly
· 2020
Technical
Cloud IAM
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2020-12
41:03
Hold My Beer: Ransomware Operations and the Race to the Bottom
Laurie Iacono
Dan Cox
BSides Peru
· 2021
Technical
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-10
57:07
Scratching the Surface of Risk
Benjamin Edwards
Wade Baker
BSides Las Vegas
· 2019
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2019-10
View all 152 talks tagged Empirical Research →