Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Research
Technical Deep-dives talks at BSides
580 talks tagged
Technical Deep-dives
from 87 chapters of BSides events worldwide.
Related topics
Advanced
Technical
Vulnerability Research
Research
Talk
Malware Analysis
39:40
The Dark Side of Wireless Networks: Intro to Wi-Fi Hacking
Megi Bashi
Ryan Dinnan
BSides Prishtina
Technical
Wireless Security
Intro
Red
Technical Deep-dives
Demo
Talk
Open →
2023-05
28:37
Elliptic Curve Cryptography for those who are afraid of maths
Martijn Grooten
BSides London
Technical
Cryptography
Intro
Technical Deep-dives
Talk
Open →
2015-07
45:24
It's the Little Things
Ben Sadeghipour
BSides PDX
· 2018
Technical
Web AppSec
Intermediary
Red
Technical Deep-dives
Talk
Open →
2019-02
36:09
New Attacks On The MIFARE DESFire EV1 Smartcard Used In Public Transportation
Rory Flynn
BSides Belfast
· 2020
Technical
Cryptography
Advanced
Red
Technical Deep-dives
Talk
Open →
2020-01
35:36
(Perfect) Cell Games: You Thought It Was Just Surveillance...
Mike Curnow
Bsides CT 2025
Research
Technical
Cellular Security
Wireless Security
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-12
36:12
Recursion is a Harsh Mistress
Joel Moore
BSides Charleston
· 2024
Tooling
Intermediary
Red
Technical Deep-dives
Talk
Open →
2024-11
49:41
Open Source Malware Lab
Robert Simmons
BSides London
· 2016
Technical
DFIR
Detection Engineering
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2016-07
28:04
Exposing Malicious USB Cables: Hardware Detection of Embedded Implants
Jaynie Shorb
BSides PDX
· 2022
Technical
Intermediary
Blue
Technical Deep-dives
Demo
Talk
Open →
2022-10
31:06
From Email Address to Phone Number: A New OSINT Approach
Martin Vigo
BSides Las Vegas
· 2019
Technical
OSINT
Social Engineering
Red
Technical Deep-dives
Talk
Open →
2019-10
47:57
Exploit Development Is Dead, Long Live Exploit Development!
Connor McGarr
BSides KC
· 2021
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-11
27:37
PowerShell-Fu — Hunting on the Endpoint
Chris Gerritz
BSides Las Vegas
· 2016
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Technical Deep-dives
Talk
Open →
2016-08
47:26
Smokeloader: The Pandora's box of tricks, payloads and anti-analysis
Pim Trouerbach
BSides PDX
· 2022
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-10
48:32
DOM Based Angular Sandbox Escapes
Gareth Heyes
BSides Manchester
· 2017
Technical
Vulnerability Research
Web AppSec
Advanced
Red
Technical Deep-dives
Talk
Open →
2017-08
41:25
Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK
Jackie Lasky
Sarah Yoder
BSides DC
· 2019
Technical
Purple
Methodology
Technical Deep-dives
Talk
Open →
2019-11
30:07
Local Admin in less than 60 seconds
Nikos Vourdas
BSides Budabest
· 2024
Technical
Active Directory
Kerberos
Vulnerability Research
Red
Technical Deep-dives
Talk
Open →
2025-01
41:58
BotProbe - botnet traffic capture using IPFIX
Mark Graham
Adrian Winkles
BSides London
· 2018
Technical
Malware Analysis
Network Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-06
39:30
Pwning Cloud Contexts: From GitHub Token to Compromising an Entire GCP Organization
Ayoub Fathi
BSides Ahmedabad
· 2024
Technical
Cloud IAM
Supply Chain Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-04
37:13
Phishing With Phineas (Again) Hack Recreation On Steroids
George Karantzas
Constantinos Patsakis
BSides Athens
· 2022
Technical
Advanced
Purple
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-06
44:16
An Introduction To Fault-Injection For Exploiting Bug-Free Code In Embedded Systems
BSides London
· 2025
Technical
Cryptography
Intermediary
Red
Technical Deep-dives
Talk
Open →
2025-02
50:11
No Code Execution? No Problem! — Living The Age of Virtualization-Based Security
Connor McGarr
BSides KC
· 2022
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-10
44:04
Noooooooooo touch!
Michael Rodger
BSides Cape Town
· 2023
Technical
Hardware Hacking
Physical Security
Reverse Engineering
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-12
48:23
Koadic C3: Windows COM Command & Control Framework
Sean Dillon
Zach Harding
BSides Las Vegas
· 2017
Technical
Malware Analysis
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2017-08
27:38
Linux Under Siege: Analyzing the Latest Cyber Espionage Tactics and Malware Trends
Marc Rivero Lopez
BSides Budabest
· 2024
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-01
25:38
Race Against the Machine: Rapid Exploit Development via LLMs
Matthew Deluca
BSides Augusta
· 2023
Research
Technical
AI Security
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2023-10
41:32
The Dark Side of DeFi
Rudra Singh
Arbaz Hussain
BSides Ahmedabad
· 2022
Technical
Smart Contract Security
Vulnerability Research
Web AppSec
Intermediary
Technical Deep-dives
Talk
Open →
2023-02
40:34
Exploiting Alpine Linux: From vulnerability discovery to code execution
Ariel Zelivansky
BSides DC
· 2017
Technical
Container Security
Vulnerability Research
Technical Deep-dives
Talk
Open →
2017-10
45:56
Flash Memory, NAND, ECC, Oh My! Practical Techniques for Acquiring and Processing Raw NAND Images
Jake Valletta
BSides Charleston
· 2022
Technical
DFIR
Hardware Hacking
IoT
Reverse Engineering
Technical Deep-dives
Talk
Open →
2023-01
29:31
Master Of Puppets: How To Tamper The EDR?
Daniel Feichter
BSides Munich
· 2022
Technical
Malware Analysis
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-05
23:03
Return-Oriented Exploitation on ARM
Tamás Tokics
BSides Budabest
· 2019
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2019-06
27:24
Cold Case — Catch a Killer in 16 Bytes
Iggy
BSides Canberra
· 2021
Technical
War Stories
DFIR
Hardware Hacking
Reverse Engineering
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2021-04
26:38
A Deep Dive into Go Malware: Using Metadata to Empower the Analyst
Joakim Kennedy
BSidesSF
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2019-03
48:43
Inside Google's Discovery & Remediation of a Critical CPU Vulnerability
Yousif Hussin
BSides Lisbon
· 2024
Research
Technical
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-12
38:31
The Next Generation of Web Exploits: From Cache Poisoning to Multi-Layer Fingerprinting
Steve Sprecher
Bsides CT
· 2025
Technical
Vulnerability Research
Web AppSec
Empirical Research
Technical Deep-dives
Talk
Open →
2025-12
26:27
What would Quantum Computing and Machine Learning do to crypto?
Dr. Najwa Aaraj
BSides Athens
· 2021
Research
Technical
Cryptography
Technical Deep-dives
Keynote
Open →
2021-07
44:07
Graham Sutherland: Breaking Binary Protocols and Bad Crypto
Graham Sutherland
BSides London
· 2014
Technical
Cryptography
Network Security
Reverse Engineering
Red
Technical Deep-dives
Talk
Open →
2014-05
48:31
Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone
Nick Stephens
BSides DC
· 2018
Technical
Hardware Hacking
Mobile Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+2
Open →
2018-11
28:13
An Open Source Malware Classifier and Dataset
Phil Roth
BSidesSF
· 2018
Research
Empirical Research
Technical Deep-dives
Talk
Open →
2018-04
25:14
From Firmware to Exploit
Michael Messner
BSides Las Vegas
· 2023
Technical
Tooling
Firmware Security
IoT
Reverse Engineering
Vulnerability Research
Intermediary
Technical Deep-dives
+1
Open →
2023-10
44:30
Writing a Mask ROM Tool
Travis Goodspeed
BSides Knoxville
· 2023
Technical
Hardware Hacking
Reverse Engineering
Advanced
Technical Deep-dives
Talk
Open →
2023-05
42:30
Crash all the Flying Things! — Exploiting and Defending Aircraft Collision Avoidance
Joe Greenwood
BSides London
· 2015
Technical
Hardware Hacking
Threat Modeling
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2015-07
34:04
Automating Threat Hunting on the Dark Web
Apurv Singh Gautam
BSides Philly
· 2020
Technical
OSINT
Threat Intel
Technical Deep-dives
Talk
Open →
2020-12
35:12
Hardware Hacking the Internet of Things (IoT)
Deral Heiland
BSides Belfast
· 2025
Research
Technical
Methodology
Technical Deep-dives
Talk
Open →
2025-02
22:11
Automating Binary Analysis With Machine Learning… And A Bunch Of Scripts - James Stevenson
James Stevenson
BSides Cheltenham
· 2026
Technical
Technical Deep-dives
Talk
Open →
2024-07
42:25
Bypassing AppLocker Protection by Manipulating Its Cache
Grzegorz Tworek
BSides Prishtina
· 2023
Technical
Reverse Engineering
Vulnerability Research
Red
Technical Deep-dives
Talk
Open →
2023-05
50:58
Threat hunting: Using MITRE ATT&CK against Carbanak malware
Amol Sarwate
BSidesSF
· 2022
Technical
Detection Engineering
Malware Analysis
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2022-07
1:04:18
Java Serialization Attacks
Robert Seacord
BSides Peru
· 2017
Technical
Vulnerability Research
Web AppSec
Technical Deep-dives
Talk
Open →
2017-07
58:26
I for one welcome our new Cyber Overlords! An intro to ML in cybersecurity
BSides Lisbon
· 2016
Research
Technical
Intro
Empirical Research
Technical Deep-dives
Talk
Open →
2016-11
24:36
The Security of Emojis
Adrian Justice
BSides Canberra
· 2021
Technical
Technical Deep-dives
Talk
Open →
2021-04
43:04
How to fuzz?
Kamil Frankowicz
BSides Warsaw
· 2016
Technical
Vulnerability Research
Technical Deep-dives
Talk
Open →
2016-10
42:15
Adventures in Asymmetric Warfare: Fighting the AV Vendors
Will Schroeder
BSides DC
· 2014
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2014-10
22:40
Pensieve: Finding Malicious Artifacts in Container Environments
Yathi Naik
BSidesSF
· 2018
Technical
Container Security
DFIR
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2018-04
55:07
Exposing the Neutrino EK: All the Naughty Bits
Ryan Chapman
BSides Las Vegas
· 2016
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2016-08
34:59
Keytap acoustic keyboard eavesdropping
Georgi Gerganov
BSides Sofia
· 2023
Technical
Cryptography
Reverse Engineering
Technical Deep-dives
Talk
Open →
2023-03
54:50
Well well well, if it isn't the consequences of my own actions
Justin Steven
BSides Canberra
· 2025
Technical
Cryptography
Supply Chain Security
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
50:28
Estonian Electronic Identity Card and its Security Challenges
Arnis Paršovs
BSides Tallinn
· 2021
Research
Cryptography
DFIR
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-10
48:58
Bringing Red vs. Blue to Machine Learning
Bobby Filar
BSides DC
· 2018
Technical
Adversarial Machine Learning
Intermediary
Purple
Red
Technical Deep-dives
Talk
Open →
2018-11
43:40
Diaphora: a new FOSS program diffing tool
Joxean Koret
BSides Lisbon
· 2015
Technical
Reverse Engineering
Vulnerability Research
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2015-07
43:48
Scudo Allocator exploitation
Zac Ecob
BSides Canberra
· 2023
Technical
Advanced
Red
Technical Deep-dives
Talk
Open →
2024-01
51:17
BSidesSF 2023 - Advanced Attack Vectors in Azure Environments (Zur Ulianitzky, Bill Ben Haim)
Zur Ulianitzky
Bill Ben Haim
BSidesSF
· 2023
Technical
Active Directory
Cloud IAM
Advanced
Red
Technical Deep-dives
Talk
Open →
2023-05
26:05
CoinMiner Are Evasive - Omri Segev Moyal & Thomas Roccia
Omri Segev Moyal
Thomas Roccia
BSides TLV
· 2018
Technical
Detection Engineering
Malware Analysis
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-07
45:24
BSides Rochester 2016: Nitin Jami: Exploring SecAccessControl Obj in iOS 9 Keychain
Nitin Jami
BSidesROC
· 2016
Technical
Mobile Security
Reverse Engineering
Technical Deep-dives
Talk
Open →
2016-05
39:52
Defensive Security Research is Sexy too (& Real Sign of Skill)
Ollie Whitehouse
BSides London
· 2014
Research
Methodology
Technical Deep-dives
Talk
Open →
2014-05
30:48
A Two-part Saga: Continuing the Journey of Hacking Malware C2s
Vangelis Stykas
BSides Prague
· 2024
Technical
Malware Analysis
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-04
19:23
Ding Dong The EDR is DEAD
Ayman Sagy
BSides Canberra
· 2025
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-12
37:43
Finding Obvious Automotive Security Bugs Using Common Tools & Attacks
Jay Turla
BSides Ahmedabad
· 2025
Technical
Automotive Security
Hardware Hacking
Reverse Engineering
Wireless Security
Intermediary
Red
Technical Deep-dives
+1
Open →
2025-04
26:49
How Adversarial Noise Protects Selfies from AI-Based Deepfake Misuse
Tanya Sadhani
BSides Canberra
· 2024
Technical
AI Security
Privacy
Technical Deep-dives
Talk
Open →
2024-12
40:14
When Malware Becomes Creative: A Survey of Advanced Android Detection Evasion Tactics
Dimitrios Valsamaras
José Leitão
BSides Lisbon
· 2024
Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
22:50
BADPDF: Stealing Windows Credentials via PDF Files
Ido Solomon
Adi Ikan
BSidesSF
· 2019
Technical
Network Security
Vulnerability Research
Web AppSec
Red
Technical Deep-dives
Talk
Open →
2019-03
33:14
Deconstruction Of A Linux Adversarial Toolkit
Christian Giuffre
BSides Canberra
· 2019
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2019-05
17:09
I've seen you get hacked! (AI Real-Time Attack Simulation)
BSides Joburg
Technical
Intermediary
Blue
Technical Deep-dives
Demo
Open →
2024-12
53:20
AI in OSINT — Zero Snake Oil
Roelof Temmingh
BSides Cape Town
· 2025
Technical
AI Security
OSINT
Technical Deep-dives
Demo
Talk
Open →
2025-02
22:20
When is a vulnerability not a vulnerability? Overcoming the inundation of noisy supply chain security alerts
Adam Berman
BSidesSF
· 2023
Technical
Supply Chain Security
Technical Deep-dives
Talk
Open →
2023-05
44:00
The Nation State Actor Ate My Homework!
Liam Smit
BSides Cape Town
· 2019
Research
Hardware Security
Malware Analysis
Reverse Engineering
Threat Intel
Advanced
Case Studies and Incidents Analysis
Empirical Research
+2
Open →
2019-12
26:12
GT - The New Cat and Mouse Game: Attacking and Defending Machine Learning Based Software - Joshua Sa
Joshua Saxe
BSides Las Vegas
· 2017
Research
Technical
AI Security
Malware Analysis
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-09
58:15
Modern Linux Kernel Mitigations
Ray Veldkamp
Matthew Kurz
BSides Canberra
· 2023
Technical
Vulnerability Research
Blue
Technical Deep-dives
Talk
Open →
2023-10
20:37
From MS08-067 to EternalBlue
Denis Isakov
BSides Manchester
· 2017
Technical
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-08
55:50
Practical Serialization Attacks
Nicky Bloor
BSides Manchester
· 2017
Technical
Reverse Engineering
Vulnerability Research
Web AppSec
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2017-08
29:14
Alex Kirk - Incident response and threat hunting using Bro/Zeek data
Alex Kirk
BSides Augusta
· 2019
Technical
DFIR
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2019-10
38:58
LOLGrid: Don't Bring Your Own Network, One Already Exists
Brent Shaw
BSides Cape Town
· 2025
Technical
Hardware Hacking
Network Security
Physical Security
Red
Technical Deep-dives
Talk
Open →
2025-03
43:53
Pwning Electric Motorcycles
Mitchell Marasch
Persephone Karnstein
BSides Seattle
· 2026
Research
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2026-03
32:59
EDR Evasion Primer
Jorge Gimenez
BSides Berlin
· 2022
Technical
Active Directory
Malware Analysis
Advanced
Red
Technical Deep-dives
Talk
Open →
2023-02
31:52
A Case Study of MacOS Supply Chain Compromise
Jason Craig
Michael George
BSidesSF
· 2018
Technical
Detection Engineering
Malware Analysis
Supply Chain Security
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-04
36:09
Insecurity through Censorship: Vulnerabilities Caused by The Great Firewall, S Shah & M Gianarakis
S Shah
M Gianarakis
BSides Canberra
Research
Technical
Cellular Security
Red
Technical Deep-dives
Talk
Open →
2024-10
40:54
Travis Goodspeed - An Amateur's Guide to Microchip Decapsulation Chemistry
Travis Goodspeed
BSides Knoxville
Technical
Hardware Hacking
Hardware Security
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-05
47:19
Attacking Patient Health: The Anatomy of Hospital Exploitation
Jacob Holcomb
BSides DC
· 2016
Research
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2016-10
29:46
X-Ray of Malware Evasion Techniques: Analysis, Dissection, Cure
Thomas Roccia
BSides Sydney
· 2023
Technical
Malware Analysis
Reverse Engineering
Blue
Technical Deep-dives
Talk
Open →
2023-05
45:17
Open Sesame – All Your Doors Are Belong To Us
Kev Breen
Ben McCarthy
BSides London
· 2025
Technical
Cryptography
Hardware Hacking
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2026-03
51:56
Unbreaking the iPhone: Bootchain Reversal, SEP Sabotage, and the iOS Kernel Frontier
Jack Sessions
BSides Canberra
· 2025
Technical
DFIR
Mobile Security
Reverse Engineering
Advanced
Red
Technical Deep-dives
Demo
Open →
2025-11
41:09
Blowing up Gas Stations for fun and profit
Pedro Umbelino
BSides Lisbon
Research
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
45:09
"An abridged history of Linux kernel hardening" - Russell Currey, BSides Canberra 2023
Russell Currey
BSides Canberra
· 2023
Technical
Technical Deep-dives
Talk
Open →
2023-10
23:55
A Study on Intrusion Detection Systems with a Practical Experiment on Snort - Vigneshwar Sethuraman
Vigneshwar Sethuraman
BSides Vancouver
· 2021
Technical
Detection Engineering
Network Security
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-06
47:21
Analysis and Defense of Automotive Networks
Samuel Hollifield
BSides Knoxville
· 2020
Technical
Hardware Security
Network Security
Reverse Engineering
Empirical Research
Technical Deep-dives
Talk
Open →
2020-05
59:11
Vehicle Cyber Security and Innovative Assessment Techniques
Andy Davis
David Claire
BSides Manchester
· 2016
Technical
War Stories
Hardware Hacking
Reverse Engineering
Vulnerability Research
Wireless Security
Advanced
Red
+3
Open →
2016-10
48:22
An Attack & a Defense in the Context of Security of Digital ICs
Mahesh Tripunitara
BSides Toronto
· 2015
Research
Technical
Hardware Hacking
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-11
42:54
Perfect Data Exfiltration Techniques: Bypassing DLP and Detection
Éric Filiol
BSides Lisbon
· 2022
Technical
Cryptography
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-12
29:53
Google Pay, Drug Bots, & SIM Swaps: How Old Leaks Power New Attacks
Sarit Yerushalmi
Ron Masas
BSides London
· 2025
Research
Technical
OSINT
Social Engineering
Vulnerability Research
Web AppSec
Advanced
Case Studies and Incidents Analysis
+2
Open →
2026-03
42:18
What Botnet Is This?
Tiago Pereira
BSides Lisbon
· 2015
Technical
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-07
33:15
Keynote: Winning the AI Race: Verifiability is All You Need
Sergej Epp
BSides Frankfurt
· 2025
Technical
AI Security
Detection Engineering
Threat Modeling
Technical Deep-dives
Keynote
Open →
2025-12
19:11
Deconstructing APT28's XAgent for OSX
Tiberius Axinte
BSidesSF
· 2018
Technical
Malware Analysis
Reverse Engineering
Blue
Technical Deep-dives
Talk
Open →
2018-04
25:29
Unlocking macOS Internals: A Beginner's Guide to Apple's Open Source Code
Olivia Gallucci
BSides 312
· 2025
Technical
Intro
Technical Deep-dives
Talk
Open →
2025-10
View all 580 talks tagged Technical Deep-dives →