Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Telegram
38
talks mention this tool across
29
BSides chapters.
Talks featuring Telegram
40:17
A Threat Analysis of 0ktapus SMS Phishing Campaigns
Will Thomas
BSides Cheltenham
· 2023
Technical
War Stories
Malware Analysis
Social Engineering
Threat Intel
Talk
Open →
2023-06
45:10
Gollum: One Anti-Phish Bot to Rule Them All
Byron Rudman
BSides Cape Town
· 2019
Technical
Detection Engineering
Threat Intel
Tooling
Blue
Talk
Open →
2019-12
6:24:30
BSidesPDX 2025 - Friday, Track 2
BSides PDX
· 2025
Open →
2025-10
41:14
The Dark World Of SMS Phishing Kits: An Insider's Perspective
Jake Sloane
BSides Dublin
· 2023
Technical
Talk
Open →
2023-07
29:53
Google Pay, Drug Bots, & SIM Swaps: How Old Leaks Power New Attacks
Sarit Yerushalmi
Ron Masas
BSides London
· 2025
Research
Technical
OSINT
Social Engineering
Vulnerability Research
Web AppSec
Advanced
Case Studies and Incidents Analysis
+2
Open →
2026-03
50:51
Introducing Man In The Contacts attack to trick encrypted messaging apps
Jérémy Matos
BSides Lisbon
· 2016
Technical
Red
Talk
Open →
2016-11
20:58
Modifying WhatsApp Messages
Yuri Livshitz
BSides TLV
· 2021
Technical
DFIR
Mobile Security
Technical Deep-dives
Demo
Open →
2021-08
49:20
Whack A Phish
Geoffrey Chisnall
BSides Joburg
· 2025
Technical
Talk
Open →
2025-09
39:39
Breaking Bad Multifactor: MFA Bypasses And How To Assess The Risks
Chester Wisniewski
BSides London
Technical
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-02
32:24
Travel with Underground Services: ecosystem exposed - Vladimir Kropotov
Vladimir Kropotov
BSides London
· 2018
Talk
Open →
2018-06
29:45
The Brazilian Deep Web: How Fraud Groups Operate on Telegram and WhatsApp
Thiago Bordini
BSides Las Vegas
OSINT
Social Engineering
Threat Intel
Talk
Open →
2023-10
40:28
Slipping The Net: Qakbot, Emotet And Defense Evasion
Cian Heasley
BSides Cambridge
· 2024
Technical
Detection Engineering
Malware Analysis
Social Engineering
Blue
Talk
Open →
2024-01
31:20
Cyber Fraud Landscape
Jordan Powell
BSides Leeds
· 2024
Technical
Talk
Open →
2024-08
30:42
Malware, Cats and Cryptography
Zhassulan Zhussupov
BSides Sofia
· 2024
Research
Technical
Cryptography
Malware Analysis
Reverse Engineering
Advanced
Red
Empirical Research
+2
Open →
2024-04
33:08
Saturday Night Phishing Show
Jarrad Pemberton
Tormi Tuuling
BSides Tallinn
· 2024
Technical
Talk
Open →
2024-10
53:27
Unparalleled Remote Desktop Monitoring: Revealing Attackers' Tradecraft
Olivier Bilodeau
Adrian Beron
BSides Augusta
· 2023
Research
DFIR
Malware Analysis
Network Security
Threat Intel
Blue
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2023-10
30:26
My First Phish: The SAIGA Saga
Justin Soyke
BSides Canberra
· 2025
Technical
Malware Analysis
OSINT
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
22:41
Communities @ Risk
Katie Kleemola
BSides Toronto
· 2014
Research
Malware Analysis
Mobile Security
OSINT
Privacy
Talk
Open →
2014-12
22:47
Behind the Scenes of a Tailor-Made Massive Phishing Campaign
Sarit Yerushalmi
Yohann Sillam
BSides TLV
· 2024
Technical
Malware Analysis
OSINT
Reverse Engineering
Social Engineering
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-08
53:20
Going Undercover in the Underground - A Guide on How to Infiltrate and Engage - Michael-Angelo Zummo
Michael-Angelo Zummo
BSides KC
· 2023
Technical
Red
Demo
Talk
Open →
2023-10
36:45
Anonymity or Security: Encrypted Messaging Apps in Modern Espionage and Counterintelligence
Bidemi Ologunde
BSides Tampa
· 2025
Policy
Talk
Open →
2025-07
43:28
BSides SP 2025 - Ciberinteligência com LLMs
BSides São Paulo
Open →
2025-06
52:44
Organic, freerange credentials harvested from your browser
Peeter Marvet
BSides Tallinn
Technical
Web AppSec
Red
Demo
Talk
Open →
2025-10
17:16
Baby, Don't Forget My Number. OSINT using your phone's address book
Leonidas Tsaousis
BSides Athens
· 2022
Technical
Talk
Open →
2022-06
28:03
Threats Lurking Beneath the Subsurface: Understanding and Analyzing Threats to Windows Subsystem for Linux
Danny Adamitis
BSides Charm
· 2022
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2022-07
40:52
Matija Kos | Hackers Don’t Hack, They Log In: The Threat of Stolen Credentials
Matija Kos
BSides Zagreb
Technical
Detection Engineering
Malware Analysis
Threat Intel
Talk
Open →
2025-03
34:37
What You Most Likely Did Not Know About Sudo - Peter Czanik
Peter Czanik
BSides Luxembourg
· 2019
Technical
Talk
Open →
2019-11
39:50
Navigating the Shadows: A Comprehensive Exploration of Popular and Malicious Tools on the Dark Web
Michael-Angelo Zummo
BSides Tampa
Technical
Demo
Talk
Open →
2024-06
47:02
Going into the Underground by Michael-Angelo Zummo from Cybersixgill
Michael-Angelo Zummo
BSides Tampa
· 2023
Talk
Open →
2023-10
49:15
Inside the Information Stealer Ecosystem: From Compromise to Countermeasure
Olivier Bilodeau
BSidesSF
· 2025
Technical
Advanced
Talk
Open →
2025-10
48:17
Did You Say Millions Of Sessions? How Cheap Kits Fuel AiTM Attacks On Microsoft 365
Joshua Rawles
BSides London
· 2025
Research
Technical
Detection Engineering
Threat Intel
Web AppSec
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2026-03
17:57
Counteracting Narcotics Narcoterrorism with OSINT
Schuyler Davis
BSides Albuquerque
Talk
Open →
2024-08
26:00
The Allure of Go's Cross-Platform Capability: A Gateway for Threats
Anmol Maurya
BSides NYC
· 2025
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
19:12
Raiders of the Lost Artifacts: Racing for Hidden Treasures in Public GitHub Repositories
Yaron Avital
BSides Las Vegas
· 2024
Technical
DevSecOps
Supply Chain Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2024-09
44:56
Hey CryptoBro!: How Are Criminals Laundering, Monetizing, and Targeting Cryptocurrency, NFTs, and Smart Contracts?
Sam Colaizzi
BSides Peru
· 2023
Research
Cryptography
Threat Intel
Talk
Open →
2023-08
26:00
The Triad Nexus Pig Butchering & Money Laundering Network: A Deep Dive - Kasey Best and Zach Edwards
Kasey Best
Zach Edwards
BSides Dublin
· 2025
Talk
Open →
2025-10
31:06
Before the Breach: How AI-Driven Information Operations Create the New Cyber Pre-Attack Surface
Ksenia Iliuk
BSides Seattle
· 2026
Technical
AI Security
Social Engineering
Threat Intel
Talk
Open →
2026-03
14:11
Hacktivism as a Service: The Cyber Mercenary Era
Zarin Hamid
BSides Philly
· 2025
Technical
War Stories
Social Engineering
Threat Intel
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2026-02