Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring VirusTotal
274
talks mention this tool across
74
BSides chapters.
Talks featuring VirusTotal
25:00
Bug Bounty Recon The Right Way
Khalil A. Lemtaffah
BSides Budabest
· 2022
Technical
OSINT
Web AppSec
Intermediary
Red
Talk
Open →
2023-06
37:31
Art of VirusTotal Hacking
Orwa
BSides Ahmedabad
· 2025
Technical
Web AppSec
Talk
Open →
2025-04
50:57
Kevin Breen - DarkComet From Defense To Offense - Identify your Attacker
Kevin Breen
BSides London
· 2015
Technical
Case Studies and Incidents Analysis
Talk
Open →
2015-07
37:53
Cruising Ocean Threat With TheHive, Cortex & MISP Without Sinking
Saâd Kadhi
BSides Lisbon
· 2018
Technical
Talk
Open →
2018-12
38:53
Bypassing malware analysis sandboxes is easy, let's discuss how they are doing it and why it works
Michael Gough
BSidesSF
· 2017
Technical
Talk
Open →
2017-03
27:37
PowerShell-Fu — Hunting on the Endpoint
Chris Gerritz
BSides Las Vegas
· 2016
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Technical Deep-dives
Talk
Open →
2016-08
32:41
Offensive Javascript Techniques for Red Teamers
Dylan Ayrey
Christian Frichot
BSidesSF
· 2019
Technical
Web AppSec
Red
Talk
Open →
2019-03
41:15
OSTrICa – Open Source Threat Intelligence Collector
Roberto Sponchioni
BSides London
· 2016
Technical
DFIR
Threat Intel
Tooling
Demo
Talk
Open →
2016-07
44:22
Diamond Model for Intrusion Analysis: What You Need to Know
Andy Pendergast
BSides DC
· 2014
Research
Blue
Methodology
Talk
Open →
2014-10
37:09
Wędkarstwo Dla Myśliwych - Z Phishingiem Przygody Bezpiecznika
Adam Lange
BSides Warsaw
· 2018
Talk
Open →
2019-02
36:51
ThreatPursuit VM
Dan Kennedy
BSides Canberra
· 2020
Tooling
Malware Analysis
Threat Intel
Blue
Demo
Talk
Open →
2020-05
24:56
BSidesMCR 2019: Offensive Development: How To DevOps Your Red Team - Dominic Chell
BSides Manchester
Open →
2019-09
36:58
Cracking The Perimeter: How Red Teams Penetrate
Dominic Chell
BSides Manchester
· 2018
Technical
Active Directory
Malware Analysis
Advanced
Red
Talk
Open →
2018-08
34:36
New Talk Who Dis? - Jamie Hankins
BSides Liverpool
Open →
2019-07
51:34
Let's Get Cooking with CyberChef
Marcelle Lee
BSides Charm
· 2022
Technical
DFIR
Malware Analysis
Threat Intel
Talk
Open →
2022-07
35:03
Offensive Anti-Analysis - Holly Williams
Holly Williams
BSides London
Technical
Talk
Open →
2016-07
3:19:17
Malware Reverse Engineering
Muhammad Irshad
Muhammad Umair
BSides Islamabad
· 2021
Technical
Malware Analysis
Reverse Engineering
Workshop
Open →
2021-02
29:09
Implementing a Kick-Butt Training Program: BLUE TEAM GO!
Ryan Chapman
BSidesSF
· 2019
Career
Blue
Talk
Open →
2019-03
29:48
Kevin Breen: RATs and IOC's - The Easy Way
Kevin Breen
BSides London
· 2014
Technical
DFIR
Malware Analysis
Threat Intel
Talk
Open →
2014-05
41:33
Stop Writing Malware! The Blue Team Has Done It for You
Alberto Rodriguez
Erik Hunstad
BSides Augusta
· 2022
Technical
Advanced
Red
Talk
Open →
2022-10
59:06
Paul Melson - How To Write Good YARA Rules
Paul Melson
BSides Augusta
· 2022
Technical
Talk
Open →
2022-10
15:16
Stalkerware In Mobile Devices - Jessica Amery
Jessica Amery
BSides London
· 2019
Technical
Talk
Open →
2019-10
41:04
Hunt Or Be Hunted
Alex Davies
BSides London
· 2017
Technical
Blue
Talk
Open →
2017-06
47:29
Easy Ways to Bypass Antivirus Systems
Craig Young
BSides London
· 2014
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2014-05
50:22
Security Onions and Honey Pots
Ethan Dodge
BSides SLC
· 2015
Technical
Talk
Open →
2015-04
4:37:44
Day Two: Malware Reverse Engineering
Umair
Irshad
BSides Islamabad
· 2021
Technical
Advanced
Workshop
Open →
2021-02
59:07
Malware Analysis 101: N00b to Ninja in 60 Minutes
BSides Las Vegas
· 2014
Technical
Malware Analysis
Intro
Talk
Open →
2016-12
56:19
Content Security Policy — Lessons Learned at Yahoo
Binu Ramakrishnan
BSides DC
· 2015
Technical
Web AppSec
Case Studies and Incidents Analysis
Talk
Open →
2015-11
42:09
Tokens & Takeovers: Cloud-Powered Supply Chain Attacks
Nitesh Surana
BSides Ahmedabad
· 2025
Technical
Supply Chain Security
Talk
Open →
2025-03
28:13
An Open Source Malware Classifier and Dataset
Phil Roth
BSidesSF
· 2018
Research
Empirical Research
Technical Deep-dives
Talk
Open →
2018-04
23:41
Paul Burbage - Illuminating Malware Adversaries with MalBeacon
Paul Burbage
BSides Augusta
· 2019
Technical
Talk
Open →
2019-10
29:22
Analyzing AutoIt Malware: Tools and Techniques
Chris Neal
Jerome Radcliffe
BSides Las Vegas
· 2021
Technical
Malware Analysis
Reverse Engineering
Intermediary
Blue
Talk
Open →
2021-08
47:49
Keynote - Jeff Banner
BSides Sydney
Open →
2019-09
51:33
Artsiom Holub |Deconstructing The Cyber Kill Chain of Angler Exploit Kit
BSides Orlando
Open →
2016-03
50:24
BSidesAugusta 2018 - Paul Melson - Hunting APTs and Script Kiddies with Beer Money
BSides Augusta
Open →
2018-11
30:02
Building a Predictive Pipeline to Rapidly Detect Phishing Domains
Wes Connell
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
55:07
Exposing the Neutrino EK: All the Naughty Bits
Ryan Chapman
BSides Las Vegas
· 2016
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2016-08
45:11
Boston BSides - Ryan Nolette - Protect Against CryptoLocker Ransomware
BSides Boston
Open →
2016-07
48:58
Bringing Red vs. Blue to Machine Learning
Bobby Filar
BSides DC
· 2018
Technical
Adversarial Machine Learning
Intermediary
Purple
Red
Technical Deep-dives
Talk
Open →
2018-11
28:25
Beyond AV: Detection-Oriented File Analysis
Josh Liburdi
BSidesSF
· 2019
Technical
Talk
Open →
2019-03
30:21
Labeling the VirusShare Corpus: Lessons Learned - John Seymour
BSides Las Vegas
Open →
2016-08
33:39
A year in the wild: fighting malware at the corporate level
Kuba Sendor
BSidesSF
· 2016
Technical
Blue
Talk
Open →
2016-04
14:55
Connecting the dots: A beginner's experience of threat actor tracking - Keith Short
Keith Short
BSides London
· 2018
Technical
Malware Analysis
Threat Intel
Intro
Blue
Talk
Open →
2018-06
43:19
GO Forth And Reverse
Tim Strazzere
BSides Las Vegas
· 2017
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2017-08
14:38
Visualising TLS Fingerprints With TMAP To Hunt Malicious Domains
Amanda Thomson
BSides London
· 2025
Technical
Cryptography
Talk
Open →
2025-02
53:00
Keynote: David Kennedy
David Kennedy
BSides Augusta
· 2018
Keynote
Open →
2018-10
52:16
Anonymize Me: A Technician's Guide to Hiding from the Internet
Ralph Collum
BSides Charleston
· 2016
Talk
Open →
2016-11
29:14
Alex Kirk - Incident response and threat hunting using Bro/Zeek data
Alex Kirk
BSides Augusta
· 2019
Technical
DFIR
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2019-10
32:29
Focus On Your Malware, Not Infrastructure! - Omri Segev Moyal
BSides Liverpool
Open →
2019-07
41:24
BSides Perth Day 1 (Part 2)
BSides Perth
· 2021
Technical
DFIR
Detection Engineering
Malware Analysis
Talk
Open →
2021-09
31:52
A Case Study of MacOS Supply Chain Compromise
Jason Craig
Michael George
BSidesSF
· 2018
Technical
Detection Engineering
Malware Analysis
Supply Chain Security
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-04
36:00
Attacking Authentication in Web Applications - Jake Miller
Jake Miller
BSides SATX
· 2018
Technical
Web AppSec
Red
Talk
Open →
2018-07
40:56
BSMaaS 2020 - The Art of bypassing endpoint protections for red teaming engagements
BSides Munich
Open →
2020-09
23:04
Security Automation Simplified
Moses Schwartz
BSidesSF
· 2019
Technical
DevSecOps
Intro
Talk
Open →
2019-03
46:34
MalwareViz: a free Malware Visualizer
Craig Field
BSides DC
· 2014
Tooling
Talk
Open →
2014-10
23:02
Rage Against the Regime: Attacking National Infrastructure in Iran by Sam Handelman and Israel Gubi
Sam Handelman
Israel Gubi
BSides TLV
· 2022
Technical
Advanced
Red
Talk
Open →
2022-07
50:00
Hunting PowerShell Attacks on The Open Internet
Paul Melson
BSides Augusta
· 2019
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2019-10
49:18
BSIDES Cape Town 2018 - Making Defence Sexy Again - Cailan Sacks
BSides Cape Town
Open →
2019-02
41:59
Threat Intelligence In Numbers - Nir Yosha
BSides Boston
Open →
2017-05
42:18
What Botnet Is This?
Tiago Pereira
BSides Lisbon
· 2015
Technical
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-07
39:37
Crack Me If You Can: Exposing Fault Lines in Digital Forensic Software Security
Bhargav Rathod
BSides Ahmedabad
· 2025
Technical
Talk
Open →
2025-05
43:28
2015 - Kuba Sendor - Squashing Rotten Apples Automated forensics & analysis for Mac OS X..
BSides Manchester
Open →
2015-09
55:26
Stories from the SOC – vol. 2016
Gaweł Mikołajczyk
Oskar Fusek
Takahiro Sugiyama
BSides Warsaw
· 2016
Talk
Open →
2016-10
3:40:07
Security BSides Warsaw 2025 ścieżka 1 dzień 2
BSides Warsaw 2025
Technical
Advanced
Red
Panel
Open →
2025-11
15:28
No Distribute Scanners:
Florian Murschetz
Mathieu Gaucheler
BSides Munich
· 2021
Research
Malware Analysis
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-06
21:24
Vincent Moscatello - Destover: Inside the Malware at Sony Entertainment
BSides Orlando
Open →
2015-11
46:44
BSIDES CPT 2019 - Natural Language Processing & Anomaly detection in Sys call logs - Christo Goosen
BSides Cape Town
Open →
2019-12
44:56
FileLess Malware Infections: Malware Tricks for Pentesters
Ramon Pinuaga
BSides Lisbon
· 2017
Technical
Malware Analysis
Reverse Engineering
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-11
20:44
YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detection
Austin Byers
BSides Las Vegas
· 2017
Technical
Malware Analysis
Tooling
Blue
Demo
Talk
Open →
2017-08
5:20:38
Bsides 2018 Track 2
BSides Vancouver
Open →
2018-03
29:57
BG - Writing Malware Without Writing Code - Gal Bitensky
BSides Las Vegas
Open →
2017-08
44:37
Malware Analysis for the Masses
Shawn Thomas
BSides Charm
· 2022
Technical
DFIR
Malware Analysis
Intro
Blue
Demo
Talk
Open →
2022-07
18:51
Fighting Email Phishing with a Custom Cloud IDS
Dan Borges
BSidesSF
· 2017
Technical
Blue
Talk
Open →
2017-03
13:17
Automated Dorking for Fun and Pr^wSalary - Filip Reesalu
BSides Las Vegas
Open →
2016-08
55:26
BSidesIA 2017 Keynote: Exploit Kits and Indicators of Compromise – Brad Duncan
BSides Iowa
Open →
2017-04
36:45
Testing Security Solutions with Atomic Red Team
Michael Haag
BSides Knoxville
· 2018
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2019-04
31:33
The Ticket To Adventure: A Security Analyst's Journey
B4nd1t0
BSides Basingstoke
Talk
Open →
2022-07
46:01
Drop It Like It's Qbot: Detecting Initial Execution Earlier with OSINT
Stef Rand
BSides Augusta
· 2023
Technical
Detection Engineering
Malware Analysis
OSINT
Threat Intel
Blue
Talk
Open →
2023-10
49:20
Whack A Phish
Geoffrey Chisnall
BSides Joburg
· 2025
Technical
Talk
Open →
2025-09
47:54
Network Reliability Monitoring for ICS – Going beyond NSM and SIEM
Jim Gilsinn
BSides DC
· 2015
Technical
Talk
Open →
2015-12
52:56
How to Get Started in Cybesecurity - john Stoner
BSides Peru
Open →
2019-07
30:29
ThreatCrowd And Other Things
Christopher Doman
BSides Belfast
· 2016
Talk
Open →
2017-09
56:56
What's the Big Deal with Assessing ICS/SCADA?
Jim Gilsinn
BSides DC
· 2016
Technical
Red
Talk
Open →
2016-11
30:51
Sergey Shykevich - What malware to use? – Cybercriminal’s perspective
Sergey Shykevich
BSides TLV
· 2021
Research
Talk
Open →
2021-08
24:37
Androzoo APK Search: A Search Service Of Meta-Data
Médéric Hurier
BSides Luxembourg
· 2018
Research
Talk
Open →
2018-10
57:23
2016 - Ian Trump - Basic Malware Analysis – dispelling Malware FUD
BSides Manchester
Open →
2016-09
30:56
Into the Vo1d: Hunting a Botnet Hidden in TV Boxes
André Tavares
BSides Lisbon
· 2025
Technical
IoT
Malware Analysis
Threat Intel
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
28:59
File Infectors Are (Not) Dead: What's Spreading And How To Detect It Using YARA - Ladislav Zezula
Ladislav Zezula
BSides Prague
· 2024
Technical
Malware
Intermediary
Blue
Talk
Open →
2024-04
50:37
Terry D . Smith II - Threat Hunting and Hacking Questions which Get Increasingly Harder
Terry D. Smith II
BSides Augusta
Technical
Blue
Talk
Open →
2023-10
27:01
Pwninstaller 1.0 Will Shroeder Security BSides Boston 2014
BSides Boston
Open →
2014-05
16:39
Regipy: Automating registry forensics with python
Martin G. Korman
BSides TLV
· 2020
Technical
Talk
Open →
2020-07
52:06
No Disassembly Required
Brian Satira
BSides Peru
· 2018
Technical
DFIR
Malware Analysis
Reverse Engineering
Blue
Talk
Open →
2018-06
34:02
An Adversarial View of SaaS Malware Sandboxes
Jason Trost
Aaron Shelmire
BSides DC
· 2015
Research
Technical Deep-dives
Talk
Open →
2015-11
58:25
Characteristics of Emotet Infections
Brad Duncan
BSides Augusta
· 2022
Technical
DFIR
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-10
18:31
Operation PZCHAO
Ivona-Alexandra Chili
BSidesSF
· 2019
Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2019-03
38:52
Ballin on a Budget
Andrew Morris
BSides Charleston
· 2014
Technical
Talk
Open →
2014-11
25:02
Serverless Osquery Backend and Big Data Exploration
Geller Bedoya
BSidesSF
· 2020
Technical
Talk
Open →
2020-03
29:29
Breaking The Ransomware Tool Set: When An Opsec Failure Became A Intel Goldmine
Nicklas Keijser
BSides Munich
· 2023
Technical
Talk
Open →
2023-10
25:56
How to take cookies from the Cookie Monster: Genesis Market Takedown
John Fokker
BSides TLV
· 2023
War Stories
DFIR
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2023-07
23:31
BSidesSF 2022 - Rise of the Vermilion ... (Avigayil Mechtinger • Ryan Robinson)
Avigayil Mechtinger
Ryan Robinson
BSidesSF
· 2022
Research
Advanced
Blue
Case Studies and Incidents Analysis
Talk
Open →
2022-07
27:07
Omri Misgav - Whitelist Me, Maybe? When Cyber Criminals Try A Daring Approach to Evade Detection
Omri Misgav
BSides TLV
· 2021
Technical
Supply Chain Security
Case Studies and Incidents Analysis
Talk
Open →
2021-08
38:59
Fully Automated Luxury Malware Detection
Camilla Montonen
BSides Oslo
· 2019
Technical
Talk
Open →
2019-06
28:28
An Evolving Era of Botnet Empires - Andrea Scarfo
BSides Las Vegas
Open →
2016-08
33:36
Keith Gilbert Security BSides Boston 2013 - Malformity
BSides Boston
Open →
2013-06
30:54
Internet dataset combinations for #ThreatHunting
Arian Evans
Steve Ginty
BSidesSF
· 2017
Technical
Advanced
Talk
Open →
2017-03
1:25:34
BSIDESLV 2018 - Ground Truth - Day One
BSides Las Vegas
Open →
2018-08
46:15
Hunting Phish Kits - Josh Rickard
Josh Rickard
BSides KC
· 2021
Technical
Talk
Open →
2021-11
20:40
Ransomware analysis by using Machine Learning Classifiers and FLARE VM
Bhupinder Kaur
BSides Calgary
· 2020
Technical
Talk
Open →
2020-12
29:07
SOC Analyst's Arsenal: Essential Tools, Tips & Tricks For Effective Investigations
Samuel Kavaler
BSides Munich
· 2023
Technical
DFIR
Detection Engineering
Tooling
Intermediary
Blue
Talk
Open →
2023-10
25:48
BSidesSF 2025 - Tracking the World's Dumbest Cyber Mercenaries (Cooper Quintin, Eva Galperin)
Cooper Quintin
Eva Galperin
BSidesSF
· 2025
Research
Case Studies and Incidents Analysis
Talk
Open →
2025-06
23:23
WHOIS Calling the 80s to Get Their Finger Back
Joakim Kennedy
BSidesSF
· 2019
Technical
Talk
Open →
2019-03
30:42
Malware, Cats and Cryptography
Zhassulan Zhussupov
BSides Sofia
· 2024
Research
Technical
Cryptography
Malware Analysis
Reverse Engineering
Advanced
Red
Empirical Research
+2
Open →
2024-04
33:55
Behavioral Analysis using DNS, Network Traffic and Logs
Josh Pyorre
BSides Amsterdam
· 2017
Technical
Blue
Talk
Open →
2017-09
22:45
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Sam Mayers
Bobby
BSides PDX
· 2024
Research
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
26:34
LAMBDA Malware: The Hidden Threat In Excel Spreadsheets by Yonatan Baum and Daniel Wolfman
Yonatan Baum
Daniel Wolfman
BSides Dublin
· 2023
Technical
Talk
Open →
2023-07
33:15
Twenty-Four (FIN)Seven
Kris McConkey
BSides Belfast
· 2018
Talk
Open →
2018-10
53:08
The History and Analysis of Stuxnet
Lilly Chalupowski
BSides Fredericton
· 2018
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-12
19:25
Paravirtualized Honeypot Deployment for the Analysis of Malicious Activity
Andronikos Kyriakou
BSides Athens
· 2018
Technical
Malware Analysis
Threat Intel
Blue
Talk
Open →
2018-08
53:27
Unparalleled Remote Desktop Monitoring: Revealing Attackers' Tradecraft
Olivier Bilodeau
Adrian Beron
BSides Augusta
· 2023
Research
DFIR
Malware Analysis
Network Security
Threat Intel
Blue
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2023-10
22:32
PG - Intel-Driven Adversary Simulation for A Holistic Approach to Cybersecurity
Carlos Gonçalves
BSides Las Vegas
· 2024
Technical
Threat Intel
Threat Modeling
Purple
Case Studies and Incidents Analysis
Talk
Open →
2024-09
48:23
Security Operations with Velociraptor
Eric Capuano
Whitney Champion
BSides Tampa
Technical
Talk
Open →
2023-09
37:36
Ransomware Emulation Done Right
Shreyas Rami
Shaun Jones
BSides Las Vegas
· 2022
Technical
Detection Engineering
Malware Analysis
Threat Intel
Purple
Case Studies and Incidents Analysis
Talk
Open →
2022-09
47:01
Effective DFIR Triage Techniques to Detect Modern Rootkits
BSides Dallas/Fort Worth
Open →
2022-11
36:27
GenAI attacks – 2025 Year In Review
Tillson Galloway
BSides Charleston
· 2025
Research
Technical
AI Security
GenAI Security
Malware Analysis
Social Engineering
Threat Intel
Intermediary
+3
Open →
2025-11
51:17
Uncloaking Cloak Ransomware
Jeff White
BSides Tampa
Research
Case Studies and Incidents Analysis
Talk
Open →
2025-07
44:46
Paul Melson - Automating Malware Analysis for Threat Intelligence
Paul Melson
BSides Augusta
· 2016
Technical
Talk
Open →
2016-09
39:24
YAYA (Yet Another YARA Allocution)
John Laycock
Monty St John
BSides DC
· 2016
Technical
Intro
Talk
Open →
2016-11
30:26
My First Phish: The SAIGA Saga
Justin Soyke
BSides Canberra
· 2025
Technical
Malware Analysis
OSINT
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
49:15
Threat Intelligence Strategies Against Malware
Pavan Karthick
Abhishek Mathew
BSides Mumbai
· 2024
Technical
Talk
Open →
2025-03
25:43
Atomic Stealer's Dyld Injection Tactics
Tonmoy Jitu
BSides Canberra
· 2025
Technical
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-11
41:17
BSidesAugusta 2014 Mike Reeves - Scaling Security Onion to the Enterprise
Mike Reeves
BSides Augusta
· 2014
Technical
Talk
Open →
2014-09
26:21
Patrick Colford - Scraping Pastebin for Obfuscated Malware - BSides Portland 2018
Patrick Colford
BSides PDX
· 2018
Technical
Demo
Talk
Open →
2019-02
41:45
I'm Cuckoo for Malware: Cuckoo Sandbox and Dynamic Malware Analysis
Lane Huff
BSides Philly
· 2017
Technical
Malware Analysis
Intro
Talk
Open →
2017-08
31:14
Stalking the Stalkers
Vangelis Stykas
Felipe Solferini
BSides Sofia
· 2023
Research
Technical
Malware Analysis
Privacy
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2023-03
47:24
CryptoLocker Ransomware Variants Are Lurking "In the Shadows"
Ryan Nolette
BSides Charlotte
· 2016
Technical
Talk
Open →
2016-05
30:20
Desvendando a Execução Remota de Código em PDFs: Uma Ameaça Oculta
Marcos Rodrigues de Carvalho
BSides São Paulo
· 2025
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2025-06
45:20
SocVel Live: Command The Breach
Jaco Swanepoel
BSides Joburg
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Workshop
Open →
2025-09
22:47
Behind the Scenes of a Tailor-Made Massive Phishing Campaign
Sarit Yerushalmi
Yohann Sillam
BSides TLV
· 2024
Technical
Malware Analysis
OSINT
Reverse Engineering
Social Engineering
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-08
41:56
Bringing IACD (Integrated Adaptive Cyber Defence) to Financial Institutions
Amar Paul
BSides DC
· 2019
Technical
Blue
Talk
Open →
2019-10
32:42
Web3 Warfare Exploring Unknown and Challenging Territories
BSides Colombia
Technical
Talk
Open →
2025-05
30:50
Mystery opening keynote - Eva Galperin
Eva Galperin
BSides TLV
· 2019
Keynote
Open →
2019-11
31:26
Manalyze: A Static Analyzer for PE Executables
Ivan Kwiatkowski
BSides Belfast
· 2017
Technical
Talk
Open →
2017-10
46:34
Save the Env (Variable): Hijacking Legit Apps w/ Minimal Footprint
Wietze Beukema
BSides NYC
· 2023
Technical
Malware Analysis
Reverse Engineering
Red
Technical Deep-dives
Talk
Open →
2023-06
42:16
The Fellowship of the Ring0: Driver Risk Scoring for Vulnerability Detection
Dana Behling
BSides Charm
· 2024
Research
Technical
Detection Engineering
Malware Analysis
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2024-06
32:16
Millions of BEACONs, Intrusions for Thee
John Wolfram
BSides Peru
· 2021
Research
Malware Analysis
Reverse Engineering
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-10
25:29
From A Simple Log To Sophisticated Crypter - Hido Cohen and Arnold Osipov
Hido Cohen
Arnold Osipov
BSides Munich
· 2022
Research
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-05
40:24
Deductive Reasoning: File Analysis Techniques
John Laycock
Chris Rogers
BSides DC
· 2015
Technical
DFIR
Malware Analysis
Intro
Talk
Open →
2015-11
32:49
In Search of a Silver Bullet: Malware Detection Strategies Past and Future
Dmitry Samosseiko
BSides Vancouver
· 2017
Technical
Detection Engineering
Malware Analysis
Blue
Talk
Open →
2017-05
54:36
IDS is dead, long live IDS
Eric Arnoth
BSides Delaware
· 2015
Talk
Open →
2015-11
30:30
Dynamic Analysis of Malware Using Runtime Opcodes
Domhnall Carlin
BSides Belfast
· 2016
Technical
Malware Analysis
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2017-09
26:23
CG - Google Apps Scripts Kill Chain - Maor Bin
BSides Las Vegas
Open →
2017-08
16:01
How Digital Forensics And A Batch Script Helped Me Understand The Infection Chain - Ataur Rahman
Ataur Rahman
BSides London
· 2025
Technical
DFIR
Malware Analysis
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2026-03
49:27
Cracking the Encrypted C&C Protocol of a New P2P Botnet
Kevin McNamee
BSidesSF
· 2012
Technical
Cryptography
Advanced
Talk
Open →
2017-11
43:55
Where and how to implement Security in Software Development
Radostina Kondakova
Jordan Popov
BSides Sofia
· 2022
Technical
DevSecOps
Threat Modeling
Web AppSec
Methodology
Talk
Open →
2022-04
35:46
Boston BSides - Breaking Out of the Silo - Julian Defronzo & Justin Pagano
BSides Boston
Open →
2016-07
20:53
Mean Blue Team: Fighting Phishing One Exploit at a Time
Alberto del Rio
BSides Berlin
· 2023
Technical
Social Engineering
Threat Intel
Web AppSec
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-01
31:19
Modern Adversary Tradecraft
Sajal Thomas
BSides Munich
· 2021
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2021-06
22:29
Lex Sleuther: A Novel Approach to Script Language Detection
Aaron James
BSidesSF
· 2025
Technical
Malware Analysis
Tooling
Technical Deep-dives
Talk
Open →
2025-06
28:27
Fir3Ey3 Mail Scanner
Xavier Mertens
BSides Athens
· 2016
Talk
Open →
2016-07
13:45
Invoke-NoShell - Gal Bitensky
Gal Bitensky
BSides TLV
· 2018
Talk
Open →
2018-07
19:03
Lessons learned in automating the incident Life Cycle
Alexander Sinno
Walter Stinkens
BSides Athens
· 2022
Technical
Demo
Talk
Open →
2022-06
30:24
BSides Sofia 2025: Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
Juho Jauhiainen
BSides Sofia
· 2025
Technical
Case Studies and Incidents Analysis
Talk
Open →
2025-04
40:47
Cloaked in Pixels: Concealing Payloads with Steganography
Ben Folland
BSides Exeter
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2024-09
54:39
Yara For Hunting Malwares
Lakshya Dubey
Bsides CT
· 2020
Technical
Talk
Open →
2020-11
20:42
WHOIS Your Daddy: Tracking Iranian-backed Cyber Operations with Passive DNS
Austin Northcutt
BSidesSF
· 2025
Technical
Malware Analysis
OSINT
Threat Intel
Talk
Open →
2025-10
28:03
Threats Lurking Beneath the Subsurface: Understanding and Analyzing Threats to Windows Subsystem for Linux
Danny Adamitis
BSides Charm
· 2022
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2022-07
50:25
Dear Blue Team: Proactive Steps to Supercharge your IR
Joe Gray
BSides KC
· 2018
Technical
Blue
Talk
Open →
2018-06
36:11
Automatizando coletas de CTI e potencializando com IA
Andrey
BSides São Paulo
Technical
AI Security
Threat Intel
Talk
Open →
2025-06
17:54
Bots Combine!: Behind the Modern Botnet
Andrea Scarfo
BSides Amsterdam
· 2017
Research
Empirical Research
Technical Deep-dives
Talk
Open →
2017-09
49:57
Tim Crothers - Infiltrating C2 Infrastructure
BSides Augusta
Open →
2015-09
28:20
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
Juho Jauhiainen
BSides Dublin
Technical
Talk
Open →
2025-10
32:58
Malware Analysis Of The Poor by Xavier Mertens
Xavier Mertens
BSides Dublin
· 2023
Technical
Talk
Open →
2023-07
36:28
The Modern Defender's Toolbox: Low-Cost Solutions for High-End Defense
Wes Lambert
BSides Augusta
· 2025
Technical
Blue
Talk
Open →
2025-10
39:10
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Sam Mayers
Bobby
BSides Dallas/Fort Worth
· 2024
Technical
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-01
42:02
GT - Behavioral Analysis from DNS and Network Traffic - Josh Pyorre
BSides Las Vegas
Open →
2017-08
33:07
Real-World Malware Campaign Tracking Using Big Data Analytics And ML Clustering - Daniel Johnston
Daniel Johnston
BSides Prague
· 2026
Technical
Talk
Open →
2025-04
49:26
Sysmon or it Didn't Happen
Gerard Johansen
BSides Charm
· 2024
Technical
DFIR
Detection Engineering
Blue
Talk
Open →
2024-06
51:53
GF - I got an alert, now what?
BSides Las Vegas
Open →
2022-09
47:41
BSidesIA 2017 Track1: Still Penetrating Your Perimeter – Josh Stroschein & Matt Miller
BSides Iowa
Open →
2017-04
23:52
AI in CyberSecurity: How to be a 10x Engineer
Sam Wallace
BSides KC
· 2023
Technical
AI Security
Tooling
Talk
Open →
2023-10
54:02
Using Microsoft's Incident Response Language
Chris Campbell
BSides Augusta
· 2014
Technical
Talk
Open →
2014-09
50:40
BSides Iowa 2018: "Malware Distribution Trends – April 2018"
BSides Iowa
Open →
2018-04
24:40
Advanced Techniques for Real-Time Detection of Polymorphic Malware
Ajit Thyagarajan
BSidesSF
· 2016
Technical
Advanced
Talk
Open →
2016-04
46:42
Lead with AI: Transforming Cybersecurity with Artificial Intelligence
Marcus J. Carey
BSides Tampa
· 2025
Technical
Talk
Open →
2025-07
30:23
Trawling for IOCs: Catching C2 in a Sea of Data
Moses Schwartz
BSidesSF
· 2025
Technical
Detection Engineering
Malware Analysis
Threat Intel
Intermediary
Talk
Open →
2025-10
48:17
Did You Say Millions Of Sessions? How Cheap Kits Fuel AiTM Attacks On Microsoft 365
Joshua Rawles
BSides London
· 2025
Research
Technical
Detection Engineering
Threat Intel
Web AppSec
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2026-03
53:29
Xenia Mountrouidou - Harnessing ML and AI for Next-Gen Security Engineering
Xenia Mountrouidou
BSides Augusta
· 2023
Technical
Technical Deep-dives
Demo
Open →
2023-10
33:29
Joe Gray - Dear Blue Team: Forensics Advice to Supercharge your DFIR Capabilities and Timing
BSides Knoxville
Open →
2019-06
48:47
Human Hunting
Sean Gillespie
BSidesSF
· 2015
Talk
Open →
2023-12
26:12
OH-SINT: Merging OSINT Into RE Workflows to Simplify Analysis
Nicholas Carroll
BSides Las Vegas
· 2023
Technical
Malware Analysis
OSINT
Reverse Engineering
Threat Intel
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-10
58:17
At the Mountains of Malware
Wes Widner
BSides Charlotte
· 2016
Technical
Demo
Talk
Open →
2016-05
23:10
Next Level SOC Automation You Never Thought Of
John Gillis
BSides SLC
· 2022
Technical
Talk
Open →
2023-01
52:03
Two Notify All
David Maynor
Danny Adamitis
BSides Augusta
· 2018
Research
Blue
Case Studies and Incidents Analysis
Talk
Open →
2018-11
35:21
Container Crisis 3: More Containers More Problems
Caprico
BSides Dallas/Fort Worth
· 2022
Technical
War Stories
Container Security
Malware Analysis
OSINT
Threat Intel
Blue
Red
+3
Open →
2022-11
1:12:01
BSides Knoxville 2018 (Second Track, KEC, afternoon sessions)
BSides Knoxville
· 2018
Technical
OSINT
Intermediary
Red
Talk
Open →
2018-05
17:47
Trouble with the Troubleshooter: A Primer on CVE-2022-30190
Grant Shanklin
BSides KC
· 2022
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-10
24:51
Unencrypted malware, the invisible threat
Alexander Nedelchev
BSides Sofia
· 2023
Technical
Talk
Open →
2023-03
25:23
Phishing Kit Finder
Qasim Khan
BSides Wellington
· 2017
Research
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-02
29:55
Cloaked in Pixels: Concealing Payloads with Steganography
Ben Folland
BSides Newcastle
· 2025
Technical
Malware Analysis
Reverse Engineering
Blue
Red
Demo
Talk
Open →
2025-01
53:09
Hacking GitHub Actions: Abusing GitHub and Azure for fun and profit
Magno Logan
BSides Buffalo
· 2023
Technical
Cloud IAM
DevSecOps
Supply Chain Security
Advanced
Red
Talk
Open →
2023-06
47:47
Hiding Malware in Docker Images for AWS Hardcore Persistence and Defense Evasion
Santiago Abastante
BSides Zagreb
Technical
Cloud IAM
Container Security
Malware Analysis
Advanced
Red
Talk
Open →
2025-03
45:26
GT - Sight beyond sight: Detecting phishing with computer vision - Daniel Grant
BSides Las Vegas
Open →
2018-09
37:53
Dynamic Malware Analysis for the Overworked Analyst
Edmund Brunaghin
BSides Belfast
· 2017
Technical
DFIR
Malware Analysis
Threat Intel
Intermediary
Blue
Talk
Open →
2017-10
30:22
Bypassing 2FA with Android RATs
Paul Burbage
BSides Asheville
· 2015
Technical
Malware Analysis
Mobile Security
Red
Technical Deep-dives
Talk
Open →
2018-06
50:39
Tim Crothers - Investigating Macs at the Speed of Compromise
Tim Crothers
BSides Augusta
· 2019
Technical
Talk
Open →
2019-10
23:04
Steganography and OT Cyber Campaigns
Jacob Benjamin
BSides Boise
· 2020
Technical
Red
Talk
Open →
2020-10
40:17
Cryptojacking Servers: The Intersection of poor patch management and ICO's - Chuck McAuley
Chuck McAuley
BSides SATX
· 2018
Technical
Talk
Open →
2018-07
36:27
Every Breath You Take: A CTI Review of Stalkerware
Xena Olsen
BSides Porto
· 2020
Research
Technical
Malware Analysis
Mobile Security
Threat Intel
Talk
Open →
2020-11
59:54
Comparing Malicious Files
Robert Simmons
BSides Delaware
· 2018
Talk
Open →
2018-11
38:28
Wes Widner - Lessons Learned from Analyzing Terabytes of Malware
Wes Widner
BSides Augusta
· 2015
Talk
Open →
2015-09
42:47
BSidesCharm 2022 - Log4j From The Trenches - Max Thauer
BSides Charm
Open →
2022-07
27:16
Unmasking The Unseen: Effortless Linux Malware Reversing With LLMs
Remco Sprooten
BSides Munich
· 2025
Research
Technical
AI Security
Malware Analysis
Reverse Engineering
Demo
Talk
Open →
2026-02
43:37
Leveraging Data Analytics to Tackle Everyday Security Tasks
Ramece Cave
BSides Oklahoma
· 2017
Technical
DFIR
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2017-04
37:20
Operation WordDrone: Cyber Threats in the Drone Industry
Ilia Dafchev
BSides Sofia
· 2025
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-04
44:24
BSides Iowa 2018: "Drug Dealing in IOC’s: a retrospective on threat intel & threat hunting..."
BSides Iowa
Open →
2018-04
56:30
Threat Hunting and the Surfacing of Mexican Threat Actor Greedy Sponge
Laura Stratton
Jacob Ferris
BSides CDMX
· 2025
Research
Technical
Malware Analysis
Threat Intel
Threat Modeling
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2025-07
55:23
How We Reverse Engineered OSX/Pirrit, Got Legal Threats and Survived
Amit Serper
BSides Charm
· 2018
Technical
War Stories
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05
1:00:02
Hunting Threats like a Cybersecurity Ninjas
Roberto Martínez
BSides Colombia
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Talk
Open →
2025-04
50:38
BSides PDX 2023 - Following the metadata trail (Guilherme Venere)
Guilherme Venere
BSides PDX
· 2023
Technical
Blue
Talk
Open →
2023-10
24:18
Unwitting Hosts: How Residential Proxies Increase Risk
Darin Smith
Blake
BSides PDX 2025
Technical
Detection Engineering
Network Security
Threat Intel
Blue
Empirical Research
Technical Deep-dives
Talk
Open →
2025-12
52:57
Mike Carlson: Becoming more intimate with Exploit Kits
Mike Carlson
BSides Calgary
· 2020
Technical
Talk
Open →
2020-12
35:55
MAGIC: Malware Analysis to Generate Important Capabilities
Sean Kilgallon
BSides Delaware
· 2018
Research
Technical
Malware Analysis
Empirical Research
Technical Deep-dives
Talk
Open →
2018-11
17:04
Danger? Look Here and Let Me Know
Sel Robertson
BSides Leeds
· 2024
Technical
DFIR
Malware Analysis
Social Engineering
Intermediary
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-08
48:38
Brad Duncan - Exploit Kits and Indicators of Compromise
Brad Duncan
BSides Augusta
· 2016
Technical
Talk
Open →
2016-09
27:28
Christmas Hancitor Campaign - Artem Artemov
Artem Artemov
BSides Munich
· 2021
Technical
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2023-10
42:12
Bringing IACD (Integrated Adaptive Cyber Defence) to the Financial Sector
Amar Paul
BSides DC
· 2019
Technical
Blue
Talk
Open →
2019-10
28:09
Who said that Python was UNIX Best Friend Only?
Xavier Mertens
BSides Athens
Talk
Open →
2024-03
41:56
Craig Williams - Ransomware Evolved
Craig Williams
BSides Belfast
· 2016
Technical
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2017-09
20:22
Sandbox gems for CTI rookies - Ertugrul Kara
BSides Bournemouth
Open →
2025-09
26:13
The Role of Data Visualization in Improving Machine Learning Models
Phil Roth
BSides Las Vegas
· 2017
Technical
Malware Analysis
Talk
Open →
2017-08
39:42
BSidesCharm 2025 - Inch By Inch: a Case Study in Maintaining & Scaling a Modern XDR Product
BSides Charm
Open →
2025-05
40:14
Building a Predictive Pipeline to Rapidly Detect Phishing Domains
Wes Connell
BSides Charm
· 2018
Technical
Talk
Open →
2021-05
55:22
Automation in the SOC - Everyone is ready, everyone can afford it
Nick McKerrall
BSides Calgary
Technical
Talk
Open →
2020-12
50:36
BSides Cincinnati 2017 - 1:00 PM - Joe Gray Caroline Stephens - Data Carvey
Joe Gray
Caroline Stephens
BSides Cincinnati
· 2017
Technical
Talk
Open →
2017-05
43:43
Building a Sawmill: Processing Logs with Security Onion
Matthew Gracie
BSides Peru
· 2024
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Demo
Talk
Open →
2024-08
27:08
The Ransomware Threat: Tracking the Digital Footprints
Kevin Bottomley
BSidesSF
· 2016
Technical
Detection Engineering
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2016-04
13:00
Creating the Torment Nexus: Using Machine Learning to Defeat Machine Learning
Noah Grosh
BSides Las Vegas
· 2025
Research
Technical
AI Security
Malware Analysis
Vulnerability Research
Technical Deep-dives
Talk
Open →
2025-12
37:53
An investigation into the state of web-based Crypto mining - Robert Len
BSides Cape Town
Open →
2023-09
46:50
Threat Hunting: Defining the Process While Circumventing Corporate Obstacles
BSides Philly
· 2018
Technical
Blue
Talk
Open →
2018-11
41:03
GT - ClusterF*ck - Actionable Intelligence from Machine Learning - David Dorsey & Mike Sconzo
BSides Las Vegas
Open →
2016-12
13:37
TikTok Under Attack
Guy Nachshon
BSidesROC
· 2023
Technical
Malware Analysis
Social Engineering
Supply Chain Security
Case Studies and Incidents Analysis
Talk
Open →
2024-09
51:27
First Contact with Container Security
Ell Marquez
BSides Dallas/Fort Worth
· 2021
Technical
Cloud IAM
Container Security
DevSecOps
Malware Analysis
Talk
Open →
2021-11
51:47
Who's Breaking into Your Garden? iOS & OS X Malware You May (Not) Know
Claud Xiao
BSidesSF
· 2016
Technical
Case Studies and Incidents Analysis
Talk
Open →
2016-04
19:45
Risk-Based Response With SOAR
Tom Wise
BSides Newcastle
· 2025
Technical
Detection Engineering
Talk
Open →
2024-01
40:19
Ransomware, Threat Actors, and the Shifting Enterprise Security Landscape
Marcelle Lee
BSidesROC
· 2024
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Keynote
Open →
2025-03
37:21
Russian Nesting Dolls: Turla's Compromise of Pakistani ISI Command & Control
Danny Adamitis
BSides Las Vegas
· 2025
Research
DFIR
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
25:03
Forensics: We're Not Just Byte-Sized
Ben Hodson
BSides Basingstoke
· 2025
Technical
Talk
Open →
2025-09
40:07
Amplifying Your XDR Experience by Leveraging Free API Services for Maximum Impact
Alexander Argeris
BSides St. John's
Technical
Detection Engineering
Threat Intel
Talk
Open →
2025-05
28:56
Discovery - What You Look Like To An Attacker
Daniel Lawson
BSides KC
· 2018
Technical
Red
Talk
Open →
2018-06
21:45
Copy, Paste, Compromise: The Danger of ClickFix Attacks
Dalton Ireland
BSides SATX
· 2025
Talk
Open →
2025-09
34:29
An Open Source Malware Classifier and Dataset
Phil Roth
BSides Charm
· 2018
Research
Technical
Malware Analysis
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2021-05
29:03
LLMs Suck at Cyber Intel—Unless You Hack Them Right
Inga Cherny
BSides TLV 2026
Technical
AI Security
OSINT
Threat Intel
Talk
Open →
2026-03
30:38
Bridging the gap among Cloud Engineers and Incident Responders with Open Source
BSides CDMX
Open →
2024-10
28:28
2019 - Memory Analysis is the Ground Truth - Itai Tevet
BSides Denver
Open →
2019-09
43:09
Stephen Hilt - From Guardian to Threat: The Double Life of Security Tools
BSides Knoxville
Open →
2025-07
42:24
Intelligence-Driven Response to UNC5174 by Alessandra Rizzo
Alessandra Rizzo
BSides Edmonton
· 2025
Technical
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-10
36:41
Lessons Learned from Building & Running MHN, a Crowd-sourced Honeynet
Jason Trost
BSidesSF
· 2015
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-12
24:34
Captain MassJacker Sparrow: Uncovering the Malware's Buried Treasure
Ari Novick
BSides TLV 2026
Technical
Cryptography
Malware Analysis
Reverse Engineering
Advanced
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2026-03
55:30
Comparing Malicious Files
Robert Simmons
BSides Charm
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2021-05
48:44
You Need a PROcess to Check Your Running Processes and Modules
Michael Goff
BSides Newcastle
· 2020
Technical
DFIR
Malware Analysis
Blue
Technical Deep-dives
Talk
Open →
2020-11
36:04
Automating Detection And Response With Tines - Cameron Higgs & Pat Meehan
Cameron Higgs
Pat Meehan
BSides Bristol
· 2025
Technical
Talk
Open →
2025-01
16:15
What the DLL is happening? A practical approach to identifying SOH.
BSides Dallas/Fort Worth
Open →
2020-11
32:29
Cleaning the Apple Orchard: Using Venator to Detect macOS Compromise
Richie Cyrus
BSides Charm
· 2019
Technical
DFIR
Malware Analysis
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+2
Open →
2021-05
14:20
GT - Advancing Internet Security Research with Big Data and Graph Databases - Andrew Hess
BSides Las Vegas
Open →
2016-12
46:37
Malware Persistence in Windows
Peter Morin
BSides Calgary
· 2022
Technical
Malware Analysis
Talk
Open →
2022-12
38:06
Evolution of Threat Intel & Modern APT Threat Landscape
Andrew Yeates
BSides Newcastle
· 2021
Technical
Malware Analysis
Reverse Engineering
Threat Intel
Demo
Talk
Open →
2021-10
47:41
BG - TAPIOCA (TAPIOCA Automated Processing for IOC Analysis) - Ryan Chapman & Moses Schwartz
BSides Las Vegas
Open →
2016-12
59:48
BSidesCharm - 2017 - SOC Panel Keynote
BSides Charm
· 2017
Community
Technical
Detection Engineering
Threat Intel
Blue
Panel
Open →
2021-05
45:53
Evolutions of AI, ML, DL To Prevent Cyber Attacks
Bien Nguyen
BSides Greenville
· 2020
Talk
Open →
2020-06
25:05
Rob Truesdell - How do you find the needle in the haystack? Burn all the hay!
BSides FloodCity
Open →
2019-05
40:52
It's Malware Time: A Bar Crawl from Skunked Homebrew to Rotten Apples
Erika Noerenberg
BSides Charm
· 2019
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05
41:40
Ivan Marchany: How to Build a Cyber Home Lab
Ivan Marchany
BSides St. Pete
· 2025
Career
Detection Engineering
Threat Intel
Vulnerability Research
Intro
Talk
Open →
2026-03
30:57
Streamlining Threat Hunting in Cloud Environments with Jupyter: Chi Phong Huynh and Kai Iyer
Chi Phong Huynh
Kai Iyer
BSides Edmonton
· 2024
Technical
Cloud IAM
Talk
Open →
2025-10
33:34
The Journey of Security Automation
Peter Luo
BSides St. Pete
· 2025
Technical
Detection Engineering
DevSecOps
Threat Intel
Demo
Talk
Open →
2026-03