Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring YARA
111
talks mention this tool across
47
BSides chapters.
Talks featuring YARA
20:40
Detection-as-code: Why it works and where to start
Kyle Bailey
BSidesSF
· 2022
Technical
DevSecOps
Talk
Open →
2022-07
37:09
Wędkarstwo Dla Myśliwych - Z Phishingiem Przygody Bezpiecznika
Adam Lange
BSides Warsaw
· 2018
Talk
Open →
2019-02
36:51
ThreatPursuit VM
Dan Kennedy
BSides Canberra
· 2020
Tooling
Malware Analysis
Threat Intel
Blue
Demo
Talk
Open →
2020-05
53:47
Oh, the Places Your Packets Will Go!
James Pope
BSides SLC
· 2025
Technical
Talk
Open →
2025-10
46:06
Podobieństwa i różnice, czyli analiza malware’u dla leniwych
Maciej Kotowicz
BSides Warsaw
· 2017
Technical
Talk
Open →
2017-10
32:07
Open Source Approach: The Next Best Thing in Cyber Incidence Management
Chris Ensey
BSides DC
· 2017
Talk
Open →
2017-10
13:24
MITRE D3FEND
James Gibbins
BSides London
· 2022
Technical
Detection Engineering
Threat Modeling
Intro
Blue
Talk
Open →
2022-01
41:33
Stop Writing Malware! The Blue Team Has Done It for You
Alberto Rodriguez
Erik Hunstad
BSides Augusta
· 2022
Technical
Advanced
Red
Talk
Open →
2022-10
59:06
Paul Melson - How To Write Good YARA Rules
Paul Melson
BSides Augusta
· 2022
Technical
Talk
Open →
2022-10
37:09
YARA Rule Writing 101
Aaron Riley
BSides KC
· 2021
Technical
Intro
Talk
Open →
2021-11
4:37:44
Day Two: Malware Reverse Engineering
Umair
Irshad
BSides Islamabad
· 2021
Technical
Advanced
Workshop
Open →
2021-02
43:42
Disinformation As A Service
Andy Gill
BSides London
· 2022
Talk
Open →
2022-02
28:13
An Open Source Malware Classifier and Dataset
Phil Roth
BSidesSF
· 2018
Research
Empirical Research
Technical Deep-dives
Talk
Open →
2018-04
34:04
Automating Threat Hunting on the Dark Web
Apurv Singh Gautam
BSides Philly
· 2020
Technical
OSINT
Threat Intel
Technical Deep-dives
Talk
Open →
2020-12
50:24
BSidesAugusta 2018 - Paul Melson - Hunting APTs and Script Kiddies with Beer Money
BSides Augusta
Open →
2018-11
43:04
How to fuzz?
Kamil Frankowicz
BSides Warsaw
· 2016
Technical
Vulnerability Research
Technical Deep-dives
Talk
Open →
2016-10
28:25
Beyond AV: Detection-Oriented File Analysis
Josh Liburdi
BSidesSF
· 2019
Technical
Talk
Open →
2019-03
14:55
Connecting the dots: A beginner's experience of threat actor tracking - Keith Short
Keith Short
BSides London
· 2018
Technical
Malware Analysis
Threat Intel
Intro
Blue
Talk
Open →
2018-06
26:34
Nice One, Dad: Dissecting A Rare Malware Used By Leviathan - Brian Bartholomew
Brian Bartholomew
BSides Belfast
· 2020
Technical
Talk
Open →
2020-01
51:24
Red Blue Purple AI
Jason Haddix
BSides Boulder
· 2024
Technical
AI Security
OSINT
Blue
Purple
Red
Keynote
Open →
2024-09
41:24
BSides Perth Day 1 (Part 2)
BSides Perth
· 2021
Technical
DFIR
Detection Engineering
Malware Analysis
Talk
Open →
2021-09
41:37
Getting Things Fixed: Security Wins and Fails
Scott Piper
BSides SLC
· 2025
War Stories
Cloud IAM
Vulnerability Research
Keynote
Open →
2025-06
35:20
Methods for Protecting AI Enabled Applications
Jim Miller
Bsides CT
· 2023
Technical
Talk
Open →
2023-10
40:56
BSMaaS 2020 - The Art of bypassing endpoint protections for red teaming engagements
BSides Munich
Open →
2020-09
47:43
Leveling Up Ghidra: Learn Ghidra Plugins with a Game Boy Game
Jacob Latonis
BSides Boulder
· 2024
Technical
Demo
Talk
Open →
2024-09
15:28
No Distribute Scanners:
Florian Murschetz
Mathieu Gaucheler
BSides Munich
· 2021
Research
Malware Analysis
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-06
59:25
Phoenix: The Open Source malware analysis appliance
Justin Borland
Greg Olmstead
BSides Augusta
· 2019
Technical
Tooling
Talk
Open →
2019-10
17:26
Pre requisites of Malware Reversing Workshop
BSides Islamabad 2020
Technical
Intro
Workshop
Open →
2020-11
20:44
YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detection
Austin Byers
BSides Las Vegas
· 2017
Technical
Malware Analysis
Tooling
Blue
Demo
Talk
Open →
2017-08
45:31
How To Attack A SIEM - Daniel Crossley
Daniel Crossley
BSides London
· 2025
Technical
Blue
Red
Talk
Open →
2025-02
21:45
Making It Rain: Cryptojacking Attacks In The Cloud
Chris Doman
BSides Bristol
· 2019
Technical
Talk
Open →
2019-07
30:56
Into the Vo1d: Hunting a Botnet Hidden in TV Boxes
André Tavares
BSides Lisbon
· 2025
Technical
IoT
Malware Analysis
Threat Intel
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
28:59
File Infectors Are (Not) Dead: What's Spreading And How To Detect It Using YARA - Ladislav Zezula
Ladislav Zezula
BSides Prague
· 2024
Technical
Malware
Intermediary
Blue
Talk
Open →
2024-04
33:21
Free hardware from the sky? An introduction to tracking weather balloons
Jordan Bush
BSides KC
· 2022
Technical
Demo
Talk
Open →
2022-10
23:31
BSidesSF 2022 - Rise of the Vermilion ... (Avigayil Mechtinger • Ryan Robinson)
Avigayil Mechtinger
Ryan Robinson
BSidesSF
· 2022
Research
Advanced
Blue
Case Studies and Incidents Analysis
Talk
Open →
2022-07
41:04
Supercharging Threat Research
Costin Raiu
BSides Belfast
· 2018
Research
Talk
Open →
2018-10
24:50
PG - The SOC Counter ATT&CK - Mathieu Saulnier
BSides Las Vegas
Open →
2019-10
30:42
Malware, Cats and Cryptography
Zhassulan Zhussupov
BSides Sofia
· 2024
Research
Technical
Cryptography
Malware Analysis
Reverse Engineering
Advanced
Red
Empirical Research
+2
Open →
2024-04
22:12
Viper Framework for Malware Analysis
Paul Melson
BSides Augusta
· 2015
Technical
Talk
Open →
2015-09
34:13
From Panic To Protocol: Digital Forensics & Incident Response
Rory Wagner
BSides Leeds
Technical
DFIR
Intro
Blue
Talk
Open →
2024-08
22:45
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Sam Mayers
Bobby
BSides PDX
· 2024
Research
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
27:34
Hunting Fileless Malware with Treesitter - David Mcdonald
David McDonald
BSides SATX
· 2024
Technical
Advanced
Technical Deep-dives
Talk
Open →
2024-06
36:27
GenAI attacks – 2025 Year In Review
Tillson Galloway
BSides Charleston
· 2025
Research
Technical
AI Security
GenAI Security
Malware Analysis
Social Engineering
Threat Intel
Intermediary
+3
Open →
2025-11
39:24
YAYA (Yet Another YARA Allocution)
John Laycock
Monty St John
BSides DC
· 2016
Technical
Intro
Talk
Open →
2016-11
49:09
Rastrea2r: Multi-Platform Threat Hunting and Incident Response
Sudheendra S Bhat
BSides PDX
· 2018
Technical
DFIR
Threat Intel
Talk
Open →
2019-02
43:29
BSidesCharm 2023 - Driving Your Own Vulnerability: How to Navigate the Road of BYOD Attacks
BSides Charm
Open →
2024-06
34:05
Malware Wars: DarkSide Strikes Back as BlackMatter
Lindsay Kaye
James Niven
BSides Charm
· 2022
Research
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-07
31:26
Manalyze: A Static Analyzer for PE Executables
Ivan Kwiatkowski
BSides Belfast
· 2017
Technical
Talk
Open →
2017-10
42:16
The Fellowship of the Ring0: Driver Risk Scoring for Vulnerability Detection
Dana Behling
BSides Charm
· 2024
Research
Technical
Detection Engineering
Malware Analysis
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2024-06
42:50
Where's Wally? Hands-On Thread Hunting In Elasticsearch Using EE-Outliers
Daan Raman
BSides Luxembourg
· 2019
Technical
Demo
Talk
Open →
2019-11
40:29
Detecting Log4J on a Global Scale Using Collaborative Security
Klaus Agnoletti
BSides Las Vegas
· 2022
Technical
Threat Intel
Vulnerability Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-09
47:02
Indicators of compromise may be compromising your Android investigations
Christopher Atha
BSides Charleston
· 2018
Technical
Talk
Open →
2018-11
25:29
From A Simple Log To Sophisticated Crypter - Hido Cohen and Arnold Osipov
Hido Cohen
Arnold Osipov
BSides Munich
· 2022
Research
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-05
40:24
Deductive Reasoning: File Analysis Techniques
John Laycock
Chris Rogers
BSides DC
· 2015
Technical
DFIR
Malware Analysis
Intro
Talk
Open →
2015-11
53:49
Using JA3. Asking for a friend?
Justin Warner
BSides DC
· 2019
Technical
Cryptography
Blue
Talk
Open →
2019-10
22:29
Lex Sleuther: A Novel Approach to Script Language Detection
Aaron James
BSidesSF
· 2025
Technical
Malware Analysis
Tooling
Technical Deep-dives
Talk
Open →
2025-06
1:04:28
Hashbrowns & BAGELS
Mike Schladt
Chris Boettcher
Andrew Plunkett
BSides Cincinnati
· 2017
Technical
Tooling
Detection Engineering
Malware Analysis
Threat Intel
Talk
Open →
2017-05
32:33
Basic Malware Analysis for Incident Responders by Jared Graff
Jared Graff
BSides Tampa
Technical
Intro
Talk
Open →
2024-05
19:34
Honeypots, I Shrunk The Data by Oscar Williamson
Oscar Williamson
BSides London
· 2023
Talk
Open →
2023-05
54:39
Yara For Hunting Malwares
Lakshya Dubey
Bsides CT
· 2020
Technical
Talk
Open →
2020-11
28:03
Threats Lurking Beneath the Subsurface: Understanding and Analyzing Threats to Windows Subsystem for Linux
Danny Adamitis
BSides Charm
· 2022
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2022-07
28:06
Buy & Build: Complementing Security Operations w/ In House Software Development
David Haynes
BSides DC
· 2018
Technical
Talk
Open →
2018-11
25:53
Fileless malware -Jim Van De Ryt
BSides Peru
Open →
2018-06
21:38
GT - Looking For the Perfect Signature: An Automatic YARA Rules Generation Algorithm in the AI-Era
BSides Las Vegas
Open →
2018-09
37:06
Julian Wayte - Resource Smart Detection with YARA and osquery
BSides Boston
Open →
2020-11
36:28
The Modern Defender's Toolbox: Low-Cost Solutions for High-End Defense
Wes Lambert
BSides Augusta
· 2025
Technical
Blue
Talk
Open →
2025-10
49:26
Sysmon or it Didn't Happen
Gerard Johansen
BSides Charm
· 2024
Technical
DFIR
Detection Engineering
Blue
Talk
Open →
2024-06
40:39
Wes Lambert - Endpoint Excavation: Digging Through Host Artifacts with Velociraptor
Wes Lambert
BSides Augusta
· 2021
Technical
Blue
Talk
Open →
2021-10
49:15
Inside the Information Stealer Ecosystem: From Compromise to Countermeasure
Olivier Bilodeau
BSidesSF
· 2025
Technical
Advanced
Talk
Open →
2025-10
43:54
Você sabe de onde veio sua IA?
Larissa Fabião da Fonseca
BSides São Paulo
· 2025
Technical
AI Security
Supply Chain Security
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-06
58:17
At the Mountains of Malware
Wes Widner
BSides Charlotte
· 2016
Technical
Demo
Talk
Open →
2016-05
38:42
Threat Hunting in Kubernetes
Mutaz Alsallal
BSides Budabest
· 2020
Technical
Talk
Open →
2021-01
33:54
EDR Evasion 101 in a Professional Hacker Red Team
André Lima
BSides Kristiansand 2026
Technical
Detection Engineering
Reverse Engineering
Advanced
Red
Talk
Open →
2026-02
45:28
Building The ATT&CK Pipeline For Linux - Tim Wadhwa-Brown
Tim Wadhwa-Brown
BSides London
· 2025
Research
Technical
Blue
Purple
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-02
46:43
Detecting and analyzing fileless malware
Christopher Williams
Evan Wagner
BSides Tampa
· 2021
Technical
Intermediary
Blue
Demo
Open →
2021-04
31:15
GT - Old Things Are New Again: Efficient Automatic Signature Generation for Malware Detection - Hyru
BSides Las Vegas
Open →
2019-10
30:57
Under the Hood of Ransomware.live: Building an Open-Source Ransomware Observatory
Julien Mousqueton
BSides Bournemouth
· 2025
Research
Technical
Malware Analysis
OSINT
Threat Intel
Intermediary
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2025-09
50:39
Tim Crothers - Investigating Macs at the Speed of Compromise
Tim Crothers
BSides Augusta
· 2019
Technical
Talk
Open →
2019-10
14:08
BSidesNYC 0x03 interview with Dmitry Bestuzhev
Dmitry Bestuzhev
Preeti Ravindra
BSides NYC
Community
Panel
Open →
2024-02
25:24
Brian Bell - Detection of malicious capabilities using YARA
BSides Augusta
Open →
2016-09
45:08
Operational Tech binaries and the tale of deductions
Rushikesh D. Nandedkar
BSides Delhi
· 2020
Research
Technical
Advanced
Talk
Open →
2020-11
51:54
Wes Lambert - Augmenting the (Security) Onion: Facilitating Enhanced Detection and Response
Wes Lambert
BSides Augusta
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2019-10
55:23
How We Reverse Engineered OSX/Pirrit, Got Legal Threats and Survived
Amit Serper
BSides Charm
· 2018
Technical
War Stories
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05
1:00:02
Hunting Threats like a Cybersecurity Ninjas
Roberto Martínez
BSides Colombia
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Talk
Open →
2025-04
50:38
BSides PDX 2023 - Following the metadata trail (Guilherme Venere)
Guilherme Venere
BSides PDX
· 2023
Technical
Blue
Talk
Open →
2023-10
37:41
Threat hunting .NET malware with YARA
Martin Pontiroli
BSides NYC
· 2018
Technical
Malware Analysis
Reverse Engineering
Threat Intel
Blue
Talk
Open →
2023-04
42:14
Came for the Ransomware, Stayed for the APT - John Dwyer
BSides Peru
Open →
2022-09
38:02
Taking ChatGPT Hunting by Nicholas Carroll
Nicholas Carroll
BSides Tampa
· 2026
Technical
AI Security
Detection Engineering
Threat Intel
Talk
Open →
2026-02
54:16
PurpleTeam 101 by Chris Peacock
Chris Peacock
BSides Tampa
· 2023
Purple
Talk
Open →
2023-09
28:09
Who said that Python was UNIX Best Friend Only?
Xavier Mertens
BSides Athens
Talk
Open →
2024-03
20:22
Sandbox gems for CTI rookies - Ertugrul Kara
BSides Bournemouth
Open →
2025-09
39:42
BSidesCharm 2025 - Inch By Inch: a Case Study in Maintaining & Scaling a Modern XDR Product
BSides Charm
Open →
2025-05
29:42
Egregor Awakens: Taking A Tour Of A Threat Actor’s New Digs by Lindsay Kaye
Lindsay Kaye
BSides Dublin
· 2021
Technical
Talk
Open →
2021-05
1:08:11
BSides Bucharest Online Meetup
BSides Bucharest
· 2022
Research
Technical
Detection Engineering
Malware Analysis
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-05
44:23
My Cyber Sense Is Tingling! Detection Engineering With Free Tools
Matthew Gracie
BSides SATX
· 2025
Technical
Talk
Open →
2025-09
27:08
The Ransomware Threat: Tracking the Digital Footprints
Kevin Bottomley
BSidesSF
· 2016
Technical
Detection Engineering
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2016-04
41:03
GT - ClusterF*ck - Actionable Intelligence from Machine Learning - David Dorsey & Mike Sconzo
BSides Las Vegas
Open →
2016-12
38:39
Detecting, Deobfuscating, and Preventing Obfuscated Script Execution with Tree‑sitter
David McDonald
BSides Las Vegas
· 2025
Technical
Detection Engineering
Malware Analysis
Blue
Talk
Open →
2025-12
43:03
Beyond Prevention: The Vital Importance of Data Protection in Cybersecurity
Derran Guinan
BSides Edmonton
· 2023
Technical
Talk
Open →
2023-11
37:20
Yeet the Leet with Osquery
Sebastiaan Provost
BSides Newcastle
· 2021
Technical
Detection Engineering
Malware Analysis
Threat Intel
Talk
Open →
2021-10
37:21
Russian Nesting Dolls: Turla's Compromise of Pakistani ISI Command & Control
Danny Adamitis
BSides Las Vegas
· 2025
Research
DFIR
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
57:03
Grinding Phishing into Detections
BSides Boulder
· 2022
Technical
Blue
Talk
Open →
2022-12
42:24
Intelligence-Driven Response to UNC5174 by Alessandra Rizzo
Alessandra Rizzo
BSides Edmonton
· 2025
Technical
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-10
52:09
Compromised KY: Analyzing Russian Ransomware Operations Through Leaked Chat Data
Will Baggett
BSides Cayman Islands
· 2024
Talk
Open →
2025-01
49:45
ChatGPT for Security Analysts
Greg Leah
BSides Calgary
Technical
Detection Engineering
Malware Analysis
Threat Intel
Talk
Open →
2024-03
55:30
Comparing Malicious Files
Robert Simmons
BSides Charm
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2021-05
15:38
Ransomware detection based on comparative hybridised analysis
Alida Øvermo Mortensen
BSides Kristiansand
· 2026
Research
Technical
Detection Engineering
Malware Analysis
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2026-02
26:30
SIGMA: One Rule to Find Them All
Rain Baker
BSides Las Vegas
· 2025
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2025-12
38:06
Evolution of Threat Intel & Modern APT Threat Landscape
Andrew Yeates
BSides Newcastle
· 2021
Technical
Malware Analysis
Reverse Engineering
Threat Intel
Demo
Talk
Open →
2021-10
26:58
Tracking the Adversaries in the Middle
Lex Crielaars
BSides Amsterdam
· 2025
Technical
Detection Engineering
Social Engineering
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2026-01
45:05
Hunting Threats as Security Ninja - Roberto Martinez
Roberto Martinez
BSides Fredericton
· 2024
Technical
Detection Engineering
Malware Analysis
Threat Intel
Talk
Open →
2024-11