DefCamp Archives
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
AI & Cybersecurity | AI & Cybersecurity Panel | WATCH VIDEO (EN) | |||
Alex-Laurențiu Leoreanu | Deepfake: Threat and Potential actions | WATCH VIDEO (EN) | |||
Alexander Benoit | The double-edged sword of AI in Cybersecurity Ransomware as a Service - are YOU prepared? | WATCH VIDEO (EN) WATCH VIDEO (EN) | |||
Ali Abdollahi | Dev Ally, Zero-Days Foe | SLIDES | WATCH VIDEO (EN) | ||
Andrei Anton-Aanei | Echoes of Deception: Fake content, Ads, and promises | SLIDES | WATCH VIDEO (EN) | ||
Andrei Costin | Hacking with Satellite, Aerospace, Avionics, Maritime, Drones: Crashing/Exploiting at the SDR speed | WATCH VIDEO (EN) | |||
Bordei Robert | War stories - Fighting ransomware operators | WATCH VIDEO (EN) | |||
David Lilja | War Stories From the SOC | WATCH VIDEO (EN) | |||
Denis Stepanov | When computers were big: z/OS penetration testing workflow | SLIDES | WATCH VIDEO (EN) | ||
Eduard Agavriloae | Elevating Access: A Methodical Approach to Privilege Escalation in AWS | SLIDES | WATCH VIDEO (EN) | ||
Eduard Muresan | CIAPO: Code Injection via Arbitrary Pointer Overwrite | SLIDES | WATCH VIDEO (EN) | ||
Fabien Vauchelles | Cracking the Code: Decoding Anti-Bot Systems! | WATCH VIDEO (EN) | |||
Florin Popa | Orange Romania (main sponsor) - opening words | SLIDES | WATCH VIDEO (EN) | ||
Gabriel-Dănuț Niculescu | NIS 2 Directive - Overview | SLIDES | WATCH VIDEO (EN) | ||
Hasain Alshakarti | A Hacker just logged in... Tales from Incident Response: Unmasking the Threat Actor’s Inner Sanctum | WATCH VIDEO (EN) WATCH VIDEO (EN) | |||
Ioan Constantin | AI Driven Automated Security Orchestration in Heterogeneous 6G Networks | SLIDES | WATCH VIDEO (EN) | ||
Jayson E. Street | S.E. with A.I. & Defending against it with H.I. | WATCH VIDEO (EN) | |||
Maksim Iavich | Is Post Quantum Standard “Kyber” Broken? | SLIDES | WATCH VIDEO (EN) | ||
Marius-Daniel Stratila | Driving forward: Automotive Security in the Digital Era | SLIDES | WATCH VIDEO (EN) | ||
Matei “Mal” Badanoiu | Log4JMX: The Vulnerability that Never Existed | SLIDES | WATCH VIDEO (EN) | ||
Matei Josephs | Hacking At Scale: Strategies & Automation | SLIDES | WATCH VIDEO (EN) | ||
Mihail-Iulian Pleșa | Saving the (post-quantum) world with neural networks | SLIDES | WATCH VIDEO (EN) | ||
Oleg Senko | Stage 1 C2 in 3 Days | WATCH VIDEO (EN) | |||
Piotr Głaska | Very unusual case of C2 over DNS from certain firewalls | WATCH VIDEO (EN) | |||
Razvan Bocu | Blackbox Android Malware Detection Using Machine Learning and Evasion Attacks Techniques | SLIDES | WATCH VIDEO (EN) | ||
Rico Komenda | Step-by-Step: Application Security Architecture | SLIDES | WATCH VIDEO (EN) | ||
Simona David | Geolocation and its implications | SLIDES | WATCH VIDEO (EN) | ||
Tudor Damian | Surviving Cyber Attacks: 2024 Edition | SLIDES | WATCH VIDEO (EN) |