DefCamp Archives
SPEAKER |
PRESENTATION |
MEDIA RESOURCES & DOCS |
|||
---|---|---|---|---|---|
![]() | AI & Cybersecurity | AI & Cybersecurity Panel | WATCH VIDEO (EN) | ||
![]() | Alex-Laurențiu Leoreanu | Deepfake: Threat and Potential actions | WATCH VIDEO (EN) | ||
![]() | Alexander Benoit | The double-edged sword of AI in Cybersecurity Ransomware as a Service - are YOU prepared? | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
![]() | Ali Abdollahi | Dev Ally, Zero-Days Foe | SLIDES | WATCH VIDEO (EN) | |
![]() | Andrei Anton-Aanei | Echoes of Deception: Fake content, Ads, and promises | SLIDES | WATCH VIDEO (EN) | |
![]() | Andrei Costin | Hacking with Satellite, Aerospace, Avionics, Maritime, Drones: Crashing/Exploiting at the SDR speed | WATCH VIDEO (EN) | ||
![]() | Bordei Robert | War stories - Fighting ransomware operators | WATCH VIDEO (EN) | ||
![]() | David Lilja | War Stories From the SOC | WATCH VIDEO (EN) | ||
![]() | Denis Stepanov | When computers were big: z/OS penetration testing workflow | SLIDES | WATCH VIDEO (EN) | |
![]() | Eduard Agavriloae | Elevating Access: A Methodical Approach to Privilege Escalation in AWS | SLIDES | WATCH VIDEO (EN) | |
![]() | Eduard Muresan | CIAPO: Code Injection via Arbitrary Pointer Overwrite | SLIDES | WATCH VIDEO (EN) | |
![]() | Fabien Vauchelles | Cracking the Code: Decoding Anti-Bot Systems! | WATCH VIDEO (EN) | ||
![]() | Florin Popa | Orange Romania (main sponsor) - opening words | SLIDES | WATCH VIDEO (EN) | |
![]() | Gabriel-Dănuț Niculescu | NIS 2 Directive - Overview | SLIDES | WATCH VIDEO (EN) | |
![]() | Hasain Alshakarti | A Hacker just logged in... Tales from Incident Response: Unmasking the Threat Actor’s Inner Sanctum | WATCH VIDEO (EN) WATCH VIDEO (EN) | ||
![]() | Ioan Constantin | AI Driven Automated Security Orchestration in Heterogeneous 6G Networks | SLIDES | WATCH VIDEO (EN) | |
![]() | Jayson E. Street | S.E. with A.I. & Defending against it with H.I. | WATCH VIDEO (EN) | ||
![]() | Maksim Iavich | Is Post Quantum Standard “Kyber” Broken? | SLIDES | WATCH VIDEO (EN) | |
![]() | Marius-Daniel Stratila | Driving forward: Automotive Security in the Digital Era | SLIDES | WATCH VIDEO (EN) | |
![]() | Matei “Mal” Badanoiu | Log4JMX: The Vulnerability that Never Existed | SLIDES | WATCH VIDEO (EN) | |
![]() | Matei Josephs | Hacking At Scale: Strategies & Automation | SLIDES | WATCH VIDEO (EN) | |
![]() | Mihail-Iulian Pleșa | Saving the (post-quantum) world with neural networks | SLIDES | WATCH VIDEO (EN) | |
![]() | Oleg Senko | Stage 1 C2 in 3 Days | WATCH VIDEO (EN) | ||
![]() | Piotr Głaska | Very unusual case of C2 over DNS from certain firewalls | WATCH VIDEO (EN) | ||
![]() | Razvan Bocu | Blackbox Android Malware Detection Using Machine Learning and Evasion Attacks Techniques | SLIDES | WATCH VIDEO (EN) | |
![]() | Rico Komenda | Step-by-Step: Application Security Architecture | SLIDES | WATCH VIDEO (EN) | |
![]() | Simona David | Geolocation and its implications | SLIDES | WATCH VIDEO (EN) | |
![]() | Tudor Damian | Surviving Cyber Attacks: 2024 Edition | SLIDES | WATCH VIDEO (EN) |