Channel Avatar

BSidesMunich @[email protected]

724 subscribers - no pronouns :c

BSides is a computer security for the community by the commu


34:19
8 Bits Wisdom To Secure The Code Of Life - Desiree Sacher-Boldewin
29:21
Leaking Kakao: How I Found A 1-Click Exploit In Korea's Biggest Chat App - Dawin Schmidt
06:43
Welcome - BSides Munich Orga
30:51
Some Thoughts On Penetration Test Reports - Hans-Martin Muench
24:49
Kobold Letters And Other Mischief: How Emails Can Deceive You - Konstantin Weddige
07:59
Closing - BSides Munich Orga
29:01
Demystifying The First Few Minutes After Compromising A Container - Stuart McMurray
28:55
Beyond Manual: Enhancing And Scaling Security With Automation - Christian Bauer
28:36
/proc For Security Analysts:Unveiling Threats And Forensic Treasures - Stephan Berger & Asger Strunk
24:15
From Boot To Root: Identifying And Mitigating Security Issues In Bootloaders - Richard Weinberger
25:24
Becoming The Evil Maid: Hacking Android Disk Encryption For Fun And Profit - David Gstir
28:22
Real-Time Threat Intelligence With ML Feedback Loops - Tomer Doitshman
25:26
Building And Leading Advanced Red Teams - Bjoern Trappe
29:17
Empowering Pentesters: Strategies For Team Motivation, Purpose And Success - Bettina Haas
33:48
Demystifying Cloud Infrastructure Attacks - Alexander
29:37
Reverse Engineering And Control Flow Analysis With Intel Processor Trace - Hagen Paul Pfeifer
26:57
Practical Vulnerability Analysis For Development Teams - Michael Helwig and Alvaro Martinez
32:38
A Security Champion's Journey: Making Things A Bit More Secure Than Yesterday Every Day - Lisi Hocke
24:31
Ground Control To Major Threat: Hacking The Space Link Extension Protocol - Andrzej Olchawa
32:50
Z/OS For GenZ - Hack The Mainframe - Jonathan Prince
33:00
Let's Get Physical: Stories From Behind Your Company's Gate - Moritz Thomas and Firat Acar
30:12
Mystical Vulnerabilities: Exploring The Oddities In Cybersecurity - Massimo Morello
27:27
Cracking The Chaos Ransomware Family - Alexander
29:07
SOC Analyst’s Arsenal: Essential Tools, Tips & Tricks For Effective Investigations - Samuel Kavaler
32:02
Secure Containers: Do Reduction Strategies Fix Your Nightmares? - Michael Wager and Michael Helwig
24:09
Let Me Do It For You Automating OSINT And Recon - Paul Zenker
27:56
Honeypot Boo Boo: Better Breach Detection With Deception Inception - Justin Varner
27:22
(In)direct Syscalls: A Journey From High To Low - Daniel Feichter
29:04
SiERRA-Automating And Scaling Forensic Investigations At Siemens CERT - Demian Kellermann
20:20
What We’ve Learned From Exposing Atlassian On The Internet - Oleksandr Kazymyrov
27:26
Fuzzing USB With Raw Gadget by Andrey Konovalov
28:04
Security By Design - Ana Oprea
28:27
DevSecOps Culture - Ali Yazdani
28:09
My CI/CD Pipeline Contains All Security Tools Available! Now What...? - Jasmin Mair
29:29
Breaking The Ransomware Tool Set: When An Opsec Failure Became A Intel Goldmine - Nicklas Keijser
28:49
Exploring Discrepancies In CISO Job Advertisements: An Analysis - Leonhard Kurthen and Daniel Fall
28:49
Shielding Europe: DNS4EUs Pan-European Protective DNS Service - Andronikos Kyriakou and Tomas Vogel
29:33
Attacks On Automotive Diagnostics by Javier Vazquez and Ethan Briggs
28:24
The Current State Of Ransomware - Sebastian Gebhard
28:03
Bio-Lock The Future And Ethics Around DNA Cryptography - Tayla Sellschop
28:22
Rooting The Cradlepoint IBR600 And Other Stories - Sebastien Leger
25:49
Exploring IPFS Threats - Dr. Morton Swimmer
27:28
Christmas Hancitor Campaign - Artem Artemov
03:06
BSides Closing - BSides SYNners
06:00
BSides Intro - BSides SYNners
19:45
The Seven Sins. And Virtues. Of IT Security And How They Affect Our World - Mario Heiderich
21:37
How We Got Into A Unicorn’s Private Codebase - Ashikka Gupta and Arshit Jain
04:47
BSides Outro - BSides Munich Orga
29:50
MIME Is Broken - Steffen Ullrich
43:33
Adding DAST To CI/CD, Without Any Losing Friends - Tanya Janca
28:03
Advanced Bot Landscape - Yohann Sillam
28:01
Building An ICS Firing Range: Sharing Our Journey & Lessons Learned- Nico Leidecker & Moritz Thomas
26:42
Not Quite Water Under The Bridge: Review Of Cross-chain Bridge Hacks - Sebastian Banescu
22:48
Measuring Cyber Defense With The MITRE Framework - Marcus Osterloh
25:29
From A Simple Log To Sophisticated Crypter - Hido Cohen and Arnold Osipov
30:43
Building A Security Program For SaaS Product Development - Christian Bauer
19:45
Attacking The Malware With AI - Dimitris Prasakis
29:33
Hacking And Exploit Development For Bluetooth Low Energy (BLE) - Sarah Mader
11:32
BSides Intro - BSides Munich Orga
30:09
Keeping Electric Vehicles Secure: The Need For A CAN Security Framework - Sivaranjani Sankaralingam