These are the speakers of Security Fest 2025. More will be added as we get closer to the conference.
From cyberpunk novels to blockbuster movies, hacker fiction has captivated audiences with tales of digital rebellion and clever exploits. But how much of it is realistic? Could those hacks work? In this Keynote, John Wilander explores the intersection...
In this talk, we'll dissect common anti-forensics strategies—like USN Journal deletion, shellbag clearing, timestamp manipulation, and disabling access time updates—and reveal how they are often executed ineffectively or misunderstood. We'll explore...
Find » Understand » Exploit » Mitigate. No Patches or Fixes: Last year I argued 1days (or ndays) is as close to 0-day as you can come without being the actual finder your self. Let me challenge that statement this year and take you one step closer to...
In the past couple of years exploiting Apple signed installer packages became a common theme, as the Apple package installer runs with very powerful entitlements, which allows an attacker to bypass certain parts of System Integrity Protection (SIP)....
In this talk, we explore how small local language models (SLMs) can be seamlessly integrated into your red teaming and penetration testing workflows to optimise and speed up the discovery, scanning, and exploitation phases as well as report writing....
Defending against threat actors demands actionable threat intelligence, but smaller organizations usually lack the dedicated teams and substantial budgets of large enterprises. Discover how you can create impactful and high-quality CTI without the...
In this presentation, we aim to showcase a module that bridges the gap between the past and the future of computing. Our focus is a fully functional cartridge designed for the Commodore 64, equipped with a Large Language Model (LLM) trained on custom...
Ransomware isn't going anywhere anytime soon, yet few is talking about what really happens from the inside. Here is the story from a primarily non-technical business that got hit last year and survived. What had we prepped, how did we prioritize,...
Traditional digital forensics and incident response (DFIR) techniques often fall short, struggling to keep up with the speed and scale required by modern environments. This talk explores the limitations of these traditional methods, examining why they...
In this talk we'll look beyond the basics of cracking and arm you with further attacks when you feel you're out of options. We'll look at multiple paths for cracking delimited passphrases and review when you'd want to use these attacks and why....
This presentation is a high-level but technical overview of the Cult Of The Dead Cow's latest effort, Veilid. First, some history of cDc, its members, and our efforts in the security and privacy space will be discussed. Second, we will review where we...
Vulnerabilities in commercial-grade SSL VPN devices have been all too common in the past few years. An internal research project aimed at comparing the security level of these devices identified that SonicWall devices tend to have fewer reported...
See all speakers at Security Fest