Quick Overview: by Juho Jauhiainen An analysis of one case, together with an analysis of other similar campaigns identified that use malicious ... Five years. We celebrated them properly with the biggest by Evgeni Dyulgerov Key Topics of the lecture: The Security Risks of AI-Powered Systems. Adversarial AI and Model Exploitation ...
Bsides Sofia 2025 Weaponized Open - Detailed Overview & Context
by Juho Jauhiainen An analysis of one case, together with an analysis of other similar campaigns identified that use malicious ... Five years. We celebrated them properly with the biggest by Evgeni Dyulgerov Key Topics of the lecture: The Security Risks of AI-Powered Systems. Adversarial AI and Model Exploitation ... by The fusion of generative AI and cybersecurity is reshaping the landscape of modern warfare. This talk delves into the ... by Asen Molov Nowadays I can't see many people to talk about how can we start in this world? Cybersecurity is not a entry-level ... Introduction Welcome & Objectives of the Presentation Definition of Elicitation in Social Engineering Importance in Covert Access ...
Recording of Day 2 keynote and speakers. 00:00 Lina Dabit: Global Game, Global Target: Understanding and Defending against ... The AI Cyber War: Inside the AI Race Between Attackers and Hunters Mike Spicer Keynote @ BSidesCache In this lightning talk I explore OpenINTEL from a offensive perspective. Digging into the terabytes of data made available, ... Join Alex Salazar Cybersecurity Advisor from the Cybersecurity and Infrastructure Security Agency (CISA), as he talks about some ... One SOC, The Whole SOC, and Nothing But The SOC, So Help Me Carson Zimmerman I've been working in security ops for 20 ... Cyber threats don't respect borders—and neither should our defenses. In this powerful fireside chat, Chris Inglis, former U.S. ...