DeepSec 2025 Talk: How To Breach: From Unconventional Initial Access Vectors To Modern Lateral Movement – Benjamin Floriani & Patrick Pongratz

The perpetual cat-and-mouse game between attackers and defenders has pushed offensive security o

https://blog.deepsec.net/deepsec-2025-talk-how-to-breach-from-unconventional-initial-access-vectors-to-modern-lateral-movement-benjamin-floriani-patrick-pongratz/

#Conference #DeepSec2025 #LowprofileAttackingTechniques #RedTeam #SVG #Talk #TTPs

DeepSec 2025 Talk: How To Breach: From Unconventional Initial Access Vectors To Modern Lateral Movement - Benjamin Floriani & Patrick Pongratz

The perpetual cat-and-mouse game between attackers and defenders has pushed offensive security operators to innovate. While enterprise security teams have become adept at identifying and blocking malicious Office documents, suspicious executables, and known phishing URLs, a significant blind spot often remains: the gray area of “benign” file formats that are implicitly trusted by both users and security tools. This talk will arm attendees with the knowledge to identify and leverage these blind spots in red team engagements. We will begin by exploring the strategic shift from noisy, high-volume attacks to stealthy, low-profile techniques designed to circumvent modern EDR, email gateways, and web proxies. We’ll discuss why certain file types and delivery mechanisms succeed where others fail, focusing on the technical elements that make them effective. This includes exploiting the browser’s rendering engine and abusingRead More

DeepSec In-Depth Security Conference

DeepSec 2025 Talk: GitHub Security at Scale: One Opensource Tool to Rule Them All – Sina Yazdanmehr & Hugo Baccino

Managing GitHub security across all organizations and repositories within a company can be challenging. Mis-configured settings, hard-coded secrets, and outdated d

https://blog.deepsec.net/deepsec-2025-talk-github-security-at-scale-one-opensource-tool-to-rule-them-all-sina-yazdanmehr-hugo-baccino/

#Conference #DeepSec2025 #GitHub #GitHubSecurity #OpensourceTool #Talk

DeepSec 2025 Talk: GitHub Security at Scale: One Opensource Tool to Rule Them All - Sina Yazdanmehr & Hugo Baccino

Managing GitHub security across all organizations and repositories within a company can be challenging. Mis-configured settings, hard-coded secrets, and outdated dependencies often go unnoticed, creating critical security gaps. In this session, we introduce an open source tool built to help companies secure their GitHub environments at scale. The tool runs security posture checks across organization and repository levels, scans for hard-coded secrets, performs Software Composition Analysis (SCA), validates security rule sets, detects misconfigurations, and generates a single comprehensive report. The report not only identifies risks but also provides actionable remediation steps, helping teams prioritize and address issues effectively. By using this tool, companies gain a complete view of their GitHub security posture across all organizations and repositories, making it easier to maintain strong security without adding complexity. This talk is also an open invitationRead More

DeepSec In-Depth Security Conference

DeepSec 2025 Talk: Offensive SIEM: When the Blue Team Switches Perspective – Erkan Ekici & Shanti Lindström

Traditional SIEM solutions focus on detecting attacks—but what if we flipped the script? Instead of waiting for adversaries to act, defenders can use SIEM proactively to

https://blog.deepsec.net/deepsec-2025-talk-offensive-siem-when-the-blue-team-switches-perspective-erkan-ekici-shanti-lindstrom/

#Conference #DeepSec2025 #misconfigurations #PrivilegeEscalation #SIEM #Talk

DeepSec 2025 Talk: Offensive SIEM: When the Blue Team Switches Perspective - Erkan Ekici & Shanti Lindström

Traditional SIEM solutions focus on detecting attacks—but what if we flipped the script? Instead of waiting for adversaries to act, defenders can use SIEM proactively to identify local privilege escalation risks before they’re exploited. By analyzing Sysmon and Windows event logs, blue teams can uncover hidden misconfigurations in services, scheduled tasks, DLL loads, and centralized application deployments that could allow an attacker to escalate privileges to SYSTEM. Sometimes, this approach might even reveal new CVEs lurking in your environment. This talk will showcase practical techniques for leveraging SIEM as an offensive discovery tool, helping defenders think like attackers to strengthen security from within. We asked Erkan and Shanti a few more questions about their talk. Please tell us the top 5 facts about your talk. SIEM is usually reactive. It can be used proactivelyRead More

DeepSec In-Depth Security Conference

DeepSec 2025 Talk: Hunting Shadows: Using Threat Intelligence to Outpace Adversaries – Sanjay Kumar

Cybersecurity isn’t just about firewalls and patches — it’s about understanding your adversary. Threat intelligence provides the insights

https://blog.deepsec.net/deepsec-2025-talk-hunting-shadows-using-threat-intelligence-to-outpace-adversaries-sanjay-kumar/

#Conference #AdversaryEmulation #DeepSec2025 #MITREATTCK #Talk #ThreatIntelligence #ThreatScoring #UnderstandingAdversaries

DeepSec 2025 Talk: Hunting Shadows: Using Threat Intelligence to Outpace Adversaries - Sanjay Kumar

Cybersecurity isn’t just about firewalls and patches — it’s about understanding your adversary. Threat intelligence provides the insights we need to decode tactics, anticipate attacks, and strengthen our defenses. In my talk, I’ll share how intelligence can: – Reveal who your adversary is and what drives them – Turn small indicators into early warnings of larger campaigns – ️Shape stronger, proactive defensive strategies – Bridge the gap between technical action and business risk Because in today’s threat landscape, the strongest defense begins with intelligence. We asked Sanjay a few more questions about his talk. Please tell us the top 5 facts about your talk. The talk demonstrates how understanding adversaries, their motives, methods, and mindset — is central to modern defense. It introduces a structured framework for identifying, profiling, and scoring threat actors targetingRead More

DeepSec In-Depth Security Conference

DeepSec 2025 Talk: Lessons learned from preparedness exercises with 3500 companies – Erlend Andreas Gjære

Preparedness exercises, whether they are traditional tabletop discussions or more interactive gamified experiences, help us become more

https://blog.deepsec.net/deepsec-2025-talk-lessons-learned-from-preparedness-exercises-with-3500-companies-erlend-andreas-gjaere/

#Conference #CrisisPlan #CyberExercises #DeepSec2025 #IncidentResponse #PreparednessExercises #resilience #Talk

DeepSec 2025 Talk: Lessons learned from preparedness exercises with 3500 companies - Erlend Andreas Gjære

Preparedness exercises, whether they are traditional tabletop discussions or more interactive gamified experiences, help us become more prepared – and to do this together, with engagement between individuals who need to perform optimally as a group, under pressure. Based on the speaker’s experiences from preparing and facilitating more than one hundred cyber exercises, including both individual companies and events with multiple companies participating together, this talk will illustrate both which risks and vulnerabilities happen to manifest themselves during incidents (and exercises), and how companies and stakeholders with various roles and levels of experience respond to these. We asked Erlend a few more questions about his talk. Please tell us the top 5 facts about your talk. 5000 companies participated across 85 free cyber preparedness exercise events in the Nordics since last year. 48% ofRead More

DeepSec In-Depth Security Conference

DeepSec 2025 Training: Fundamentals of Covert Entry: Intensive Training – Babak Javadi, Jiri Vanek, Chris Cowling

Step into the world of covert entry with **Fundamentals of Covert Entry**, a 2-day hands-on training designed to

https://blog.deepsec.net/deepsec-2025-training-fundamentals-of-covert-entry-intensive-training-babak-javadi-jiri-vanek-chris-cowling/

#Conference #DeepSec2025 #ElectronicAccessControlSystems #MechanicalAccessControlSystems #PhysicalSecuritySystems #Training

DeepSec 2025 Training: Fundamentals of Covert Entry: Intensive Training - Babak Javadi, Jiri Vanek, Chris Cowling

Step into the world of covert entry with **Fundamentals of Covert Entry**, a 2-day hands-on training designed to instill penetration testers, red team operators, and security professionals with the foundational skills required for bypassing physical security systems. Designed and taught by industry-leading Red Team Alliance instructors, this course provides an engaging, technical, and accessible overview of key techniques, tools, and strategies for understanding and exploiting mechanical and electronic access control systems. Mechanical Lock Systems – The Foundations of Entry Delve into the mechanics of locks to understand critical design elements, uncover overlooked weaknesses, and exploit how they can be defeated. Understand lock components, popular European mechanisms, door assessment, and common vulnerabilities. Get hands-on with techniques for Picking, disassembly, decoding, bumping, bypassing, impressioning, master-key privilege escalation, and photographic tele-duplication. Analyze real-world mechanical lock systems toRead More

DeepSec In-Depth Security Conference

DeepSec 2025 Talk: Ransomware vs. Info Stealers: A Comparative Analysis – Steph Shample

This talk provides a clear and practical comparison between two dominant forms of malware: ransomware and information stealers. While both are used by threat actors to profit from compromised system

https://blog.deepsec.net/deepsec-2025-talk-ransomware-vs-info-stealers-a-comparative-analysis-steph-shample/

#Conference #CyberThreatIntelligence #DeepSec2025 #InformationStealers #Ransomware #Talk

DeepSec 2025 Talk: Ransomware vs. Info Stealers: A Comparative Analysis - Steph Shample

This talk provides a clear and practical comparison between two dominant forms of malware: ransomware and information stealers. While both are used by threat actors to profit from compromised systems, their methods, visibility, and impact differ dramatically. We’ll start by defining each threat type and examining their primary objectives — ransomware aims for immediate financial gain through extortion, while info stealers quietly extract credentials, financial data, and other sensitive information for resale or future attacks. Worth noting is that Info stealers can and are often used as a precursor for a ransomware attack, connecting these two forms of malware in malicious operations. We’ll start by defining each threat type and examining their primary objectives — ransomware aims for immediate financial gain through extortion, while info stealers quietly extract credentials, financial data, and other sensitiveRead More

DeepSec In-Depth Security Conference

DeepSec 2025 Talk: Hacking Furbo: A Pet Project – Julian B., Calvin S.

Embarking on our first hardware hacking project, we came across the `Furbo` treat dispensing smart-camera for pets. This device had previous security research completed; however, years had passed without further analysis. With a few devices in tow, we pulled them

https://blog.deepsec.net/deepsec-2025-talk-hacking-furbo-a-pet-project-julian-b-calvin-s/

#Conference #DeepSec2025 #Furbo #HardwareHacking #IoT #Talk

DeepSec 2025 Talk: Hacking Furbo: A Pet Project - Julian B., Calvin S.

At DeepSec 2025 the Furbo pet camera will be deconstructed and hacked in order to analyse the threats to IT security on these devices.

DeepSec In-Depth Security Conference

DeepSec 2025 Talk: Quantum Safe Cryptography: The Future of Cyber(un)security – Lukas Mairhofer

There is a cybersecurity threat looming that will change everything. Conveniently enough, it can be ignored until it is way too lat

https://blog.deepsec.net/deepsec-2025-talk-quantum-safe-cryptography-the-future-of-cyberunsecurity-lukas-mairhofer/

#Conference #CryptographicallyRelevantQuantumComputers #DeepSec2025 #PostquantumCryptography #QuantumComputers #QuantumKeyDistribution #Talk

DeepSec 2025 Talk: Quantum Safe Cryptography: The Future of Cyber(un)security - Lukas Mairhofer

This presentation at DeepSec 2025 will give you an insight into a possible future where quantum computers attack existing cryptography.

DeepSec In-Depth Security Conference

DeepSec 2025 Talk: The Anatomy of DragonRank: Understanding and Defending Against SEO-Driven IIS Compromises – Joey Chen

DragonRank, a sophisticated threat actor, primarily targets countries in Asia and a select few in Europe

https://blog.deepsec.net/deepsec-2025-talk-the-anatomy-of-dragonrank-understanding-and-defending-against-seo-driven-iis-compromises-joey-chen/

#Conference #AdvancedAttackTechniques #BadIISMalware #BadIISPlugX #DeepSec2025 #DragonRank #Talk #WindowsIISServers

DeepSec 2025 Talk: The Anatomy of DragonRank: Understanding and Defending Against SEO-Driven IIS Compromises - Joey Chen

DeepSec 2025 features a presentation about the DragonRank threat actor and its attacks on targets in Asia and Europe.

DeepSec In-Depth Security Conference