🇨🇭 Switzerland hosts one of Europe’s biggest CTFs!
🧠 700+ players, 30 challenges, 12h of hacking at #INSO25 in Lausanne.
We’re already counting down to 2026!
📸 Marine Garnier
#CTF #cybersecurity #ethicalhacking #Insomnihack
It's been a week since Insomni'hack hosted amazing talks this year! We heard from top minds in cybersecurity on threats and defense strategies. Huge thanks to our speakers and sponsors and stay tuned for recordings soon on www.insomnihack.ch! 🚀 #INSO25 #cybersecurity #EVENT

🚨📢 Insomni'hack 2025

🛡️💻 Approximately 600 participants engaged in the hacking competition, tackling 33 challenges.

Congratulations also to the academic winners:
🥇Polyflag
🥈@LosFuzzys
🥉@phreaks2600

🚀 See you next year for new adventures!

#INSO25 #cybersecurity

Slides of my talk "Malware analysis with R2AI": https://filestore.fortinet.com/fortiguard/research/r2ai.pdf

Demo of string obfuscation on Linux/RudeDevil: https://asciinema.org/a/708621

Download and contribute to r2ai: https://github.com/radareorg/r2ai @radareorg

#AI #radare2 #INSO25 #malware #linux

Opening doors from outside with Michael Rodger @1ns0mn1h4ck - matching signals with IR.

#inso25 #door #lock

The CTF is today! Here are a few reminders:

Don't forget:
- Swiss plug type J;
- Ethernet cable.

The competition starts at 18h00 and finishes at 5h00 on Saturday! Are you ready to grab some flags? 🚩

#INSO25 #Cybersecurity #EthicalHacking #Switzerland

Cool live demo on stage @1ns0mn1h4ck with Julia Zdunczyk on open RFID locks. Here a card with an ID that always works.

#inso25 #rfid

Into pwn2own automotive on a Pioneer IVE. Speakers explained they found a hidden menu, enabled debug options using Google image translate to understand Japanese;-)
Then got TX for UART, but RX had been intentionally removed. They put it back and the story continues.

#inso25 #pwn2own #hardware @1ns0mn1h4ck

Speaker says : There are still ~2000 apps using libs vulnerable to old vulnerabilities. So developers use old libs and don't update.

I'm not surprised. When you develop and it works, you don't change anything or you'll encounter issues with deprecated functions and it's a nightmare.
+ Malware only very rarely use vulnerabilities actually (because malware just work well with simpler techniques and don't need vulnerability to get their nasty tasks done)

#inso25 #android @1ns0mn1h4ck

In this example, the 2 forks of the zygote process share the same scudo secret and memory layout, which basically removes it's security enhancements. #inso25
Keynote by Mathias Payer at @1ns0mn1h4ck #android #scudo #zygote