BSidesLuxembourg

203 Followers
446 Following
378 Posts

Another talk announcement!

πŸŸ£πŸ€– π—šπ—’π—’π——π—•π—¬π—˜ 𝗣𝗨π—₯π—£π—Ÿπ—˜ π—§π—˜π—”π— , π—›π—˜π—Ÿπ—Ÿπ—’ 𝗣𝗨π—₯π—£π—Ÿπ—˜ 𝗕𝗒𝗧𝗦 - 𝗣𝗔𝗧π—₯π—œπ—–π—ž π— π—žπ—›π—”π—˜π—Ÿ & π—₯π—”π—Ÿπ—£π—› π—˜π—Ÿ π—žπ—›π—’π—¨π—₯𝗬 πŸ›‘οΈβš”οΈ

What if purple teaming could run itself? πŸš€ This talk reveals an AI driven framework that simulates real world attacks, uncovers detection gaps, and continuously strengthens your defenses with zero manual effort. It's more than automation. It is a smart, self evolving security cycle where offense and defense work together in real time to stay ahead of threats.

Patrick Mkhael https://pretalx.com/bsidesluxembourg-2026/speaker/WHMGFD/ is an Offensive Security R&D lead with a strong blue team foundation, now focused on red teaming, cloud pentesting, and building tools for adversary emulation and automated security testing.

Ralph El Khoury https://pretalx.com/bsidesluxembourg-2026/speaker/X9QCJN/ is a red teamer and CVE hunter with a passion for breaking AD and web apps. Teaches kids to question everything, starting with default credentials.

πŸ“… Conference dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg2026 #CyberSecurity #PurpleTeam #RedTeam #BlueTeam #AI

⚑⚑⚑ Lightning Talk Announcement! ⚑⚑⚑

πŸ“§πŸ’» π—¦π—–π—”π—Ÿπ—œπ—‘π—š π——π—˜π—™π—˜π—‘π—–π—˜ - π—™π—œπ—‘π——π—œπ—‘π—š π—₯π—˜π——π—©π——π—¦ 𝗙π—₯𝗒𝗠 𝗔 π—£π—›π—œπ—¦π—›π—œπ—‘π—š π—˜π— π—”π—œπ—Ÿ - π—˜π—Ÿπ—Ÿπ—œπ—’π—§ 𝗣𝗔π—₯𝗦𝗒𝗑𝗦 πŸ”πŸ”₯

A phishing email isn’t just a threat, it’s a starting point. In this 5-minute lightning talk, Elliot Parsons shows how to turn a single report into a chain of attacks, tracking attackers across domains, IPs, certificates, and links.

Elliot Parsons https://www.linkedin.com/in/elliot-parsons-4ba72140 is a cyber threat intelligence consultant at AmeXio. He is from New Zealand with a background in Financial Services, Technology Services and Government organisations. His expertise is in threat intelligence, threat hunting, reverse engineering, malware analysis, and incident response.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #Phishing #CyberDefense #ThreatIntelligence #OSINT #RedTeam

🧠Turn your team into threat hunters, one dice roll at a time πŸ’₯

🎲 π——π—¨π—‘π—šπ—˜π—’π—‘π—¦ & 𝗗π—₯π—”π—šπ—’π—‘π—¦: π—§π—›π—˜ π—¦π—˜π—–π—¨π—₯π—œπ—§π—¬ 𝗣𝗒π—ͺπ—˜π—₯ π—§π—’π—’π—Ÿ 𝗬𝗒𝗨 π——π—œπ——π—‘β€™π—§ π—žπ—‘π—’π—ͺ 𝗬𝗒𝗨 π—‘π—˜π—˜π——π—˜π—— - Klaus Agnoletti ( @klausagnoletti ) & Glen Sorensen πŸ›‘οΈ

Roleplaying isn’t just for nerds, it’s a proven method for building real security muscle. This talk reveals how structured tabletop roleplaying games unlock deeper learning, improve team cohesion, and turn abstract security concepts into lived experience. By simulating incident response, threat modeling, and zero-trust design through narrative-driven play, teams develop adaptive thinking, shared mental models, and faster decision-making under pressure.

Klaus Agnoletti https://www.linkedin.com/in/agnoletti/ is a freelance storytelling cyber security advisor, co-founder of BSides KΓΈbenhavn, neurodiversity advocate, and architect of playful security transformation through narrative and gamification.

Glen Sorensen https://pretalx.com/bsidesluxembourg-2026/speaker/J3PRCC/ is a Solutions Engineer at DeleteMe, former vCISO, and incident master for HackBack Gaming. 20+ years in security engineering, GRC, and operations. Passionate about OSINT, AI-powered social engineering, and using tabletop games to train real-world response.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #GamifiedSecurity #CyberTraining #IncidentResponse #RolePlaying #SecurityLeadership #InfosecEducation #PlayToLearn

Another talk for BSides Luxembourg!

πŸ’₯πŸ”₯ π—§π—›π—˜ π—ͺπ—›π—œπ—¦π—§π—Ÿπ—˜π—¦ π—šπ—’ π—ͺ𝗒𝗒 π—ͺ𝗒𝗒: π—¦π—œπ—˜π—  π—”π—Ÿπ—˜π—₯𝗧𝗦, 𝗧𝗛π—₯π—˜π—”π—§ π——π—˜π—§π—˜π—–π—§π—œπ—’π—‘ 𝗔𝗑𝗗 π—§π—¨π—‘π—œπ—‘π—š π—¨π—‘π—‘π—˜π—–π—˜π—¦π—¦π—”π—₯𝗬 π—‘π—’π—œπ—¦π—˜ - π— π—˜π—Ÿπ—œπ—‘π—” π—£π—›π—œπ—Ÿπ—Ÿπ—œπ—£π—¦ ( @tx_princess ) πŸ•΅οΈβ€β™€οΈβš”οΈ

Security teams don’t miss alerts because they’re careless, they miss them because their SIEM never stops yelling. This talk shows how poorly timed, constant, or context-free alerts become meaningless noise and how simple fixes like throttling, prioritization, and timing can turn a SIEM into a tool that actually gets noticed when it matters.

Melina Phillips https://www.linkedin.com/in/melinaphillips-cissp/ is an Offensive Security Engineer with over 10 years in IT and 6 years in cybersecurity, specializing in security operations, incident detection, adversary simulation, and endpoint compromise. She has presented at BSides Cambridge, Security Fest, BruCon, LeHack, HackLu, and BlackAlps.

πŸ“… Conference dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg2026 #CyberSecurity #OffensiveSecurity #ThreatDetection #LinuxSecurity #Infosec

BSides Luxembourg talk announcement!

🐧🚨 𝗑𝗒𝗧 𝗦𝗒 𝗛𝗔π—₯π— π—Ÿπ—˜π—¦π—¦: π—§π—›π—˜ π—›π—œπ——π——π—˜π—‘ π—ͺ𝗒π—₯π—Ÿπ—— 𝗒𝗙 π—Ÿπ—œπ—‘π—¨π—« π—£π—”π—–π—žπ—˜π—₯𝗦 𝗔𝗑𝗗 π——π—˜π—§π—˜π—–π—§π—œπ—’π—‘ π—–π—›π—”π—Ÿπ—Ÿπ—˜π—‘π—šπ—˜π—¦ - π— π—”π—¦π—¦π—œπ— π—’ π—•π—˜π—₯π—§π—’π—–π—–π—›π—œ πŸ›‘οΈπŸ”

Linux packers and loaders are a sneaky blind spot in cybersecurity. They hide code with encryption and obfuscation, then run it straight from memory to dodge detection. This talk dives into the β€œhARMless” ARM64 packer, showing off tricks like layered encryption and direct syscalls, while exposing a harsh truth: many defenses on Linux barely see it coming.

Massimo Bertocchi https://pretalx.com/bsidesluxembourg-2026/speaker/SU38N8/ Massimo Bertocchi is a ZΓΌrich-based Threat Hunter and Detection Engineer with dual Master’s degrees from KTH Royal Institute of Technology and Aalto University, recognized for his award-winning research uncovering covert C2 channels in Microsoft Teams that enable high-speed data exfiltration and expose critical gaps in enterprise security monitoring.

πŸ“… Conference dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
#BSidesLuxembourg2026 #CyberSecurity #ThreatHunting #MalwareAnalysis #CloudSecurity #DetectionEngineering

⚑⚑⚑ Lightning Talk Announcement! ⚑⚑⚑

✨ π— π—”π—šπ—œπ—–-π—₯𝗦: 𝗔 π— π—˜π— π—’π—₯𝗬-π—¦π—”π—™π—˜, π—Ÿπ—œπ—•π— π—”π—šπ—œπ—–-π—–π—’π— π—£π—”π—§π—œπ—•π—Ÿπ—˜ π—™π—œπ—Ÿπ—˜ π—§π—¬π—£π—˜ π——π—˜π—§π—˜π—–π—§π—œπ—’π—‘ π—˜π—–π—’π—¦π—¬π—¦π—§π—˜π—  - Quentin Jerome 🧩 (@qjerome)

File type detection just got a memory-safe upgrade β€” in Rust. In this talk, Quentin Jerome shows how Magic-rs brings libmagic’s power to modern, safe code β€” with Python bindings, a CLI tool called wiza, and real-world compatibility.

Quentin Jerome https://www.linkedin.com/in/quentin-jerome-00a8a074 is a Rust developer at CIRCL. Inspired by his background in incident response and threat detection, he builds open-source security tools to solve practical problems. His main interests include threat detection, bug hunting, and building tools that help the security community.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #Rust #FileDetection #MemorySafety #OpenSource #CyberSecurity

⚑⚑⚑ Lightning Talk! ⚑⚑⚑
πŸͺ¦πŸ”π—ͺ𝗛𝗔𝗧 π—œπ—¦ π—§π—›π—˜ 𝗗𝗔π—₯π—ž π—ͺπ—˜π—• π—§π—”π—Ÿπ—žπ—œπ—‘π—š 𝗔𝗕𝗒𝗨𝗧? - 𝗗𝗔π—₯π—ž 𝗝𝗔π—₯π—šπ—’π—‘ π——π—˜π—§π—˜π—–π—§π—œπ—’π—‘ 𝗔𝗑𝗗 π—œπ——π—˜π—‘π—§π—œπ—™π—œπ—–π—”π—§π—œπ—’π—‘ - Laura Bernardy πŸ”πŸ•΅οΈβ€β™‚οΈ
The dark web hides in code, and its language is built to confuse. In this talk, Laura Bernardy shows how NLP can decode the slang, jargon, and encrypted phrases used by cybercriminals

Laura Bernardy https://lu.linkedin.com/in/laura-bernardy-a95315177 is a PhD candidate at SnT Luxembourg, researching dark web content and cyber threat intelligence using natural language processing. She holds a master’s in computational linguistics and has worked on low-resource language NLP. Her work combines linguistics, cybersecurity, and AI to decode what’s being said and who’s saying it.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #DarkWeb #NLP #CyberThreatIntelligence #OSINT #Linguistics

⚑⚑⚑ Lightning Talk Announcement! ⚑⚑⚑

πŸ‘€ βš–οΈ 𝗛𝗒π—ͺ 𝗧𝗒 π—•π—˜ 𝗝𝗨𝗦𝗧 π—§π—›π—˜ π—₯π—œπ—šπ—›π—§ 𝗔𝗠𝗒𝗨𝗑𝗧 𝗒𝗙 𝗣𝗔π—₯π—”π—‘π—’π—œπ—— (π—–π—¬π—•π—˜π—₯π—¦π—˜π—–π—¨π—₯π—œπ—§π—¬ π—˜π——π—œπ—§π—œπ—’π—‘) - π——π—˜π—‘π—œπ—  π—Ÿπ—”π—§π—œΔ‡ 🧠😎

Are you too relaxed? Or too paranoid? In this talk, Denim shares how to find the sweet spot where awareness protects without paralyzing. Find a perspective to to measure your security mindset.

Denim Latić https://pretalx.com/bsidesluxembourg-2026/speaker/9GTVXC/ is a security analyst and part of the CSIRT for Fondation Restena, the NREN of Luxembourg. He is passionate about raising awareness on cybersecurity issues to both small and large audiences.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #CyberSecurity #Mindset #SecurityAwareness

Here is another announcement for BSides Luxembourg!

πŸ› οΈ π—₯π—œπ—’π—§ – 𝗔 π—₯π—”π—¦π—£π—•π—˜π—₯π—₯𝗬-π—•π—”π—¦π—˜π—— π—‘π—˜π—§π—ͺ𝗒π—₯π—ž π—œπ— π—£π—Ÿπ—”π—‘π—§ 𝗙𝗒π—₯ π—₯π—˜π—— π—§π—˜π—”π—  π—’π—£π—˜π—₯π—”π—§π—œπ—’π—‘π—¦ - π—’π—Ÿπ—œπ—©π—œπ—˜π—₯ 𝗠é𝗗𝗒𝗖 πŸ•πŸ₯§

A Raspberry Pi isn’t just a toy. In this talk, Olivier MΓ©doc shows how it became a stealthy, modular network implant used in real-world red team operations, turning physical access into long-term access, bypassing MFA, and quietly exfiltrating secrets, even when the victim is unaware.

Olivier MΓ©doc https://pretalx.com/bsidesluxembourg-2026/speaker/TGY8UJ/ is a member of the POST Cyberforce Offensive Security team. He has led offensive security missions across telecom, banking, payment systems, and ATMs. He specializes in vulnerability research, mobile and web app penetration testing, and red team operations. He also contributes to in-house security tooling and forensic investigations.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #RedTeam #RaspberryPi #NetworkImplant #AdversarySimulation #CyberSecurity

πŸ•΅οΈβ€β™‚οΈ Trust can break Anonymity βœ…πŸ”

🎯 π—£π—›π—œπ—‘π——π—œπ—‘π—š 𝗔 π—£π—›π—œπ—¦π—›π—˜π—₯: 𝗗𝗒𝗑’𝗧 π—Ÿπ—˜π—§ π—₯π—˜π—£ π—šπ—˜π—§ 𝗬𝗒𝗨 π—₯π—˜π—žπ—§ - π—˜π—Ÿπ—Ÿπ—œπ—’π—§ 𝗣𝗔π—₯𝗦𝗒𝗑𝗦 ✨πŸ”₯

The β€œas-a-service model” has become ubiquitous across the cybercrime ecosystem. Previously dominated by tight-knit, exclusive groups, cybercrime is now a distributed international marketplace of service providers and consumers. As a result, it is more resilient than ever, with the gaps left by law enforcement takedowns quickly filled by the next opportunistic teenager.

However, to operate effectively in this anonymous distributed economy, threat actors need to build a reputation to gain trust. Does this give us an opportunity?

In this presentation, Elliot Parsons discusses the importance of trust in the cybercrime ecosystem and walks through a real-world investigation involving a prominent phishing-as-a-service (PhaaS) provider. The case study illustrates that trust and OpSec do not mix, exposing threat actors to identification.

Elliot Parsons https://www.linkedin.com/in/elliot-parsons-4ba72140 is a cyber threat intelligence consultant at AmeXio. He is from New Zealand with a background in Financial Services, Technology Services and Government organisations. His expertise is in threat intelligence, threat hunting, reverse engineering, malware analysis, and incident response.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #Phishing #CyberCrime #OSINT #ThreatIntelligence #PhaaS #HackerLife