BSidesLuxembourg

219 Followers
469 Following
423 Posts

๐ŸŽฏ Time for Another Confirmed BSides Luxembourg 2026 Session

๐—ฆ๐—ง๐—”๐—ฅ๐—ง๐—จ๐—ฃ ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฌ: ๐—”๐—š๐—˜๐—— ๐—Ÿ๐—œ๐—ž๐—˜ ๐—ช๐—œ๐—ก๐—˜ ๐—ข๐—ฅ ๐— ๐—œ๐—Ÿ๐—ž? โ€“ Guillaume Ross ( @g )
Talk (40 minutes)

Look back in this 40-minute talk at what it really means to build security from day oneโ€”and what happens years later when those decisions are put to the test. Drawing from real-world experience in a fintech startup, this session breaks down which security choices stood the test of time and which ones didnโ€™t survive evolving threats, technologies, and business realities.

By comparing 2020 decisions with a 2026 perspective, the talk highlights critical areas like architecture, identity, supply chain security, and โ€œeverything as code.โ€ Attendees will gain practical insights into making smarter long-term security decisionsโ€”whether building from scratch or modernizing existing systems.

Guillaume Ross( @g )is a seasoned blue team security expert with experience across both startups and large organizations, including leadership roles at JupiterOne, FleetDM, and Finaptic. He focuses on practical, data-driven security approaches that move beyond outdated best practices.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

๐Ÿ“ฒ Want to navigate the event easily? Check out the full schedule on Hacker Tracker:
https://hackertracker.app/schedule?conf=BSIDESLUX2026

#BSidesLuxembourg2026 #CyberSecurity #AppSec #StartupSecurity #BlueTeam #CloudSecurity

๐Ÿง  Another Deep Dive into AI Security at BSides Luxembourg 2026

โ€œExploiting the Past: How Linguistic Redundancy Weaponizes the Quantum Search Landscapeโ€ โ€“ Alessio Di Santo & Gabriella Lanziani
Talk (40 minutes)

Step into a 40-minute talk where cryptanalysis meets quantum computing, uncovering how linguistic patterns from Renaissance texts can disrupt modern quantum search algorithms. This session explores how redundancy in language directly impacts Groverโ€™s algorithm, revealing unexpected failure modes where quantum search becomes less efficient than classical approaches.

Blending theory with experimental results, the talk walks through corpus-driven oracle construction, discrete resonance failures, and real quantum simulations that challenge textbook assumptions. Attendees will gain fresh insights into how data structure, language patterns, and optimization methods reshape the security landscape in both classical and quantum contexts.

Alessio Di Santo is a cybersecurity specialist and PhD researcher with experience in threat intelligence, incident response, and malware analysis, currently working at Deutsche Bรถrse. Gabriella Lanziani is a linguistics-focused researcher with a background in literature and history, exploring the intersection of language structure, information theory, and cryptography.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

๐Ÿ“ฒ Want to navigate the event easily? Check out the full schedule on Hacker Tracker:
https://hackertracker.app/schedule?conf=BSIDESLUX2026

#BSidesLuxembourg2026 #CyberSecurity #QuantumSecurity #Cryptography #ThreatIntelligence #Research #Linguistics

โšก Fresh Talk Alert for BSides Luxembourg 2026!

โ€œConfound and Delay: Honeypot Chronicles from the Digital Battlefieldโ€ โ€“ Kat Fitzgerald ( @rnbwkat )
Talk (40 minutes)

Step into a 40-minute talk that takes you across the globe through real-world honeypot deployments, uncovering how attackers behave when they think no one is watching. From unexpected attack patterns to cultural quirks and operational chaos, this session blends storytelling with practical insights drawn from running deception systems in diverse and high-risk environments.

Through vivid field experiences, youโ€™ll learn how honeypots can be tailored, maintained, and leveraged to strengthen detection and response strategies. Beyond the humor and war stories, the talk delivers actionable lessons on cyber deception, resilience, and turning attacker behavior into defensive advantage.

Kat Fitzgerald ( @rnbwkat ) a Chicago-based security engineer known for blending technical depth with humor and storytelling. With extensive experience running honeypots across global environments, she brings unique insights into attacker behavior, cyber deception strategies, and real-world operational challenges.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

๐Ÿ“ฒ Want to navigate the event easily? Check out the full schedule on Hacker Tracker:
https://hackertracker.app/schedule?conf=BSIDESLUX2026

# BSidesLuxembourg2026 #CyberSecurity #Honeypots #ThreatIntelligence #BlueTeam #SecurityResearch

RE: https://infosec.exchange/@BSidesLuxembourg/116420285582471119

looking forward to presenting, see you in a few weeks ๐Ÿ‘‹๐Ÿ‡ฑ๐Ÿ‡บ

RE: https://infosec.exchange/@BSidesLuxembourg/116420291227699467

This is going to be the premiere for my brand-new talk "Out of Security Exception - What to Do Without an Expert to Secure Your Software"! ๐Ÿคฉ And have you seen the rest of the program of @BSidesLuxembourg? It's going to be amazing, can't wait for it!!

๐Ÿš€ New Talk Dropped for BSides Luxembourg 2026!

๐Ÿ”๐Ÿงฐ ๐—ง๐—จ๐—ฅ๐—ก๐—ž๐—˜๐—ฌ ๐—–๐—ข๐——๐—˜ โ€“ ๐—˜๐—ก๐—›๐—”๐—ก๐—–๐—œ๐—ก๐—š ๐—ฆ๐—˜๐—–๐—ฅ๐—˜๐—ง๐—ฆ ๐— ๐—”๐—ก๐—”๐—š๐—˜๐— ๐—˜๐—ก๐—ง ๐—œ๐—ก ๐—Ÿ๐—”๐—ฅ๐—š๐—˜ ๐—ฆ๐—–๐—”๐—Ÿ๐—˜ ๐—ข๐—ฅ๐—š๐—”๐—ก๐—œ๐—ญ๐—”๐—ง๐—œ๐—ข๐—ก๐—ฆ โ€” Diogo Lemos

โšก Dive into a Talk (40 min) on building scalable secrets detection systems that actually reduce noise, improve triage, and integrate into real-world CI/CD pipelines.

Secrets leakage remains one of the most persistent problems in modern software development, not because tools donโ€™t exist, but because they fail at scaleโ€”producing too many false positives and too little actionable context. This session explores how a real-world turnkey platform was designed to solve this gap using open-source tooling, smarter validation, and CI/CD-native workflows.

Through architecture insights and live demonstrations, learn how scanning strategies, confidence scoring, and automation can transform secrets detection from a noisy checkbox into a reliable security process. The talk also highlights practical lessons from deploying and scaling such a system in production environments.

Diogo Lemos is an Application Security Engineer with experience at Checkmarx, Flutter Entertainment, and OLX, specializing in scalable AppSec programs, automation, and cloud security. He actively contributes to open-source security tooling and speaks internationally on practical SAST, SCA, and secrets management solutions.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/

๐Ÿ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

๐Ÿ“ฒ View full schedule & build your agenda: https://hackertracker.app/schedule?conf=BSIDESLUX2026

#BSidesLuxembourg2026 #SecretsManagement #AppSec #DevSecOps #SAST #CyberSecurity

๐Ÿ“Œ Added to the BSides Luxembourg 2026 Lineup

๐Ÿ› ๏ธ๐Ÿ” ๐—ข๐—จ๐—ง ๐—ข๐—™ ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ ๐—˜๐—ซ๐—–๐—˜๐—ฃ๐—ง๐—œ๐—ข๐—ก: ๐—ช๐—›๐—”๐—ง ๐—ง๐—ข ๐——๐—ข ๐—ช๐—œ๐—ง๐—›๐—ข๐—จ๐—ง ๐—”๐—ก ๐—˜๐—ซ๐—ฃ๐—˜๐—ฅ๐—ง ๐—ง๐—ข ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—˜ ๐—ฌ๐—ข๐—จ๐—ฅ ๐—ฆ๐—ข๐—™๐—ง๐—ช๐—”๐—ฅ๐—˜ โ€” Lisi Hocke ( @lisihocke )

๐Ÿ’ก Take control in this Talk (40 min) and learn how development teams can build secure software even without dedicated security experts.

Security shouldnโ€™t be a blocker waiting on experts. This session shows how everyday engineering activitiesโ€”like planning features, collaborating across teams, and maintaining codeโ€”can be leveraged to significantly improve your productโ€™s security posture without slowing down delivery.

Discover how to integrate threat modeling into regular workflows, catch vulnerabilities earlier through collaboration, and use production insights to detect malicious behavior. This talk empowers teams to shift from dependency on security teams to building โ€œsecure enoughโ€ systems through practical, developer-driven approaches.

Lisi Hocke (@lisihocke ) is a security engineer focused on product security, with a passion for quality, collaboration, and continuous learning. A strong advocate for whole-team approaches, she shares her experiences to help teams build resilient and secure software while delivering real value.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/

๐Ÿ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

๐Ÿ“ฒ View full schedule & build your agenda: https://hackertracker.app/schedule?conf=BSIDESLUX2026

#BSidesLuxembourg2026 #SecureDevelopment #AppSec #DevSecOps #SoftwareSecurity #CyberSecurity

๐Ÿ” Inside the Tech: New Talk Added to BSides Luxembourg

๐ŸŒ๐Ÿ“ก ๐—ง๐—›๐—˜ ๐—™๐—ข๐—ฅ๐—š๐—ข๐—ง๐—ง๐—˜๐—ก ๐—™๐—œ๐—ก๐—š๐—˜๐—ฅ๐—ฃ๐—ฅ๐—œ๐—ก๐—ง: ๐——๐—ก๐—ฆ ๐—•๐—”๐—ฆ๐—˜๐—— ๐—ข๐—ฆ๐—œ๐—ก๐—ง ๐—ง๐—˜๐—–๐—›๐—ก๐—œ๐—ค๐—จ๐—˜๐—ฆ ๐—™๐—ข๐—ฅ ๐—ฃ๐—ฅ๐—ข๐——๐—จ๐—–๐—ง & ๐—ฆ๐—˜๐—ฅ๐—ฉ๐—œ๐—–๐—˜ ๐——๐—œ๐—ฆ๐—–๐—ข๐—ฉ๐—˜๐—ฅ๐—ฌ โ€“ Rishi ( @rxerium )

โšก Reveal hidden infrastructure in a Talk (40 min) using DNS TXT records to map technologies, dependencies, and external services at scale.

DNS is often treated as infrastructure plumbing, but TXT records quietly expose far more than most defenders realize. This session introduces a DNS-based OSINT methodology that leverages large-scale TXT record analysis to uncover embedded service dependencies such as cloud platforms, SaaS integrations, and identity providers.

By programmatically scanning DNS zones and integrating the technique into tools like Nuclei and OWASP Amass, this approach enables security teams to build detailed maps of organizational technology stacks and attack surfaces. A real-world case study from the Salesloft breach demonstrates how these signals translate into actionable intelligence for both offensive and defensive use cases.

Rishi ( @rxerium ) is a London-based security researcher focused on vulnerability research, threat intelligence, and OSINT-driven attack surface discovery. He contributes to open-source security tooling, supports the UK OSINT community, and focuses on building scalable reconnaissance and detection methodologies.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/

๐Ÿ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

๐Ÿ“ฒ View full schedule & build your agenda: https://hackertracker.app/schedule?conf=BSIDESLUX2026

#BSidesLuxembourg2026 #OSINT #DNS #AttackSurface #ThreatIntelligence #CyberSecurity

BSides Luxembourg 2026 โ€“ announcement of ๐—ข๐—จ๐—ฅ ๐—ฉ๐—˜๐—ฅ๐—ฌ ๐—™๐—œ๐—ฅ๐—ฆ๐—ง ๐—–๐—ง๐—™ ๐—–๐—ข๐— ๐—ฃ๐—˜๐—ง๐—œ๐—ง๐—œ๐—ข๐—ก!!

Over the last months, we've had an awesome team of volunteers building CTF challenges for you on the theme: ๐—ฆ๐—ฃ๐—”๐—–๐—˜!

We're excited to announce that BSides Luxembourg 2026 will feature a Capture The Flag competition open to all ๐—ข๐—ก-๐—ฆ๐—œ๐—ง๐—˜ ๐—”๐—ง๐—ง๐—˜๐—ก๐——๐—˜๐—˜๐—ฆ โ€” running across all three days of the event (May 6โ€“8, Luxembourg). ๐—ง๐—›๐—˜ ๐—–๐—ง๐—™ ๐—ช๐—œ๐—Ÿ๐—Ÿ ๐—ข๐—ฃ๐—˜๐—ก ๐—”๐—ง ๐Ÿญ๐Ÿฌ:๐Ÿฌ๐Ÿฌ ๐—ช๐—˜๐——๐—ก๐—˜๐—ฆ๐——๐—”๐—ฌ ๐— ๐—”๐—ฌ ๐Ÿฒ๐—ง๐—› ๐—”๐—ก๐—— ๐—–๐—Ÿ๐—ข๐—ฆ๐—˜๐—ฆ ๐—”๐—ง ๐— ๐—”๐—ฌ ๐Ÿด๐—ง๐—› ๐Ÿญ๐Ÿฏ:๐Ÿฐ๐Ÿฌ ๐—™๐—ข๐—Ÿ๐—Ÿ๐—ข๐—ช๐—˜๐—— ๐—•๐—ฌ ๐—” ๐—ช๐—”๐—Ÿ๐—ž๐—ง๐—›๐—ฅ๐—ข๐—จ๐—š๐—› ๐—ฆ๐—˜๐—ฆ๐—ฆ๐—œ๐—ข๐—ก ๐—”๐—ง ๐Ÿญ๐Ÿฐ:๐Ÿฌ๐Ÿฌ .

This year's CTF takes you on a space exploration mission. Navigate a galaxy of challenges spanning web, reverse engineering, forensics, OSINT, privilege escalation, and more โ€” with difficulty levels for all skill sets.

And our awesome sponsors have provided some incentives! ๐—ง๐—›๐—˜๐—ฅ๐—˜ ๐—”๐—ฅ๐—˜ ๐—ฃ๐—ฅ๐—œ๐—ญ๐—˜๐—ฆ!

In these days and times, it would make no sense to forbid you to use AIs to do the CTF, but we urge everyone to realise that if you depend on LLMs exclusively to solve challenges, this actively does not only not teach you anything, it reduces your own ability to solve challenges (scientifically proven that LLM dependence reduces ability in other fields).

A huge shoutout to ๐—Ÿ๐—˜๐—ง๐—ญ๐—ฃ๐—ช๐—ก ๐—”๐—ฆ๐—•๐—Ÿ ( @letzpwn ) for providing the platform and infrastructure to run this CTF competition.

Prizes up for grabs:

1st: ๐—ง๐—›๐—˜ ๐—™๐—œ๐—ฅ๐—ฆ๐—ง ๐—ฃ๐—Ÿ๐—”๐—–๐—˜ person/team gets 1 voucher for: SOC-200 OSDA (Offensive Security & Defense Analyst) provided by the Redbluealliance.com
โ€“ sponsored by SecuInfra.com ! (@SI_FalconTeam )
(๐ˆ๐-๐๐„๐‘๐’๐Ž๐ ๐“๐‘๐€๐ˆ๐๐ˆ๐๐† ๐ˆ๐ ๐†๐„๐‘๐Œ๐€๐๐˜)

๐Ÿฎ๐—ก๐——: Linux Attack, Detection and Forensics v2.0 - Hands-on Purple Teaming Playbook provided and sponsored by Defensive-security.com!(@cr0nym )
(๐๐Ž๐Ž๐Š + ๐Ž๐๐‹๐ˆ๐๐„ ๐“๐‘๐€๐ˆ๐๐ˆ๐๐† ๐‚๐Ž๐”๐‘๐’๐„)

๐Ÿฏ๐—ฅ๐——: Linux Attack, Detection and Forensics v2.0 - Hands-on Purple Teaming Playbook provided and sponsored by Defensive-security.com! (Defensive Security)
(๐๐Ž๐Ž๐Š + ๐Ž๐๐‹๐ˆ๐๐„ ๐“๐‘๐€๐ˆ๐๐ˆ๐๐† ๐‚๐Ž๐”๐‘๐’๐„)
(@cr0nym )
๐Ÿฐ๐—ง๐—›: Linux Attack, Detection and Forensics v2.0 - Hands-on Purple Teaming Playbook provided and sponsored by Defensive-security.com! (@cr0nym )
(๐๐Ž๐Ž๐Š + ๐Ž๐๐‹๐ˆ๐๐„ ๐“๐‘๐€๐ˆ๐๐ˆ๐๐† ๐‚๐Ž๐”๐‘๐’๐„)

Positions in CTF are determined by points, if points are equal, who reached the amount of points first.

This CTF is also supported by the ๐—–๐—ฌ๐—•๐—˜๐—ฅ๐—˜๐——๐—จ๐Ÿฐ๐—ง๐—˜๐—˜๐—ก๐—ฆ initiative from SnT, Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg โ€” a Google.org-funded project working to bring cybersecurity education to the next generation.

A huge thank you to Nastassia Salash from SnT for making this support