106 Followers
162 Following
178 Posts

Want an easy way to navigate the #BSidesLuxembourg2026 schedule?

We realize its complicated to keep track of whats happening at any given time across 5 stages with recording, 2 of these being villages, and multiple different things going on in the Atrium also, plus all the different workshops on the workshops day.

So we've loaded the schedule into Hacker Tracker (the app) with their help!

Get it here: https://hackertracker.app/

ty @aNullValue for the help!

Hacker Tracker

Just Announced for BSides Luxembourg 2026!
๐—ž๐—˜๐—ฌ๐—ก๐—ข๐—ง๐—˜: ๐—œ๐——๐—˜๐—ก๐—ง๐—œ๐—ง๐—ฌ ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ ๐—๐—จ๐—ฆ๐—ง ๐—˜๐—ซ๐—ฃ๐—Ÿ๐—ข๐——๐—˜๐—— - Wendy Nather (@wendynather )

As identity ecosystems evolve, some challenges never quite get solvedโ€”delegation being one of them. But now, the stakes are higher than ever. With the rapid rise of non-human identities that donโ€™t fit traditional system or application roles, organizations are facing a new layer of complexity. Even if youโ€™re not actively using these โ€œagentsโ€ yet, theyโ€™re already becoming part of the broader digital environment. The question is no longer ifโ€”but how youโ€™ll manage them. Itโ€™s time to start making deliberate decisions about identity, access, and control in this expanding landscape.

Wendy Nather ( @wendynather ) is a strategist, research director, and former CISO with over 40 years of experience in IT operations and security. Her expertise includes identity and access management, threat intelligence, risk analysis, and security operations, shaped by leadership roles in financial services, government, and industry research.
๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg #IdentityManagement #CyberSecurity #IAM #DigitalIdentity #SecurityLeadership

๐Ÿ‘‹ Check out this new Microsoft Entra blog post ๐Ÿ‘‡

Recommended Read: Securing and governing autonomous agents

https://techcommunity.microsoft.com/t5/microsoft-entra-blog/recommended-read-securing-and-governing-autonomous-agents/ba-p/4429002

Recommended Read: Securing and governing autonomous agents | Microsoft Community Hub

Microsoft Entra CVP Alex Simons suggests the post Securing and governing the rise of autonomous agents by Igor Sakhnov, CVP of Engineering and Deputy...

TECHCOMMUNITY.MICROSOFT.COM
How GenAI can be used to transform ๐ฎ๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž๐ ๐œ๐ฒ๐›๐ž๐ซ ๐ญ๐ก๐ซ๐ž๐š๐ญ ๐ซ๐ž๐ฉ๐จ๐ซ๐ญ๐ฌ ๐ข๐ง๐ญ๐จ ๐’๐“๐ˆ๐— 2.1 ๐›๐ฎ๐ง๐๐ฅ๐ž๐ฌ
https://medium.com/@antonio.formato/from-unstructured-threat-intelligence-to-stix-2-1-bundles-with-generative-ai-1065ce399e63
GitHub: https://github.com/format81/GenAI-STIX2.1-Generator/
#threatintelligence #GenAI #stix #timindmap #openai #llm #cyber #Security #CyberSecurity
From Unstructured Threat Intelligence to STIX 2.1 Bundles with Generative AI

In the ever-evolving landscape of cybersecurity, the need for seamless and standardized information sharing has never been more critical. The Structured Threat Information Expression (STIX) 2.1โ€ฆ

Medium
GitHub - microsoft/graphrag: A modular graph-based Retrieval-Augmented Generation (RAG) system

A modular graph-based Retrieval-Augmented Generation (RAG) system - microsoft/graphrag

GitHub

(๐Ÿงต1/2) Data discovery with GraphRAG ๐Ÿš€

Microsoft open-sourced this week GraphRAG, a Python library for extracting insights from unstructured text using LLMs. The GraphRAG uses LLM-generated knowledge graphs to extract information and answer questions from private datasets and documentation.

Installation ๐Ÿ› ๏ธ: ๐˜ฑ๐˜ช๐˜ฑ ๐˜ช๐˜ฏ๐˜ด๐˜ต๐˜ข๐˜ญ๐˜ญ ๐˜จ๐˜ณ๐˜ข๐˜ฑ๐˜ฉ๐˜ณ๐˜ข๐˜จ

License ๐Ÿชช: MIT ๐Ÿฆ„

#Python #OpenSource #AI #DataScience #LLM #MachineLearning

๐Ÿ”ˆMonthly release of ๐–๐ก๐š๐ญ'๐ฌ ๐ง๐ž๐ฐ ๐ข๐ง ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ | ๐Œ๐š๐ฒ 2024. ๐Ÿ”ˆ
Article and tool co-authored with Oleksiy Meletskiy.
๐Ÿ“ข New Features:
โžก๐–๐ซ๐ข๐ญ๐ž-๐ฎ๐ฉ ๐ฌ๐œ๐ซ๐ž๐ž๐ง๐ฌ๐ก๐จ๐ญ
โžก๐•๐ข๐ซ๐ฎ๐ฌ๐“๐จ๐ญ๐š๐ฅ ๐ˆ๐Ž๐‚๐ฌ ๐ž๐ง๐ซ๐ข๐œ๐ก๐ฆ๐ž๐ง๐ญ
โžก๐„๐ฆ๐›๐ž๐๐๐ž๐ ๐Œ๐ˆ๐“๐‘๐„ ๐€๐“๐“&๐‚๐Šยฎ ๐๐š๐ฏ๐ข๐ ๐š๐ญ๐จ๐ซ
โžก๐๐ƒ๐… ๐ซ๐ž๐ฉ๐จ๐ซ๐ญ ๐ข๐ฆ๐ฉ๐ซ๐จ๐ฏ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ

๐Ÿ“ฐ๐๐ฅ๐จ๐ : https://lnkd.in/dgTnd-uD

๐Ÿ’ป ๐€๐ฉ๐ฉ: https://lnkd.in/dSVdG2B4
โฉ ๐†๐ข๐ญ๐‡๐ฎ๐›: https://lnkd.in/dJDSQx8Y

๐‡๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐ข๐ง๐ฏ๐จ๐ฅ๐ฏ๐ž๐
The project is open to external contributions.
To collaborate, please check the GitHub repository: https://lnkd.in/dJDSQx8Y

If you find TI Mindmap useful, please consider starring โญ the repository on GitHub.
hashtag

#timindmap #ti #mindmap hashtag#mistral #ai #mistralai #threatintelligence #llm #llmapp #openai #azureopenai #largelanguagemodel #cybersecurity #cyber #security #python #streamlit #infer #embedding #chat #ioc #mitre
#ttp #cyberreport #report #mermaid #genai #generativeai #cyberthreatintelligence #github #prompt #promptengineering #FewShotPrompting #gpt hashtag#gpt4 #api #DataVisualization #threat #infosec #threatreport hashtag#oai #analyst #soc #cert #thumbnail #virustotal #stix #GPTo

LinkedIn

This link will take you to a page thatโ€™s not on LinkedIn

๐ŸŒŸ Excited to announce that I'll be presenting a talk at ๐๐’๐ข๐๐ž๐ฌ ๐€๐ญ๐ก๐ž๐ง๐ฌ on June 29th! ๐ŸŒŸ
๐ŸŽค Title of the talk: "๐…๐ซ๐จ๐ฆ ๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐ฅ๐ฎ๐ ๐ž ๐ญ๐จ ๐€๐œ๐ญ๐ข๐จ๐ง๐š๐›๐ฅ๐ž ๐ˆ๐ง๐ฌ๐ข๐ ๐ก๐ญ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐‹๐‹๐Œ๐ฌ: ๐ˆ๐ง๐ญ๐ซ๐จ๐๐ฎ๐œ๐ข๐ง๐  ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ"

๐Ÿ“œ I'll introduce TI Mindmap, an open-source project designed to empower Infosec professionals in navigating the complexities of Threat Intelligence write-ups. I'll explore how TI Mindmap leverages the capabilities of LLMs to enhance the efficiency of processing and extracting crucial information from a variety of Threat Intelligence sources.

Key Features of TI Mindmap:
โ–ถSummarizing Threat Intelligence articles
โ–ถMapping entity relationships with Mindmaps
โ–ถEngaging in AI-driven chats on your data
โ–ถGenerating comprehensive PDF reports
โ–ถIOCs extraction
โ–ถExtract adversary tactics, techniques, and procedures
โ–ถTTPs by execution time

During the session, I'll not only showcase the capabilities of TI Mindmap but also share insights from development journey. I'll discuss the challenges we've encountered, the lessons we've learned, and the future directions of this open-source project.

๐Ÿ”— Learn more about TI Mindmap, GitHub Repository: https://lnkd.in/dJDSQx8Y

BSides Athens: https://www.bsidesath.gr/
Tracks: https://lnkd.in/dC9znupr

#BSidesAthens #Cybersecurity #ThreatIntelligence #OpenSource #LLMs hashtag#AIdriven #TIMindmap #streamlit hashtag#mermaid #mindmap #TI #genai #python #mistral #openai #azureopenai #stix #ttp #conference #bsides

LinkedIn

This link will take you to a page thatโ€™s not on LinkedIn

๐†๐ž๐ญ๐ญ๐ข๐ง๐  ๐ฌ๐ญ๐š๐ซ๐ญ๐ž๐ ๐ฐ๐ข๐ญ๐ก ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญโ€™๐ฌ ๐๐ก๐ข-3 ๐จ๐ง ๐Ž๐ฅ๐ฅ๐š๐ฆ๐š

My initial journey into Small Language Models

https://medium.com/@antonio.formato/getting-started-with-microsofts-phi-3-on-ollama-c4e50be1e52d

#genai #ollama #phi3 #microsoft #smalllanguagemodel #sml #llm #language #reasoning #coding #prompt #generative #ai #azure #app

Getting started with Microsoftโ€™s Phi-3 on Ollama - Antonio Formato - Medium

The world of artificial intelligence (AI) and natural language processing is a continuously changing one where Small Language Models (SLMs) have recently established themselves as strong playersโ€ฆ

Medium

New ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ demo in action. ๐Ÿ“ฝ
New features coming soon, stay tuned. ๐Ÿ†•

๐’๐ญ๐ซ๐ž๐š๐ฆ๐ฅ๐ข๐ญ ๐€๐ฉ๐ฉ: https://ti-mindmap-gpt.streamlit.app/ ๐Ÿ’ฟ
๐†๐ข๐ญ๐‡๐ฎ๐›: https://github.com/format81/TI-Mindmap-GPT โœจ

๐–๐ซ๐ข๐ญ๐ž-๐ฎ๐ฉ used in the demo: https://www.microsoft.com/en-us/security/blog/2024/05/01/dirty-stream-attack-discovering-and-mitigating-a-common-vulnerability-pattern-in-android-apps/

๐˜š๐˜ฑ๐˜ฐ๐˜ช๐˜ญ๐˜ฆ๐˜ณ: ๐˜ช๐˜ง ๐˜บ๐˜ฐ๐˜ถ ๐˜ธ๐˜ข๐˜ต๐˜ค๐˜ฉ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ท๐˜ช๐˜ฅ๐˜ฆ๐˜ฐ ๐˜ค๐˜ข๐˜ณ๐˜ฆ๐˜ง๐˜ถ๐˜ญ๐˜ญ๐˜บ, ๐˜บ๐˜ฐ๐˜ถ ๐˜ธ๐˜ฐ๐˜ถ๐˜ญ๐˜ฅ ๐˜ฉ๐˜ข๐˜ท๐˜ฆ ๐˜ฏ๐˜ฐ๐˜ต๐˜ช๐˜ค๐˜ฆ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ถ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต ๐˜ง๐˜ฐ๐˜ณ ๐˜”๐˜ช๐˜ด๐˜ต๐˜ณ๐˜ข๐˜ญ๐˜ˆ๐˜. ๐Ÿ˜Š

#timindmap #mindmap #streamlit #threatintelligence #cyberthreatintelligence #openai #azure #azureopenai #mistral #mistralai #python #llm #ai #genai #embeddings #completition