BSidesAthens 2019 June 22, 2019 to June 22, 2019, Athens, Greece

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Cybersecurity in the EU: Athens the heart of Cybersecurity in Europe. Dr. Skouloudi Network and information systems and electronic communications networks and services play a vital role in ...
The challenge of the third millennium: the resilience of computer systems. Definition of specialized didactic paths tested in three eastern countries. The results of the Erasmus + LMPI project Elpidio Romano The objective of the LMPI project is the development of e-learning and master degrees for ...
The problem with super predators Argyris Makrygeorgou Two-parted presentation covering what is Commodity & how to treat it, along with the – ...
The Vulnerability Landscape of Greece Dimitrios Patsos The Vulnerability Landscape of Greece is a technical report which entails the findings of Greek-based ...
Android malware from Global to Local: How a Different View Can Change Perspectives Jan Chrysaidos Monitoring threat trends on a global scale can be beneficial, showing, for example prevalent threats, ...
Understanding malspam Martijn Grooten Email continues to be the main vector through which malware is delivered and through which ...
Powershell Best Security Practices and how to bypass them Isidoros Monogioudis As we know Powershell is widely used for offensive operations and is clearly defined as ...
Wormhole: How to sneak malware past SOC teams Vasilios Hioureas There is a new method of remote code execution which we have been seeing lately ...
Beyond Windows Forensics with Built-in Microsoft Tooling<0.- : Thomas V. Fischer Microsoft has slowly been introducing tools to help organisations better manage and troubleshoot Windows performance ...
Data Breaches: Barbarians in the Throne Room Dave Lewis Often defenders worry about the intangible security problems. Defenders need to concentrate their efforts defending ...
Looking through Muddy Waters: Insight into TTPs of a Middle Eastern threat actor Jaromir Horejsi MuddyWater is a threat actor likely based in Middle East, with known activities since at ...
Leveraging osquery for effective Incident Response as well as stealthy enumeration Dimitrios Bougioukas This talk is oriented towards both Blue team and Red team members (a.k.a Purple Team ...
Smart locks: dumb security, dumber API David Stykas The rise of cheap, low powered communication technology has been most prominent in the fields ...
The Role of Mobile Malware in Stalking Cases Jessica Amery This talk will cover basic techniques involved in reverse engineering Android .apk files alongside common ...
Past, Present and Future of DDoS Vaggelis Daravigkas DDoS has always been one of the greatest threats in the Internet landscape, especially towards ...