BSidesTLV 2020 July 2, 2020 to July 2, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
WhoAmI, anyway? Yossi Sassi All InfoSec challenges today may be traced back to the design mindset of the Internet ...
ROP - From Zero to Nation State In 25 Minutes Omer Yair “The only interesting answers are those which destroy the questions.” ― Susan SontagRoll up your ...
Regipy: Automating registry forensics with python Martin Korman Regipy is an OS independent python library for parsing offline registry hives. Regipy can be ...
Panel - 'Security Careers in the Corona Age Omer Cohen , Reut Menashe , Roei Sherman How has the world of work changed for security pros? What is the Covid Effect ...
Now You TCP Me, Now You Don't: The Strengths and Weaknesses of Various Internet Scanning Services Adi Ben-israel A wild router is connected to the web! Are Shodan and Censys the only ones ...
Shatter Reloaded: Reviving shatter attacks to escape sandboxes and evade endpoint security products Gil Fidel Shatter attacks were all the rage in 2003 but were quickly neutralized by DEP, UIPI ...
Eliminating Alert Fatigue: Reducing False Positives Through Better Engineering Dana Baril False Positive alerts are the bane of blue teams everywhere. Countless hours are lost as ...
The Art of C2: Myths vs. Reality Yossi Amit “You need a TCP/IP connection for a C’n’C Server”, don’t you?? a dynamic, real-time Command ...
Free Blue-Team TTPs: Stop Shiny Object Syndrome Robert Wagner Too many blue-teamers get dazzled by hype for fancy new tools, especially those that are ...
Community Talk: Volunteering during crisis - The CTI League Ohad Zaidenberg “Volunteering during crisis - CTI League, a global threat intelligence experts community that neutralize cyber ...
Cyber Cold War by Proxy: Saudi vs. Iran Chris Kubecka Welcome to the new Cold War in the Middle East, Iran vs. Saudi Arabia & ...