Insomni'Hack

Talks 2025

Thursday, March 13th

Time CAMPUS (AUDITORIUM B) CLOUD (AUDITORIUM C) GARDEN (ROOM 1ABC) SIDE EVENTS
09:00 - 09:50Keynote (TBA)
10:00 - 10:30COFFEE
10:30 - 11:20Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulationby Priyank NigamCaptain MassJacker Sparrow: Uncovering the Malware's Buried Treasureby Ari NovickTBAEU-CH Cybersecurity Regulatory Landscape (FR)by Soheila Firouz Kouhi & Gaëtan Senelle-Cojan
11:30 - 12:20You can't touch this: Secure Enclaves for Offensive Operationsby Matteo Malvica & Cedric Van BockhavenGhost in the RaaS: Ransomware-as-a-Service from the perspective of an affiliateby Carlos IshimaruWhat if I told you that Security is here to help? (a.k.a. The 7 habits of Highly Effective Security Leaders)by Sebastian Avarvarei(continued)
12:30 - 13:30LUNCH
13:30 - 14:20Demystifying Automated City Shuttles: Blessing or Cybersecurity Nightmare?by Anastasija CollenCode to Cloud: Exploiting Modern Web Applications to Breach Cloud Environmentsby Christophe Tafani-DereeperTBAEU-CH Cybersecurity Regulatory Landscape (EN)by Soheila Firouz Kouhi & Gaëtan Senelle-Cojan
14:30 - 15:20Pioneering zero days at Pwn2Own Automotive 2024by Alex Plaskett & McCaulay HudsonDouble Agent: Exploiting Pass-through Authentication Credential Validation in Azure ADby Ilan Kalendarov & Elad BeberTBA(continued)
15:30 - 16:00COFFEE
16:00 - 16:50Behind Closed Doors - Hacking RFID Readersby Julia ZduńczykEL3XIR: Fuzzing COTS Secure Monitorsby Marcel Busch & Christian LindenmeierStop making nonsense – Cutting through compliance complexityby Mat Caplan
17:00 - 17:50Unlocking the Cybersecurity Secrets of Modern Vehiclesby YUQIAO NINGHack, Patch, Repeat: Insider Tales from Android’s Bug Bountyby Maria Uretsky & Olivier TuchonTBA

Friday, March 14th

Organized by

Technology partners

Partner events

Scroll to Top