Media Summary: by Juho Jauhiainen An analysis of one case, together with an analysis of other similar campaigns identified that use malicious ... by Evgeni Dyulgerov Key Topics of the lecture: The Security Risks of AI-Powered Systems. Adversarial AI and Model Exploitation ... by The fusion of generative AI and cybersecurity is reshaping the landscape of modern warfare. This talk delves into the ...

Bsides Sofia 2025 Weaponized Open Source Applications Real Life Cyberattack Scenarios - Detailed Analysis & Overview

by Juho Jauhiainen An analysis of one case, together with an analysis of other similar campaigns identified that use malicious ... by Evgeni Dyulgerov Key Topics of the lecture: The Security Risks of AI-Powered Systems. Adversarial AI and Model Exploitation ... by The fusion of generative AI and cybersecurity is reshaping the landscape of modern warfare. This talk delves into the ... Introduction Welcome & Objectives of the Presentation Definition of Elicitation in Social Engineering Importance in Covert Access ... by Asen Molov Nowadays I can't see many people to talk about how can we start in this Mapping the SaaS Attack Surface Jaime Blasco In this presentation, attendees will be introduced to the concept of SaaS attack ...

Read the Cost of a Data Breach report → In the ever changing landscape cybersecurity landscape, Jeff ... GAME HACKING COURSE BUG BOUNTY COURSE ... Ready to become a certified SOC Analyst - QRadar SIEM V7.5 Plus CompTIA Cybersecurity Analyst? Register now and use code ... Click this link and use my code ALBERTA to get 25% off your first payment for boot.dev ...

Photo Gallery

BSides Sofia 2025: Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
BSides Sofia 2025 Keynote Generative AI in Cyber Warfare & Navigating the Post-Quantum Battlefield
BSides Sofia 2025: Securing AI-Powered Systems: Threats, Challenges, and Best Practices
BSides Sofia 2025: Generative AI in Cyber Warfare and Navigating the Post-Quantum Battlefield
BSides Oslo 2025
[BSL2025] Elicitation Weaponization of SE for Covert Access Operations - Dorota Kozlowska
BSides Sofia 2025: Baby Steps in Cybersecurity
BSidesSF 2025 - Mapping the SaaS Attack Surface (Jaime Blasco)
The Biggest Cyber Incidents of 2025 So Far | Top Cyber Attacks Explained | Adaptivids
Cybersecurity Trends for 2025 and Beyond
How I Hacked A REAL Website With DeepSeek In 8 Minutes
Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes
Sponsored
View Detailed Profile
BSides Sofia 2025: Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios

BSides Sofia 2025: Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios

by Juho Jauhiainen An analysis of one case, together with an analysis of other similar campaigns identified that use malicious ...

BSides Sofia 2025 Keynote Generative AI in Cyber Warfare & Navigating the Post-Quantum Battlefield

BSides Sofia 2025 Keynote Generative AI in Cyber Warfare & Navigating the Post-Quantum Battlefield

BSides Sofia 2025

BSides Sofia 2025: Securing AI-Powered Systems: Threats, Challenges, and Best Practices

BSides Sofia 2025: Securing AI-Powered Systems: Threats, Challenges, and Best Practices

by Evgeni Dyulgerov Key Topics of the lecture: The Security Risks of AI-Powered Systems. Adversarial AI and Model Exploitation ...

BSides Sofia 2025: Generative AI in Cyber Warfare and Navigating the Post-Quantum Battlefield

BSides Sofia 2025: Generative AI in Cyber Warfare and Navigating the Post-Quantum Battlefield

by The fusion of generative AI and cybersecurity is reshaping the landscape of modern warfare. This talk delves into the ...

BSides Oslo 2025

BSides Oslo 2025

Live stream of the

Sponsored
[BSL2025] Elicitation Weaponization of SE for Covert Access Operations - Dorota Kozlowska

[BSL2025] Elicitation Weaponization of SE for Covert Access Operations - Dorota Kozlowska

Introduction Welcome & Objectives of the Presentation Definition of Elicitation in Social Engineering Importance in Covert Access ...

BSides Sofia 2025: Baby Steps in Cybersecurity

BSides Sofia 2025: Baby Steps in Cybersecurity

by Asen Molov Nowadays I can't see many people to talk about how can we start in this

BSidesSF 2025 - Mapping the SaaS Attack Surface (Jaime Blasco)

BSidesSF 2025 - Mapping the SaaS Attack Surface (Jaime Blasco)

Mapping the SaaS Attack Surface Jaime Blasco In this presentation, attendees will be introduced to the concept of SaaS attack ...

The Biggest Cyber Incidents of 2025 So Far | Top Cyber Attacks Explained | Adaptivids

The Biggest Cyber Incidents of 2025 So Far | Top Cyber Attacks Explained | Adaptivids

2025

Cybersecurity Trends for 2025 and Beyond

Cybersecurity Trends for 2025 and Beyond

Read the Cost of a Data Breach report → https://ibm.biz/BdGEHY In the ever changing landscape cybersecurity landscape, Jeff ...

How I Hacked A REAL Website With DeepSeek In 8 Minutes

How I Hacked A REAL Website With DeepSeek In 8 Minutes

GAME HACKING COURSE https://deadoverflow.gumroad.com/l/ultimate-game-hacking-course/50000 BUG BOUNTY COURSE ...

Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes

Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes

Ready to become a certified SOC Analyst - QRadar SIEM V7.5 Plus CompTIA Cybersecurity Analyst? Register now and use code ...

This company killed open source

This company killed open source

Click this link https://boot.dev/?promo=ALBERTA and use my code ALBERTA to get 25% off your first payment for boot.dev ...