Loading…
Type: Track 5 clear filter
arrow_back View All Dates
Thursday, April 10
 

11:00am ADT

The Effects of Weaponized Malware on End-to-End Encryption and Exfiltrating Data from Signal Messenger
Thursday April 10, 2025 11:00am - 11:45am ADT
201
Myntex CEO, Geoff Green presents on the tactics used by weaponized malware to infiltrate your phone, the advancements and capabilities of forensic surveillance tools, and extracting encrypted data from Signal Messenger. This presentation is essential for security decision-makers and anyone looking to proactively protect your mobile network from the latest malware and digital surveillance tactics.

Highlighted Topics:
  • The current mobile threat landscape
  • How forensic tools can bypass E2EE
  • Prominent spyware capabilities exposed
  • Malware attack lifecycle, from infection to data exfiltration
  • The evolution of encryption protocols
  • Exfiltrating Signal messages
  • A roadmap for holistic cybersecurity measures
Speakers
avatar for Geoff Green

Geoff Green

Co-Founder, CEO, Full Stack Developer, Systems Architect, https://myntex.com/
As a passionate advocate for digital privacy, I've dedicated my career to pushing the boundaries of mobile privacy. I am a self-taught full-stack developer, systems architect, and encryption expert. I co-founded Myntex, a company committed to creating innovative encrypted mobile... Read More →
Thursday April 10, 2025 11:00am - 11:45am ADT
201
  Track 5
  • global Y

1:00pm ADT

Nobody Likes an Oversharer: Getting a Handle on Open Share Exposure in Your Organization
Thursday April 10, 2025 1:00pm - 1:45pm ADT
201
Organizations use network file shares to store and manage various types of data. While securing file access on the cloud presents its own set of challenges, traditional Server Message Block (SMB) network shares are still widely used and won't disappear anytime soon.

Aware of it or not, organizations typically have lots of open shares - just as often containing sensitive data. Built in Windows tools makes identifying these shares difficult and fixing them even harder. Once remediated, ensuring shares stay locked down and new, insecure folders aren’t created is paramount to prevent a never-ending game of wack a mole.

This presentation will discuss low pain and structured approaches to identifying, remediating and preventing open shares in networks of all sizes to drastically reduce your organization's attack surface.


Speakers
avatar for Brandon Doyle

Brandon Doyle

Sr. Security Engineer, Amsted Canada
Brandon is an accomplished information security professional with over a decade of experience. Currently serving as a Senior Security Engineer at Amsted Canada, Brandon plays a pivotal role in enhancing the organization's security posture across 75 locations in 13 countries on six... Read More →
Thursday April 10, 2025 1:00pm - 1:45pm ADT
201

2:00pm ADT

WTF? (Where’s the Flag?): An Introduction to CTFs
Thursday April 10, 2025 2:00pm - 2:45pm ADT
201
Delve into the world of Capture the Flags (CTFs), and see why even the best professional hackers leverage these challenges to hone their real-world skills in an ethical way. This talk highlights a handful of common tools and techniques anybody with a computer and an interest in penetration testing can learn to break into the hobby, and shows how these CTFs reflect what pentesters see in the field. At the end of this talk, the audience is challenged to take down a custom-built Capture the Flag virtual machine to begin their journey of rooting the boxes, capturing the flags, and getting the glory!
Speakers
avatar for Samuel Hansen

Samuel Hansen

Security Consultant, Mariner
Sam is a cybersecurity professional by trade, specializing in penetration testing. He currently works as a Security Consultant with Mariner, performing security assessments for a diverse range of clients. With a passion for security testing, Sam enjoys the creative aspect of combining... Read More →
Thursday April 10, 2025 2:00pm - 2:45pm ADT
201

3:00pm ADT

Binlex: A Framework for Malware Genomics
Thursday April 10, 2025 3:00pm - 3:45pm ADT
201
Binlex introduces a unique genetic-inspired framework for malware analysis, providing reverse engineers with powerful tools to uncover patterns, similarities, and relationships in binary files. By treating malware as structured genomes, Binlex organizes data hierarchically—breaking it down into genomes, chromosomes, allele pairs, and genes—offering a novel perspective for analyzing and comparing malicious binaries.


This approach enhances traditional techniques by enabling reverse engineers to identify shared traits between malware families, trace code evolution, and augment their ability to create meaningful YARA rules. For instance, Binlex helps analysts extract patterns and sequences from binaries, allowing them to design more precise and effective rules based on their findings, rather than relying on fully automated processes. A Binlex-powered analysis can also reveal subtle overlaps in seemingly unrelated binaries, helping analysts detect reused code or shared origins to strengthen threat hunting and detection efforts.


The session will explore Binlex’s practical applications, such as its integration with popular tools like IDA Pro through a dedicated plugin. This plugin empowers reverse engineers to perform similarity comparisons, extract patterns, and visually navigate binaries, streamlining their workflows. Additionally, Binlex’s Rust and Python APIs ensure seamless integration into existing pipelines, enabling users to build custom plugins and extend functionality to suit specific use cases. With multi-platform support, advanced similarity hashing techniques, and a focus on augmenting analysts’ workflows, Binlex provides a flexible and efficient solution for tackling modern challenges in malware research.


By introducing the concept of “malware genomics,” this talk demonstrates how organizing binaries into genetic-like traits offers fresh insights into threat analysis and classification. Attendees will leave with actionable knowledge on how to integrate Binlex into their tooling to strengthen threat hunting, detection workflows, and rule creation processes.

My project is open-source and can be found here: https://github.com/c3rb3ru5d3d53c/binlex
Speakers
avatar for Lilly Chalupowski

Lilly Chalupowski

Senior Security Researcher III, CrowdStrike
Lilly transformed her journey from adversity into a successful career in cybersecurity. After overcoming setbacks, including dropping out of computer science, Lilly taught herself programming, computer science concepts, and reverse engineering. Starting as an entry-level analyst... Read More →
Thursday April 10, 2025 3:00pm - 3:45pm ADT
201

4:00pm ADT

Secure Your Company on the cheap - using existing tool you already pay for
Thursday April 10, 2025 4:00pm - 4:45pm ADT
201
In today’s fast-paced digital world, safeguarding your business’s critical information is essential—but it doesn’t have to break the bank.

This session offers practical, actionable strategies for leveraging the tools and software your organization already uses, to enhance your cybersecurity posture.

Whether you rely on an external IT provider or manage your IT environment in-house, this session will provide immediately actionable tools and strategies to secure your business.
Speakers
avatar for Kevin Belyea

Kevin Belyea

President, Spartan Systems Limited
Kevin BelyeaOwner, Spartan Systems | IT Strategist and Cybersecurity AdvocateKevin Belyea is an accomplished entrepreneur and IT expert with a passion for making technology accessible and effective for businesses of all sizes. As the owner of Spartan Systems, an IT consulting firm... Read More →
Thursday April 10, 2025 4:00pm - 4:45pm ADT
201
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -