<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://videos.spacebar.ca/about/instance/home</loc></url><url><loc>https://videos.spacebar.ca/videos/browse?scope=local</loc></url><url><loc>https://videos.spacebar.ca/w/eSgENoQLdhMJSHVE4EHySP</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/26484402-766c-4639-a852-c50670b63a87.jpg</video:thumbnail_loc><video:title>Les Anticipateurs - SAPOUD</video:title><video:description>Les Anticipateurs - SAPOUD</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/704ba5bd-6f95-4865-9708-edaa773418ab/d09ebffc-434d-4fe4-a646-491af262ee98-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/eSgENoQLdhMJSHVE4EHySP</video:player_loc><video:duration>273</video:duration><video:rating>0</video:rating><video:view_count>4</video:view_count><video:publication_date>2025-01-21T05:27:03.234Z</video:publication_date><video:tag>videoclip</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/3GBNf5eQqUSrKf7cYqKUea</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/4794e64b-ca6d-4899-9db1-cb645885e0b2.jpg</video:thumbnail_loc><video:title>Logiciel malveillant «Bad Rabbit» - entrevue avec Marc-Étienne Léveillé</video:title><video:description>Logiciel malveillant «Bad Rabbit» - entrevue avec Marc-Étienne Léveillé</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/15de16c7-83b9-4069-b4bd-75e863d72b43/0fc58514-15b8-4b29-8278-171985ac8a64-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/3GBNf5eQqUSrKf7cYqKUea</video:player_loc><video:duration>258</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-01-21T05:29:11.999Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/dans_les_medias/videos">Dans les médias</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/t4k4d5TfSuaBvra8ib6bTe</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/062ddba3-4cf4-4a1a-a15f-bd22841f5b83.jpg</video:thumbnail_loc><video:title>Le fléau des rançongiciels qui paralysent d'importantes infrastructures, coût...</video:title><video:description>Le fléau des rançongiciels qui paralysent d'importantes infrastructures, coût...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/db1db7e8-1f4d-4125-827a-52a1c6a72d4b/dfb76381-a562-4d1c-bfef-7652c11b797f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/t4k4d5TfSuaBvra8ib6bTe</video:player_loc><video:duration>179</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-21T05:29:26.657Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/dans_les_medias/videos">Dans les médias</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/eAnH45ZTK7mEymFkbePmHs</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3ea4cd17-7453-40e9-a1e0-99f2840fa6d3.jpg</video:thumbnail_loc><video:title>Hackfest 2013 - Reportage Radio-Canada</video:title><video:description>Hackfest 2013 - Reportage Radio-Canada</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6e1377fb-1eaf-4185-97dd-8a2a54617bdc/d040d7a4-5dec-4c4f-9212-c0231aceb51d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/eAnH45ZTK7mEymFkbePmHs</video:player_loc><video:duration>123</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-01-21T05:29:45.121Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/dans_les_medias/videos">Dans les médias</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/6WHfkgFTaznXmJ6wFLCeHh</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/fdd9edc4-cc68-4d31-9f85-59d7bf56c194.jpg</video:thumbnail_loc><video:title>Buyin' The Dip (GAMESTOP) ft. Meet Kevin &amp; Charles Payne</video:title><video:description>someone post this on reddit i'm lazy

►Music &amp; Video by Dylan Locke (lol who's that?)
https://www.instagram.com/dylanlockemp3
https://twitter.com/dylanlockemp3

►PATREON: become a patron and i'll use the money to BUY THE DIPS.
https://www.patreon.com/dylanlockemp3

►DISCORD: 
http://lockecord.xyz/​

thanks to my patrons!
- Chloe Ting
- Dustin Ross
- Vikki is cooler then Joel
- x0_Kristin_0x
- Yalor Tackson
- John
- Aleks </video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/302146bc-7733-4db0-a634-8716f30a01ee/56ae15b8-d376-4e17-8ff4-c4bfa6614962-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/6WHfkgFTaznXmJ6wFLCeHh</video:player_loc><video:duration>132</video:duration><video:rating>0</video:rating><video:view_count>15</video:view_count><video:publication_date>2025-01-21T06:04:02.531Z</video:publication_date><video:tag>gme</video:tag><video:tag>amc</video:tag><video:tag>wall street bets</video:tag><video:tag>reddit remix</video:tag><video:tag>edm remix</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/gdEbKcmM3iuCfEqKVQAMSv</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a29ebcb5-0ec3-4f9a-b0ac-a964ec852a97.jpg</video:thumbnail_loc><video:title>dogecoin.avi</video:title><video:description>-----┌─────────────────────────────┐------
░▒▓▌DEPiLQgzMCwgCJ4k9ZSKqruedR5erAB6XD▐▓▒░
-----└─────────────────────────────┘------
THE GREATER GOOD
THE GREATER CAUSE

DONATE TO THESE MOTHERFUCKERS
─┤DFFVxzwY4Ehm1jxB6N9ZFA7vmCchnB4ikF  ├─
─┤DAK5q3tFR5DiqNbDyCBRY7pHe5xMvoWw1F├─
─┤D9WaXA4qhNTqSmo3WdSCPsR91xjBaJ6Kzj ├─
─┤DKWLVFte8Z4ALruSwb9TByt9TKNnqkXxCi    ├─
─┤DL2xtsdkw3LR1yPcCPX6rZRzfbckunVsJH      ├─
─┤DDEBkqUQHZKnS2fdDVKhyUxrCQPTbPT9N3├─

#modacity irc.gamesurge.net</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7b3d89a2-b57a-459a-bc4f-f25db8581bf5/c4b495ec-829a-4d67-a617-29ffcf0a1aa6-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/gdEbKcmM3iuCfEqKVQAMSv</video:player_loc><video:duration>243</video:duration><video:rating>0</video:rating><video:view_count>21</video:view_count><video:publication_date>2025-01-21T05:49:11.316Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/oTsQbYX8Mzk46h1HGnQ8ph</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8df22d64-45d8-41b5-a962-2e09e26eed04.jpg</video:thumbnail_loc><video:title>Planète techno - Charles F. Hamilton (Pirate éthique en informatique)</video:title><video:description>Planète techno - Charles F. Hamilton (Pirate éthique en informatique)</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/b9588494-6016-4874-bcd4-be1d73b8c252/0cf99ebd-89eb-4027-b920-dfabb7e4a576-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/oTsQbYX8Mzk46h1HGnQ8ph</video:player_loc><video:duration>239</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-21T15:10:09.145Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/dans_les_medias/videos">Dans les médias</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/uNS346MNkuQREBjC9awyv4</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/05b9a0d0-0b66-4414-97ad-588b2332bbce.jpg</video:thumbnail_loc><video:title>NorthSec 2023 Event Recap</video:title><video:description>NorthSec 2023 Event Recap</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e94aee6a-89d6-4603-afc5-d348d80bbf55/0d66e229-2404-4893-8e72-42bee9e6778c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/uNS346MNkuQREBjC9awyv4</video:player_loc><video:duration>270</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-21T16:15:46.726Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/nPpHD4QdJbkkxpanGqQzd6</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f247f0ac-85dc-41f0-87b1-6550a07b0005.jpg</video:thumbnail_loc><video:title>NorthSec 2023 Event Recap (40s)</video:title><video:description>NorthSec 2023 Event Recap (40s)</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/b0ae7c59-13fd-49d6-aaab-68abef979921/61b4b385-4836-44ba-9cf2-43b9563966af-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/nPpHD4QdJbkkxpanGqQzd6</video:player_loc><video:duration>41</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-21T16:15:44.291Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/mKsvwNDEE8jioYoeTLbS8o</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/680fcac9-92f3-4775-96b6-f484c8e55771.jpg</video:thumbnail_loc><video:title>NSEC2024 - Benoit Cote-Jodoin &amp; François Proulx - Under the Radar: 0-days in the Build Pipeline</video:title><video:description>Beyond the buzzword of 'supply chain security,' lies a critical, frequently ignored area: the Build Pipelines of Open Source packages. In this talk, we discuss how we’ve developed a data analysis infrastructure that targets these overlooked vulnerabilities. Our efforts have led to the discovery of 0-days in major OSS projects, such as Terraform providers and modules, AWS Helm Charts, and popular GitHub Actions. We will present a detailed attack tree for GitHub Actions pipelines, offering a deeper analysis than the prior art, and outlining attacks and mitigations. In addition, we will introduce a unique reference for 'Living Off the Pipeline' (LOTP) components, aimed at providing Red and Blue teams with a way to prioritize more risky scenarios.

Benoît Côte-Jodoin is a Senior Product Security Engineer at BoostSecurity researching software supply chain security. Former active CTF player, he now designs challenges for the NorthSec CTF competition.

François is a Senior Product Security Engineer for BoostSecurity, where he leads the Supply Chain research team. With over 10 years of experience in building AppSec programs for large corporations (such as Intel) and small startups he has been in the heat of the action as the DevSecOps movement took shape. François is one of founders of NorthSec and was a challenge designer for the NorthSec CTF.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a8081797-af1c-48e8-ada9-c057eea3f624/3dd54ad7-792d-46fa-9126-451532a9eec2-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/mKsvwNDEE8jioYoeTLbS8o</video:player_loc><video:duration>1801</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-01-21T20:31:52.361Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/dcpdkaWFhFmV7XB7edsLZS</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2cbc0c22-4e76-4bf3-810e-4b193f238796.jpg</video:thumbnail_loc><video:title>Vampire: The Masquerade — CHAPTERS | How To Play</video:title><video:description>Vampire: The Masquerade — CHAPTERS is a thrilling narrative coop board game for 1-4 players with tactical combats, branching dialogues and investigation mechanisms. Your decisions will have an impact on the story. Your choices will shape your experience.

This "How To Play" video will lead you through the basic gameplay elements and allow you to begin your adventure with ease.

—————

Download the rulebook (PDF): https://www.vampirethemasquerade-chapters.com/assets/VTMC-Rulebook-v2.pdf

PREORDER NOW: https://app.crowdox.com/projects/flyosgames/vampire-the-masquerade-chapters

—————

A video produced by our friend George from ONIRO — http://www.onirocreative.com</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/62c52691-a9e6-45e4-968a-f7b0e214793c/156c830c-27de-424f-b6d9-93284f8b6040-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/dcpdkaWFhFmV7XB7edsLZS</video:player_loc><video:duration>714</video:duration><video:rating>5</video:rating><video:view_count>10</video:view_count><video:publication_date>2025-01-21T23:26:04.232Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/eQJq2N6vube5HnDhZ3oQSK</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3bd3925a-a901-4c4b-9a00-6e311749c414.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Trevor Perrin - TextSecure Protocol: Present and Future</video:title><video:description>This talk will cover the TextSecure protocol for end-to-end encrypted messaging.  We’ll discuss how it handles cryptographic challenges like forward secrecy, multi-party and multi-device cases, authentication, and others.  We’ll also discuss what the future might hold, including emerging use cases and approaches to authentication, federation, and metadata hiding.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7014a46d-997b-43c2-8606-267697c38bef/2fe255c1-62aa-4114-8823-195aa89fbf1c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/eQJq2N6vube5HnDhZ3oQSK</video:player_loc><video:duration>2264</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-01-22T04:21:33.104Z</video:publication_date><video:tag>TextSecure</video:tag><video:tag>Cryptography (Software Genre)</video:tag><video:tag>messaging</video:tag><video:tag>Anonymity (Field Of Study)</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/npGavLbMeq8gjRqdTYyNGi</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8e42377c-2b12-4329-b80f-e715efb30427.jpg</video:thumbnail_loc><video:title>Dominion (2018)</video:title><video:description>Dominion uses drones, hidden and handheld cameras to expose the dark underbelly of modern animal agriculture, questioning the morality and validity of humankind’s dominion over the animal kingdom. While mainly focusing on animals used for food, it also explores other ways animals are exploited and abused by humans, including clothing, entertainment and research.

Narrated by Joaquin Phoenix, Rooney Mara, Sia, Sadie Sink and Kat Von D, and co-produced by Earthlings creator Shaun Monson. Filmed in Australia, with a global message.

Available for free as of 10 October 2018.
https://www.dominionmovement.com/</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/ad5ec541-35da-4f89-b491-a75b6555f4f9/662fcb1a-c07a-476e-87d0-bc0a5c1e5e3f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/npGavLbMeq8gjRqdTYyNGi</video:player_loc><video:duration>7200</video:duration><video:rating>0</video:rating><video:view_count>14</video:view_count><video:publication_date>2025-01-22T23:39:39.039Z</video:publication_date><video:tag>vegan</video:tag><video:tag>documentary</video:tag><video:tag>horror</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/vegan/videos">Vegan Propaganda</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/nkz1co19Fq2QYBpqT2QqRm</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/cf9878ce-d6ac-49bc-8120-a0eb53e41f52.jpg</video:thumbnail_loc><video:title>NorthSec By Balenciaga</video:title><video:description>Created by Jonathan Marcil for the NorthSec CTF Warmup 2023</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/accb61ee-99d2-4ef7-9e0f-ed2b8106ec7e/981062c1-6124-45f5-9ee5-dc94624ffed8-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/nkz1co19Fq2QYBpqT2QqRm</video:player_loc><video:duration>51</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-23T19:44:12.511Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/qZeErVUchLUyvMSaoP49TJ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/4cdf3efb-a6ea-4373-ae03-fdc234ee1dfb.jpg</video:thumbnail_loc><video:title>Northsec Q&amp;A</video:title><video:description>Powered by Restream https://restream.io/</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/ca59248d-2823-408a-a9a3-0a0e2b9fa940/1c2bb793-9920-4c00-a592-2846045dc474-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/qZeErVUchLUyvMSaoP49TJ</video:player_loc><video:duration>7148</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-23T20:05:51.627Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/4V7BcHPsdkAibX4YQTCE5k</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/45dcf3bb-2959-433e-9be3-cc14c71be2cc.jpg</video:thumbnail_loc><video:title>Reversing Android Malware for the Smart and Lazy</video:title><video:description>Reversing Android Malware for the Smart and Lazy</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/1fb5e84f-16a1-4ea2-83d2-2640c82346a3/cc0b17a6-164a-4999-bdac-56dbca33b342-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/4V7BcHPsdkAibX4YQTCE5k</video:player_loc><video:duration>10739</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-23T20:13:10.028Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jCNqjXoKQfNeJxRVDAvhzL</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/bc4ba8b0-7cf8-45e8-9cad-d0915b7a4569.jpg</video:thumbnail_loc><video:title>Reversing Android Malware for the Smart and Lazy</video:title><video:description>Reversing Android Malware for the Smart and Lazy</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/96e7e0eb-2e94-42bc-b7a3-bed85081216e/c434712e-1c3a-419b-ae47-74805a73b19d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jCNqjXoKQfNeJxRVDAvhzL</video:player_loc><video:duration>2242</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-23T20:31:52.123Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/2pzaRddvMFFGPP1ySd8UgC</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8e0db139-10cd-4d5c-af88-5eb84cc2b52f.jpg</video:thumbnail_loc><video:title>How Crypto Gets Broken (by you)</video:title><video:description>Live stream of the workshop by Ben Gardiner 
https://nsec.io/session/2021-how-crypto-gets-broken-by-you.html</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/0b63afde-5347-40f3-94f3-cb325a4160f2/ebe92999-07a9-4e76-8cbb-e3b59bb31fbd-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/2pzaRddvMFFGPP1ySd8UgC</video:player_loc><video:duration>12116</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-23T21:04:55.515Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jX9dWNJaFxZrwR7TD7GKx1</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/adfbe163-56a1-4e22-a1ec-366f69648a9e.jpg</video:thumbnail_loc><video:title>Capture-The-Flag 101</video:title><video:description>Stream for Olivier Bilodeau's CTF 101 workshop. Infrastructure: https://ctf101.nsec.io/.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/99777890-2886-4dbd-ab6a-5f20b2595792/30c595a7-8941-4b66-819a-e7e05a3c0ced-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jX9dWNJaFxZrwR7TD7GKx1</video:player_loc><video:duration>12701</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-23T21:06:46.011Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/1BXKoJgR2pp3VF476wPHFt</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/87335cf5-c41b-4b40-897c-0f5f621a8598.jpg</video:thumbnail_loc><video:title>Atomic Red Team Hands-on Getting Started Guide</video:title><video:description>Atomic Red Team Hands-on Getting Started Guide</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/05056351-4e3c-4863-bb74-bf4b9c4ac30d/9828dcd2-fd5b-4682-87a9-414d4f43332c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/1BXKoJgR2pp3VF476wPHFt</video:player_loc><video:duration>5062</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-23T21:17:00.970Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/5DweqtzqYtSqnmC8uXeMsy</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f66b03f3-2312-45d6-a894-d0e0f100dfdb.jpg</video:thumbnail_loc><video:title>Introduction to fuzzing</video:title><video:description>Live stream of Dhiraj Mishra's introduction to fuzzing workshop.
https://nsec.io/session/2021-introduction-to-fuzzing.html</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/25a1b474-5d04-4a86-ae2f-efbfeb301110/45182dcb-5395-49b6-a318-64f847f0fc4c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/5DweqtzqYtSqnmC8uXeMsy</video:player_loc><video:duration>12483</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-23T21:54:45.129Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/vmDNArdSjPCFxGSh8mXyi3</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f3e3ec64-4810-486f-84ad-9c1a3eaa78bc.jpg</video:thumbnail_loc><video:title>Automated contact tracing experiment on ESP Vroom32</video:title><video:description>Workshop by Marc-André Labonté – works with the NorthSec 2021 badge. 


https://nsec.io/session/2021-automated-contact-tracing-experiment-on-esp-vroom32.html</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/edbb3194-b8a4-41e6-9e41-10496b054e94/2bad5803-6250-4ce0-b731-a992c4ba4f6b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/vmDNArdSjPCFxGSh8mXyi3</video:player_loc><video:duration>7275</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-23T21:54:02.687Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/cjfpyyyTE7KKT2FLDNcHCC</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/bd01837f-d05c-4c63-8236-bfe1de28b997.jpg</video:thumbnail_loc><video:title>DIY Static Code Analyzer: Building your own security tools with Joern</video:title><video:description>DIY Static Code Analyzer: Building your own security tools with Joern by Suchakra Sharma and Vickie Li 


https://nsec.io/session/2021-diy-static-code-analyzer-building-your-own-security-tools-with-joern.html</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/5ba0ca91-03de-4ad6-9a70-c8d275675b48/f926c04f-a91d-4dc0-b7b6-108b1ccf568b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/cjfpyyyTE7KKT2FLDNcHCC</video:player_loc><video:duration>9411</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-23T22:32:09.029Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/cLzHNm1ffEYYogTpKv5pfp</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/e6abfbba-51c6-42f0-b175-bde93f2dbcc1.jpg</video:thumbnail_loc><video:title>Kubernetes Security 101: Best Practices to Secure your Cluster</video:title><video:description>Workshop by Magno Logan
https://nsec.io/session/2021-kubernetes-security-101-best-practices-to-secure-your-cluster.html</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/5f4e0841-1639-4700-8a2b-dee3302b490f/e8298249-cbdd-4049-a381-e7f65e8d5bf9-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/cLzHNm1ffEYYogTpKv5pfp</video:player_loc><video:duration>12497</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-23T22:54:00.982Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/hYVEBHGPWSDNRqA3Mq7gZi</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/632cb4fd-9318-4dba-bc98-ed5067b46906.jpg</video:thumbnail_loc><video:title>Web Application Firewall Workshop</video:title><video:description>Web Application Firewalls usage is controversial in the field of application security. Some consider them useless since they are imperfect. Others consider them an interesting ally for virtual patching and for defense in depth. Beyond this debate, firewalls are a reality in several organizations to defend edge services.

Testers may find the presence of such protection to be a drag on their security assessment. As these firewalls cannot always be disabled for testing, it is important to be able to quickly assess whether a circumvention method is possible. We have designed a workshop featuring different scenarios where a firewall is used to block certain attacks or features.

The workshop will consist of 4 main bypass categories: - Encoding (URL, Unicode, case mapping) - SQLi bypass (for mod_security and libinjection) - Switching protocol (WebSocket, H2C) - Syntax alternatives for table names, keywords and URLs.

For each of the exercises, an in-depth explanation of the technique will be discussed. Then a demonstration application will be available to participants to apply their new knowledge.

Participants should prepare by:
The participants should have the following software to save some time. - Docker - Burp Suite Pro / OWASP ZAP - Python

Participants must have the following equipment:
The participants should have the following software to save some time. - Docker - Burp Suite Pro / OWASP ZAP - Python</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/8984f141-0355-45f1-8cfb-118e60a69927/0242003c-347e-47aa-b157-cdc0018b72c4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/hYVEBHGPWSDNRqA3Mq7gZi</video:player_loc><video:duration>6795</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T21:15:19.792Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/3kj3DRMEn8jdHAbamXkL2D</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/7c72d252-01fb-4408-a83d-1c157095b6cc.jpg</video:thumbnail_loc><video:title>Capture-The-Flag 101</video:title><video:description>The objective of this workshop is to dive into Capture-The-Flag (CTF) competitions. First, by introducing participants to the basic concepts. Then, by helping them prepare for the upcoming NorthSec CTF, and, finally, evolve in their practice of applied cybersecurity.

We will have easy and medium CTF challenges in several categories (binaries, Web, exploitation, forensics) and we will give hints and solutions during the workshop.

This is meant to be for CTF first timers. Seasoned players should play NorthSec's official CTF.

Requirements

a laptop
a programming language of choice (it's usually Python)
Wireshark
a web assessment security tool (Burp, ZAP, mitmproxy)
a disassembler/decompiler (Radare2, Binary Ninja, IDA Pro)
Pre-requisites/assumed knowledge:
None

Participants should prepare by:
a laptop
a programming language of choice (it's usually Python)
wireshark
a web assessment security tool (Burp, ZAP, mitmproxy)
a disassembler / decompiler (Radare2, Binary Ninja, IDA Pro)
Participants must have the following equipment:
a laptop
a programming language of choice (it's usually Python)
wireshark
a web assessment security tool (Burp, ZAP, mitmproxy)
a disassembler / decompiler (Radare2, Binary Ninja, IDA Pro)</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/12e487b0-1233-4bea-8f70-216afddc2fb7/3d82df50-8407-4029-b076-de5f8b30a0a9-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/3kj3DRMEn8jdHAbamXkL2D</video:player_loc><video:duration>8080</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T21:27:51.632Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/q4bhirccNpp57b8KDcwh9R</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f27ccb06-c639-497d-bb2b-65fbb10a3de0.jpg</video:thumbnail_loc><video:title>Advanced Process Injection Techniques</video:title><video:description>"Advanced Process Injection Techniques" is a hands-on workshop focused on providing candidates insights about the APT tactics &amp; techniques on the privilege escalation &amp; persistence phase. This workshop is a quick deep-dive into the Microsoft windows world of process, memory and internals. There are 7 hands-on labs focused on host-level injection techniques, the candidates will learn how to develop custom trade-craft that stealthily input implants and escalate privileges.

The workshop outline are as follows :

1) PE Basics (10 minutes) 2) 7 Process Injection Labs (2 hr : 50 minutes) - APC Code Injection (25 min) - Module Stomping (25 min) - Process Hollowing (15 min) - Process Doppelganging (30 min) - Transacted Hollowing (20 min) - Process Herpaderping (20 min) - Process Ghosting (10 min)

The lab content / lab material are listed here : https://github.com/RedTeamOperations/Advanced-Process-Injection-Workshop

For any feedback / clarifications please contact yashb@cyberwarfare.live

Pre-requisites/assumed knowledge:
Intermediate to Advanced level knowledge is required.

1) Familiarity with windows internals (but not mandatory) 2) PE basics (but now mandatory)

Participants should prepare by:
The details are mentioned here : https://docs.google.com/document/d/1bNrSDWy-Yc3as2ZlvB_X3XOICUjbGUaKkw9PHDvxNAo/edit

Participants must have the following equipment:
The details are mentioned here : https://docs.google.com/document/d/1bNrSDWy-Yc3as2ZlvB_X3XOICUjbGUaKkw9PHDvxNAo/edit</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c2cce523-382a-4b8c-8581-2ae2a00a2901/fc7490b0-bb73-483f-b378-2dc276748049-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/q4bhirccNpp57b8KDcwh9R</video:player_loc><video:duration>7496</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T22:05:59.718Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/bdFdfx55xXEcBejhdKUufG</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/4bf348e0-3479-4db3-befe-9dfec85c2d2e.jpg</video:thumbnail_loc><video:title>Introduction to Cryptographic Attacks</video:title><video:description>Using cryptography is often a subtle practice and mistakes can result in significant vulnerabilities. This workshop will cover many of these vulnerabilities which have shown up in the real world, including CVE-2020-0601. This will be a hands-on workshop where you will implement the attacks after each one is explained. I will provide a VM with a tool I developed called cryptosploit. A good way to determine if this workshop is for you is to look at the challenges at cryptopals.com and see if those look interesting, but you could use in person help understanding the attacks. While not a strict subset of those challenges, there is significant overlap.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/52c07a03-3236-4d8c-bc4a-28007115e094/d528761c-2783-4e05-8a45-4b9c8699baa3-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/bdFdfx55xXEcBejhdKUufG</video:player_loc><video:duration>8540</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T22:31:57.914Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7EsDjpVbycm3ydSK5xjCh8</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f73e91cd-83c6-45d5-a027-c565757a83d7.jpg</video:thumbnail_loc><video:title>Malware Morphology for Detection Engineers</video:title><video:description>As Defenders it is easy to view attacker behavior through a Technique lens, but this perspective often causes us to forget about the diversity of implementation, morphology, that exists within a Technique. This often leads to detection rules that are more narrowly focused on specific tools instead of on the underlying behavior(s) themselves. MITRE ATT&amp;CK provides a schema for evaluating inter-technique differences between tools, such as the differences between Kerberoasting and DCSync, but we currently do not have an industry-wide model for evaluating intra-technique differences, such as the how two tools performing LSASS Dumping might differ in approach and thus lead to evasion opportunities.

In this workshop, attendees will be presented with various tools that implement the same Technique, but use different approaches, or Procedures, to do so. We will then walk participants through the process of analyzing these tools to understand exactly where and by how much they differ. Participants will then learn how to model different Procedures to evaluate their similarity and determine the optimal events or logs to serve as a foundation for building resilient detection rules.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/35f583ca-0449-47d2-b152-4e045383dcb7/26bd96d6-f238-4789-920b-d30c14d507af-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7EsDjpVbycm3ydSK5xjCh8</video:player_loc><video:duration>10045</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T16:55:33.163Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/9Af7THZBgh5T4bP511BqHv</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/342b7e24-1dd1-4fb1-bd41-51d8022e4ae8.jpg</video:thumbnail_loc><video:title>Tokens, everywhere!</video:title><video:description>The whole Microsoft cloud offering, including Azure AD and Microsoft 365, is based on the use of OAuth bearer tokens. The purpose of the token is simple: it proves the identity and the access rights of its bearer.

This workshop is a hands-on deep-dive to technical details of Azure AD’s implementation of OAuth standard. We’ll cover the JWT standard, different token types (access, identity, and refresh) and various ways of obtaining them, peculiarities of Family of Client Id (FOCI) tokens, and of course, different attack scenarios.

Attendees will learn the technical details of Azure AD OAuth implementation, helping them to secure their environments better and detect abuse of tokens.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/45911936-ed43-437c-807e-9d07e1d102bf/ebc00806-8d8e-4815-93e1-99d11a1c457c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/9Af7THZBgh5T4bP511BqHv</video:player_loc><video:duration>8541</video:duration><video:rating>0</video:rating><video:view_count>3</video:view_count><video:publication_date>2025-01-25T17:07:15.626Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/5DquyWxUmQHtYvjmowNGXr</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1af4f5cb-ed12-492f-8379-f2b89905029a.jpg</video:thumbnail_loc><video:title>Go reverse-engineering workshop</video:title><video:description>Go is becoming more and more prevalent in offensive security tooling. And while the analysis of most programs can be approached using the same methods, binaries generated by this language are different enough from what compilers generally produce that they require developing a special skillset.

Short, unscientific surveys conducted in my professional circle indicate that Go is reverse-engineers’ most dreaded language. It doesn’t have to be this way. In this workshop, I would like to share the knowledge I have built up reverse-engineering Go malware as well as the methodology I follow during my day-to-day work and useful disassembler plugins.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/259e2b0f-320a-4186-a923-3766b1278bff/8c3ec01b-ba45-457e-8e8e-35b63fb34e2d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/5DquyWxUmQHtYvjmowNGXr</video:player_loc><video:duration>8850</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T17:38:34.159Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/azUB3Zh8SdQ8VL5Rha7Nhq</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/294eeedd-c392-4757-a624-01980cadd01d.jpg</video:thumbnail_loc><video:title>Capture-The-Flag 101</video:title><video:description>An introduction to Capture-The-Flag (CTF) with easy challenges and tips on how to approach them.

The objective of this workshop is to dive into Capture-The-Flag (CTF) competitions. First, by introducing participants to the basic concepts. Then, by helping them prepare for the upcoming NorthSec CTF, and, finally, evolve in their practice of applied cybersecurity.

We will have easy and medium CTF challenges in several categories (binaries, Web, exploitation, forensics) and we will give hints and solutions during the workshop.

This is meant to be for CTF first-timers. Seasoned players should play NorthSec's official CTF.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/4d9e35ff-1e2b-4063-86d0-d80f325652f0/d637f2b5-2ec3-4c68-8ec9-4d7c8e49b977-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/azUB3Zh8SdQ8VL5Rha7Nhq</video:player_loc><video:duration>9710</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T17:49:33.494Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/p45fdLeZQqCss7MWn9FiuW</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/c21e78ff-34d9-4056-b458-c68a9b874ea4.jpg</video:thumbnail_loc><video:title>NorthSec 2023 - Hacker Jeopardy</video:title><video:description>NorthSec 2023 - Hacker Jeopardy</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/bab00963-4084-4d0c-8042-e41621d48caa/19e69131-78f1-4cb9-8df3-1d0a4139621e-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/p45fdLeZQqCss7MWn9FiuW</video:player_loc><video:duration>7406</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T19:11:18.563Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kCvFkCscBPsmW8ATQuLU4Y</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/671e5151-bdd8-4512-aa8a-c78765ad730b.jpg</video:thumbnail_loc><video:title>NorthSec 2024 - Hacker Jeopardy</video:title><video:description>The Hacker Jeopardy returns this year with new questions, and new participants!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9ef6b33b-be82-443d-b9db-7a1ee2ba7d96/ce1eb274-7119-4d4c-bde9-7827bfdea703-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kCvFkCscBPsmW8ATQuLU4Y</video:player_loc><video:duration>4675</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T18:33:38.113Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/57fqHJPmD13QMzHnRMTpW8</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/fd0c3329-f18a-43b9-80e3-04aa2f1eefb7.jpg</video:thumbnail_loc><video:title>NorthSec 2024 - Closing Ceremony</video:title><video:description>NorthSec 2024 is over!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/2143e860-7587-49a5-86df-b4b0aee114a7/fb49c635-4aa9-4726-beb4-2a32bdd7035a-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/57fqHJPmD13QMzHnRMTpW8</video:player_loc><video:duration>3135</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T19:00:45.974Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kn9DmxjWXzQWJzE2G98MzA</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/4773afe9-f4f9-4377-930d-5ab9d59ccd65.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Guillaume Ross - CTF or WTF?</video:title><video:description>This talk compares and contrasts CTF challenges, including previous NorthSec challenges, with outcomes from real-life penetration tests and security program assessments.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9cd194ae-71a2-48b4-897f-17892c8739c8/e85c5061-432c-4a73-9f14-c8f2acfc5650-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kn9DmxjWXzQWJzE2G98MzA</video:player_loc><video:duration>1620</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T19:19:43.806Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/sVkp9rZu1F6FkW9RDip9UY</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/62e181ee-9f77-4d9f-9a32-9680daf3beb3.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Robert Wood - Threat Modeling for the Gaming Industry</video:title><video:description>This talk will help you understand how issues around client-side logic, proprietary network protocols, user account management, and playing on an untrusted platform can impact the overall security and user’s experience.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d9fffae5-ad47-416f-9a78-a7cfcb388b28/d9b6340f-c408-43bc-99cd-a99f9c4c7cee-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/sVkp9rZu1F6FkW9RDip9UY</video:player_loc><video:duration>2493</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T19:39:18.360Z</video:publication_date><video:tag>threat modeling</video:tag><video:tag>gaming</video:tag><video:tag>networking</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/5gQJY4VkCkYbx2BA1KWCb9</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5b8a72b5-a202-456f-b71b-f738bcd86e71.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Joan Calvet - The Sednit Group, Cyber Espionage In Eastern Europe</video:title><video:description>In this talk we will present the Sednit group tools in details. We will also describe some of their recent campaigns, where they employed Ukraine-related topics and a custom exploit-kit to compromise their targets.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/229abfaf-edc4-439f-8a8f-3ed12101947c/9abc6524-154a-42da-911a-441c2c7b235b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/5gQJY4VkCkYbx2BA1KWCb9</video:player_loc><video:duration>2205</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T20:01:03.877Z</video:publication_date><video:tag>malware</video:tag><video:tag>espionage</video:tag><video:tag>exploitation</video:tag><video:tag>backdoor</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/uNBGeczZ7uMqEKEYuctHDD</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/24c44e3c-b14a-45b0-8401-cd4b9cea0faa.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Mathieu Lavoie - Bitcoin : Putting the "Pseudo" Back in Pseudonymous</video:title><video:description>During this talk, we will present a toolkit that, amongst other uses, makes it easier to link multiple addresses as being owned by a single user, thereby allowing you to associate address groups to a real identity using other public sources of information, and who knows, we might just be able to track down the next Silk Road…</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e94217c4-f902-4b10-9e16-feca73c94eb3/47e75b4b-b4f1-41f0-9ae4-5f69fb6c61e1-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/uNBGeczZ7uMqEKEYuctHDD</video:player_loc><video:duration>1406</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T20:16:44.715Z</video:publication_date><video:tag>bitcoin</video:tag><video:tag>pseudonimity</video:tag><video:tag>cryptocurrencies</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/abfz55T3V9JoGxeYieo2xX</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/01a2445c-3860-4be0-b61b-b54e773f3c1a.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Philippe Arteau - Breaking PRNGs</video:title><video:description>This talk will present specific vulnerabilities that made random values from popular frameworks predictable. In the end you will be able to identify vulnerable implementations and possibly exploit them !</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/4a50aa32-6fea-44ea-b371-43e6073dcac1/201414e5-8d18-4cb6-85cd-dc5a06f1ba95-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/abfz55T3V9JoGxeYieo2xX</video:player_loc><video:duration>1252</video:duration><video:rating>0</video:rating><video:view_count>7</video:view_count><video:publication_date>2025-01-25T20:27:56.351Z</video:publication_date><video:tag>prng</video:tag><video:tag>Web Application Security</video:tag><video:tag>cryptography</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/aZnD6b5DBgehbwvRDD79Qe</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/84939f95-e9fe-4c41-b709-3d2105c59e8f.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Rene Freingruber - EMET 5.2 Armor or Curtain ?</video:title><video:description>The aim of this talk is to demonstrate new and more reliable exploitation techniques as well as discussing in which situations already existing techniques can be applied in a reliable way to bypass all mitigation techniques of EMET in all versions, including the latest v5.2.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/50e4fa87-444e-4abe-ad40-bd1cdf8db12d/3bc8b514-3cca-4aa6-b2f3-cd57900929fc-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/aZnD6b5DBgehbwvRDD79Qe</video:player_loc><video:duration>3085</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T20:39:02.734Z</video:publication_date><video:tag>emet</video:tag><video:tag>exploitation</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/qbE57xMB6zP7rFveLn2wCp</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/6dc9299c-e44e-40e8-a6fa-750d7f854cd7.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Eric Evenchick - Hopping on the CAN bus</video:title><video:description>In this talk, you’ll learn how to hack your car’s Controller Area Network (CAN) bus using a new open source toolkit.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c3d83a42-3799-47e3-8995-a70691c7492f/30f4df15-0abb-441f-a12f-7a82ef372e42-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/qbE57xMB6zP7rFveLn2wCp</video:player_loc><video:duration>1970</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T20:43:19.702Z</video:publication_date><video:tag>car hacking</video:tag><video:tag>can bus</video:tag><video:tag>hardware exploitation</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/j3R6c2tC6Scqrcgui577md</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/ca7442c5-7385-461b-9ce4-89a2fa02676d.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Paul Rascagneres - The Uroburos case Analysis of the tools used by this Actor</video:title><video:description>This presentation will be about the group and the tools behind the highly complex Uroburos espionage software: recon &amp; persistence tools such as the Uroburos rootkit, Agent.BTZ (and the new version called ComRAT) and the Cobra Carbon System. It will also talk about the underlying infrastructure and the way this group was working.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/922a3c63-402a-463e-bbae-63b285314dbc/356962a8-12cd-4686-9cbf-1f4c63b7a310-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/j3R6c2tC6Scqrcgui577md</video:player_loc><video:duration>2406</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T16:23:30.599Z</video:publication_date><video:tag>Malware (Software Genre)</video:tag><video:tag>espionage</video:tag><video:tag>rootkit</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/fXS92s95vU8zyZhzunNSwC</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2b945de1-a7a2-4ad1-bd2a-3f85f8390f8b.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Eugene Rodionov &amp; Aleksandr Matrosov - OO RE with HexraysCodeXplorer</video:title><video:description>This presentation will take an in-depth look at challenges related to reversing object-oriented code with respect to modern malware and demonstrate  approaches and tools employed for reversing object-oriented code.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/792cbf59-1be5-435d-9e55-eec0037fe638/97a5b1a4-3178-4cd7-a3fb-d64dedf84f69-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/fXS92s95vU8zyZhzunNSwC</video:player_loc><video:duration>2759</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T04:26:16.111Z</video:publication_date><video:tag>malware</video:tag><video:tag>toolkit</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kcMjJN5TxoPjtG99o9tY48</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/16466a9c-be9c-4c6b-87e9-867878d7119a.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Jean Francois Cloutier &amp; Francois Gagnon - CHEKS</video:title><video:description>In this talk, we will explore these questions and demonstrate the science and technology behind the chaotic encryption key system (CHEKS). We will discuss the technical details of the concept, and how some of the properties are implemented. Then, it will be followed by a demonstration with a test, very basic chat application.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9b82bf51-c9a9-4e69-aa1d-3f165d92330d/00993e81-ed17-4e42-83e1-dedd5bc5b796-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kcMjJN5TxoPjtG99o9tY48</video:player_loc><video:duration>1800</video:duration><video:rating>0</video:rating><video:view_count>3</video:view_count><video:publication_date>2025-01-24T04:49:11.550Z</video:publication_date><video:tag>cryptography</video:tag><video:tag>Chaos Theory (Field Of Study)</video:tag><video:tag>messaging</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/vTSCNpznG61XzjyVci9mYh</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/4bc7e527-cbce-4711-96ca-1b2fe7a08967.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Chris Prince - Privacy, Surveillance &amp; Oversight</video:title><video:description>Starting with the backstory of privacy and how the U.S. and Canada came to legislate freedom from surveillance as an enshrined right, this talk will veer into the technology and economics of personal data collection with some examples of developments over the years that have altered our view of private life. Focus will then turn squarely on government surveillance practice in detail: how it is authorized, targeted, reported and reviewed under our legal framework. In the end, we will talk about the basic democratic principles that motivate the checks and controls upon surveillance – transparency, accountability, efficacy, proportionality, anonymity, etc.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f2172873-f8b1-49a8-bc68-8018fc334400/afff6af3-7510-4d92-9056-2f33f795ddd8-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/vTSCNpznG61XzjyVci9mYh</video:player_loc><video:duration>3350</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T05:15:06.038Z</video:publication_date><video:tag>privacy</video:tag><video:tag>surveillance</video:tag><video:tag>c-51</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kmxcVUnYpGfgDh6XqirjiT</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/37672075-0a14-4562-871c-708f0e2cbed2.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Olivier Bilodeau - Two Years Of Montrehack the local CTF training initiative</video:title><video:description>This talk will cover why we started Montréhack, how it works and where we want to take it. We will highlight some of the challenges we presented and share some lessons, tools and techniques we’ve learned that are applicable no matter the challenge at hand.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9cbbbdba-3587-4e70-945e-f47830284dcd/abda8dfa-b935-461a-b42a-50f9c3c69ab3-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kmxcVUnYpGfgDh6XqirjiT</video:player_loc><video:duration>1480</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T05:39:31.055Z</video:publication_date><video:tag>ctf</video:tag><video:tag>training</video:tag><video:tag>security community</video:tag><video:tag>NorthSec</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/8nFaSHMdAZe9iMhaER7PkL</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5450c60b-480c-42df-8325-bd8cfb96f7aa.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Philip Young - Why You Should (But Don't) Care About Mainframe Security</video:title><video:description>In 2012 multiple mainframes all over the world were breached. Are you shocked ? Shocked you never heard about this? Shocked that the venerable mainframe was hacked? You shouldn’t be.

What you should be more alarmed about the fact that the media didn’t cover the breaches at all! The methods used to breach these mainframes will shock and amaze you (mostly because of how easy it was).</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3bb6bab4-536f-4bf7-9c68-7e9708d84016/2370937e-b083-43f3-8527-bc1bfe240492-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/8nFaSHMdAZe9iMhaER7PkL</video:player_loc><video:duration>3258</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T05:47:08.552Z</video:publication_date><video:tag>mainframes</video:tag><video:tag>infrastructure security</video:tag><video:tag>application security</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/8gDdJQrqeYUUot9Q9hmFty</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/d466bd3f-f91b-49e7-9548-c8bdefeba933.jpg</video:thumbnail_loc><video:title>NorthSec 2015 - Dave Lewis - DDoS: Barbarians at the Gate</video:title><video:description>This talk will examine the tools, methods and data behind the DDoS attacks that are prevalent in the news headlines.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3adf1088-6fc8-4fe3-be7b-a5b6385696da/bbac1ac2-a8ff-4d1e-a55f-83de6c8a0589-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/8gDdJQrqeYUUot9Q9hmFty</video:player_loc><video:duration>2543</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T05:47:16.137Z</video:publication_date><video:tag>ddos</video:tag><video:tag>content delivery network</video:tag><video:tag>networking</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/rEpXr47rmmZygRkR5Bv7TV</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/30f3a58d-f9af-4459-9490-16180f7bfeb8.jpg</video:thumbnail_loc><video:title>Laurent Desaulniers - Stupid Pentester Tricks</video:title><video:description>https://www.nsec.io/2016/04/stupid-pentester-tricks/

Stumped in a pentest? You tried *everything* and yet have not been able to breach your target?
“Stupid Pentest Tricks” presents several dirty tricks/cheats/ways to compromise your target in *creative ways*!

Improve your ProxMark cloning skills, open doors using a universal RFID card, steal keys (no pickpocketing or impressioning skills needed), improve your phishing game and learn the mindset to cheat in a pentest. All this in a 30 minute talk.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/cfd17e35-2bff-44a7-979d-3553b9178993/88bc20b3-5447-4db1-9bc9-67f759a112df-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/rEpXr47rmmZygRkR5Bv7TV</video:player_loc><video:duration>1437</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-01-24T05:54:26.643Z</video:publication_date><video:tag>nsec16 pentesting tricks</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/9WzynxqiyZsLYTwCyUw4mW</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/23d4f7e1-810a-4474-bb1c-30f4b0e8485a.jpg</video:thumbnail_loc><video:title>Mark Stanislav - Hide Yo’ Kids: Hacking Your Family’s Connected Things</video:title><video:description>https://www.nsec.io/2016/01/hide-yo-kids-hacking-your-familys-connected-things/

This presentation will cover security research on Internet-connected devices targeting usage by, or for, children. Mark will discuss the vulnerabilities he found during this research, including account takeovers, device hijacking, backdoor credentials, unauthorized file downloading, and dangerously out-of-date protocols &amp; software. Devices discussed will include Internet-connected baby monitors, a GPS-enabled platform to track children, and even a Wi-Fi &amp; Bluetooth-connected stuffed animal. 
Details about mobile reverse engineering, hardware hacking, network traffic analysis, and other research techniques will be presented to help others learn about methods to perform their own research.

Curious about how well your privacy and safety are being taken care of by IoT vendors? Interested in IoT security research and want to understand what flaws are being found in devices today? Skip the hype-only stunt hacking and come hear Mark discuss real-world examples of issues that actively threatened the privacy and safety of the families using connected devices. After all, if it ‘takes a village to raise a child’ it’s going to take a lot of hackers to secure them in the Internet of Things.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/4867f42b-a46e-4d44-8c7f-ed0034b1871a/e2867df6-8941-4d65-86b2-7dc67e7ec23f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/9WzynxqiyZsLYTwCyUw4mW</video:player_loc><video:duration>3513</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T06:11:44.632Z</video:publication_date><video:tag>Children Toys</video:tag><video:tag>Firmware Hacking</video:tag><video:tag>IoT Security</video:tag><video:tag>nsec16</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/hei3zYk2kFPvWn55xR9dPr</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/102f02e0-067a-4143-b359-c3a2cfa454cd.jpg</video:thumbnail_loc><video:title>Eugene Rodionov &amp; Alexander Matrosov Analysis of High level Intermediate ...</video:title><video:description>... Representation in a Distributed Environment for Large Scale Malware Processing

https://www.nsec.io/2016/01/distributing-the-reconstruction-of-high-level-intermediate-representation-for-large-scale-malware-analysis/

Malware is acknowledged as an important threat and the number of new samples grows at an absurd pace. Additionally, targeted and so called advanced malware became the rule, not the exception.

At Black Hat 2015 in Las Vegas the researchers co-authored a work on distributed reverse engineering techniques, using intermediate representation in a clustered environment. The results presented demonstrate different uses for this kind of approach, for example to find algorithmic commonalities between malware families. As a result, a rich dataset of metadata of 2 million malware samples was generated.

In this work the authors will focus on analysis of the dataset extended with recent threats in a different distributed environment using data mining and machine learning tools in order to identify similarities of the code and data structures used across the malware samples. To achieve this goal a higher level abstraction of the malware code is constructed from the abstract syntax tree (ctree) provided by Hex-Rays Decompiler. That abstraction facilitates the extraction of characteristics such as object-oriented types, domain generation algorithms (DGA) and custom encryption.

As a contribution, the gathered representation together with all the raw information from the samples will be available to other researchers after the presentation; together with additional ideas for future development. The developed Hex-Rays Decompiler plugin and analysis/automation tools used to extract the characteristics will also be made available to the audience on Github.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/836d6444-3c9a-4ad6-87f6-c093441d481f/2c3cb50d-33a5-453b-b01a-b2a504856424-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/hei3zYk2kFPvWn55xR9dPr</video:player_loc><video:duration>2512</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T06:12:25.218Z</video:publication_date><video:tag>Collaboration</video:tag><video:tag>Malware Analysis</video:tag><video:tag>nsec16</video:tag><video:tag>Reverse Engineering</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/bdBTNBqf6mTm3DwQP5D6Z2</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5344fc1d-9a12-42be-ae95-08933add0f11.jpg</video:thumbnail_loc><video:title>Eric Evenchick - CANtact: An Open Tool for Automotive Exploitation</video:title><video:description>https://www.nsec.io/2016/01/cantact-an-open-tool-for-automotive-exploitation/

Controller Area Network (CAN) remains the leading protocol for networking automotive controllers. Access to CAN gives an attacker the ability to modify system operation, perform diagnostic actions, and disable the system. CAN is also used in SCADA networks and industrial control systems.
Historically, software and hardware for CAN has been expensive and targeted at automotive OEMs. Last year, we launched CANtact, an open source hardware CAN tool for PCs. This provides a low cost solution for converting CAN to USB and getting on the bus.

However, once connected to CAN, software is needed to make sense of traffic on the bus. CANtact is a new tool for this purpose. It allows the user to view CAN traffic, decode messages, and perform diagnostic actions in a graphical environment.
Existing CAN software is focused on developing systems, CANtact is designed for breaking them. The tool has been designed with reverse engineering and fuzzing in mind.

In this talk, we’ll introduce the CANtact software, provide details about its design, and explain how it can be used to perform analysis on CAN systems. We’ll also look into some of the analysis techinques that are useful for reverse engineering CAN systems.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/52be6e89-c04d-403b-8d4b-9073bd7b0b07/24078fc2-8f56-43fa-b7ce-4a65f4b7af82-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/bdBTNBqf6mTm3DwQP5D6Z2</video:player_loc><video:duration>2110</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T06:16:35.433Z</video:publication_date><video:tag>Car Hacking CAN</video:tag><video:tag>nsec16</video:tag><video:tag>SCADA</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/cTS8F9vuXmTEZFsPh78ppT</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/4a1d8c65-c7d9-4a2f-a8ce-48f9a9be57eb.jpg</video:thumbnail_loc><video:title>Etienne Martineau - Inter VM Data Exfiltration: The Art of Cache Timing Covert Channel ...</video:title><video:description>... on x86 Multi-Core

https://www.nsec.io/2016/01/inter-vm-data-exfiltration-the-art-of-cache-timing-covert-channel-on-x86-multi-core/

On x86 multi-core covert channels between co-located Virtual Machine (VM) are real and practical thanks to the architecture that has many imperfections in the way shared resources are isolated.

This talk will demonstrate how a non-privileged application from one VM can ex-filtrate data or even establish a reverse shell into a co-located VM using a cache timing covert channel that is totally hidden from the standard access control mechanisms while being able to offer surprisingly high bps at a low error rate.

In this talk you’ll learn about the various concepts, techniques and challenges involve in the design of a cache timing covert channel on x86 multi-core such as:

X86 shared resources and fundamental concept behind cache line encoding / decoding.
Getting around the hardware pre-fetching logic ( without disabling it from the BIOS! )
Abusing the X86 ‘clflush’ instruction. Bi-directional handshake for free!
Data persistency and noise. What can be done?
Guest to host page table de-obfuscation. The easy way, the VM’s vendors defense and another way to get around it.
Phase Lock Loop and high precision inter-VM synchronization. All about timers.
At the end of this talk we will go over a working VM to VM reverse shell example as well as some surprising bandwidth measurement results. We will also cover the detection aspect and the potential countermeasure to defeat such a communication channel.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/60525a48-d5a6-4a4a-97f8-2ddb21bceadd/0f84e05f-4244-45b5-9f17-1b51c47cc978-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/cTS8F9vuXmTEZFsPh78ppT</video:player_loc><video:duration>2742</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T06:18:10.773Z</video:publication_date><video:tag>Cache Timing Attacks</video:tag><video:tag>Exfiltration</video:tag><video:tag>nsec16</video:tag><video:tag>Virtualization</video:tag><video:tag>x86</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/bVMzNzAD32j4CQvq7mETsK</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/cda98020-471f-45ad-81bc-b0da33478fd9.jpg</video:thumbnail_loc><video:title>Olivier Bilodeau &amp; Hugo Genesse - Applying DevOps Principles for Better Malware Analysis</video:title><video:description>https://www.nsec.io/2016/01/applying-devops-principles-for-better-malware-analysis/

The malware battle online is far from being over. Several thousands of new malware binaries are collected by antivirus companies every day. Most organizations don’t have the expertise on staff to know if they are being targeted or if they are hit with mass-spreading malware, although knowing the difference is vital for a proper defensive strategy. 
Additionally, attackers are sharing data, expertise and they specialize; while on the defense side the competition between security companies is an obstacle to sharing. Malware analysis is a hard task and that the tools are not designed with teamwork in mind. This situation give the bad guys the upper hand.

This talk aims at changing the status quo by leveraging what we can learn and use from the DevOps community and tools. Building analysis machines is a tedious task: one must have all the proper tools installed on VM; specific version of the vulnerable software (ie: Flash), Sysinternal tools, debuggers (Windbg), network traffic analyzers (Wireshark), man-in-the-middle tools (Fiddler), and must avoid leaking their precious proprietary software licenses (IDA). At the moment, this tedious process is not automated and is repeated by every analysts. Adding insult to injury, it is common practice that the machine is archived and recreated when a new malware investigation is started.
We will demonstrate how to leverage the DevOps principle of infrastructure as code to enable researchers to build recipes that automatically creates fully operational and re-usable analysis machines with Vagrant and Packer. Recipes used at GoSecure will be made available on GitHub so that everyone can fork and customize their own whilst building on the work of others.
DevOps practices also teach about service deployment. In the context of malware analysis, service deployment applies to honeypots, sandboxes and sinkholes. We will demonstrate how you can save ti...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/587de5d7-4211-40f2-a932-9dcfaa6217ab/fd0320c7-65e1-4f03-90fd-40ca4b3f86d2-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/bVMzNzAD32j4CQvq7mETsK</video:player_loc><video:duration>1592</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T06:32:25.630Z</video:publication_date><video:tag>DevOps</video:tag><video:tag>Malware</video:tag><video:tag>nsec16</video:tag><video:tag>Virtualization</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/rkHRnemdjSYG7WUsdf13eT</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/69ef57b2-bd4b-416c-b288-d3eefcdcc79f.jpg</video:thumbnail_loc><video:title>Gabriella Coleman - How Anonymous narrowly Evaded the Cyberterrorism Rhetorical Machine</video:title><video:description>https://www.nsec.io/2016/01/keynote-how-anonymous-narrowly-evaded-the-cyberterrorism-rhetorical-machine/

Anonymous–the masked activists who have contributed to hundreds of political operations around the world since 2008–were perfectly positioned to earn the title of cyberterrorists. In this talk I consider the various factors that allowed them to narrowly escape this designation.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/cd3563ca-9b06-4299-aee6-b4f1b8a42e4d/b8b72b88-b038-46e9-a9a8-26b718119861-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/rkHRnemdjSYG7WUsdf13eT</video:player_loc><video:duration>3228</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T06:50:06.258Z</video:publication_date><video:tag>Anonymous</video:tag><video:tag>Cyberterrorism</video:tag><video:tag>nsec16</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/mYjhNKJv1anbmH66KejWHA</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0aba5115-3125-458c-be19-1ab332e4dd21.jpg</video:thumbnail_loc><video:title>Sophia D’Antoine - Practical Uses of Program Analysis: Automatic Exploit Generation</video:title><video:description>https://www.nsec.io/2016/01/practical-uses-of-program-analysis-automatic-exploit-generation/

Practical uses of program analysis will be presented and explained. Including Instrumentation, Symbolic and Concolic Execution, both in theory, in practice, and tools for each type. Specifically, this talk will show how to automatically generate an exploit against a complex, stand­alone application.
We show how to traverse program control flow to collect path constraints and solve for a desired execution. This process can then be applied to targeting generalized behavior in a program or finding known vulnerability characteristics. A demonstration will conclude the talk by solving an obfuscated ‘crackme’ challenge using the various methods described in the talk. A tool will be published alongside a white paper and the power point.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a9d3b21e-f90c-42f0-893a-be60ddda1644/05118f0e-7114-4b1b-9191-2d792c83472c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/mYjhNKJv1anbmH66KejWHA</video:player_loc><video:duration>2218</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T06:43:18.106Z</video:publication_date><video:tag>CFA</video:tag><video:tag>Exploitation</video:tag><video:tag>nsec16</video:tag><video:tag>Reverse Engineering</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/iK7W12GHnhjeYAKJMXnugs</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b47db1ce-7827-4fb8-91ad-bbc26dc02424.jpg</video:thumbnail_loc><video:title>René Freingruber - Bypassing Application Whitelisting in Critical Infrastructures</video:title><video:description>https://www.nsec.io/2016/01/bypassing-application-whitelisting-in-critical-infrastructures/

Application whitelisting is a concept which can be used to further harden critical systems such as server systems in SCADA environments or client systems with high security requirements like administrative workstations. It works by whitelisting all installed software on a system and after that prevent the execution of not whitelisted software. This should prevent the execution of malware and therefore protect against advanced persistent threat (APT) attacks. In this talk we discuss the general security of such a concept and what holes are still open for attackers. After explaining different general bypass techniques the techniques will be shown in practice by bypassing McAfee’s application control. This includes different techniques to bypass the application whitelisting to achieve code execution, bypass read- and write-protections as well as a discussion on user account control (UAC) bypasses on such protected systems. Moreover the security of the memory corruption protections will be discussed. At the end some product related design flaws and vulnerabilities will be presented.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/8fb09c59-41bb-4366-a713-d992f97d1448/4e2172b8-f5d6-4d16-9faf-cd65274d6ab2-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/iK7W12GHnhjeYAKJMXnugs</video:player_loc><video:duration>2982</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T06:50:28.189Z</video:publication_date><video:tag>APT</video:tag><video:tag>Bypass Whitelisting</video:tag><video:tag>Exploitation</video:tag><video:tag>nsec16</video:tag><video:tag>Pentesting</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/weJWcgpsqc5RqVUVHGcgyq</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/edb486d7-10b7-4a06-be6b-1bef79a59225.jpg</video:thumbnail_loc><video:title>Philippe Arteau - The New Wave of Deserialization Bugs</video:title><video:description>https://www.nsec.io/2016/01/the-new-wave-of-deserialization-bugs/

Recently, there have been several deserialization bugs released. In 2015, many Java softwares – including WebLogic, Jenkins and JBoss – were found vulnerable because of a common bug pattern. This talk will present the risk associated with deserialization mechanism and how it can be exploited. While a fix is available for some of the known vulnerable applications, your enterprise might be maintaining a proprietary application that is at risk. 
A tool will be presented to identify the vulnerable pattern. This vulnerability can be applied to any languages. Other examples will be given for PHP and Python.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f4dd49be-880c-4f67-bda7-07498628338c/0d647374-dc64-4016-8566-75ff1c979080-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/weJWcgpsqc5RqVUVHGcgyq</video:player_loc><video:duration>1903</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T06:50:54.002Z</video:publication_date><video:tag>Application Security</video:tag><video:tag>Deserialization</video:tag><video:tag>Java</video:tag><video:tag>nsec16</video:tag><video:tag>PHP</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kgFCdbgQTYebc1ePJSc6iC</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8a7c8751-cd72-47b9-a75a-9e36b80ff1a8.jpg</video:thumbnail_loc><video:title>Miroslav Stampar - Android: Practical Introduction into the (In)Security</video:title><video:description>https://www.nsec.io/2016/01/android-practical-introduction-into-the-insecurity/

This presentation covers the user’s deadly sins of Android (In)Security, together with implied system security problems. Each topic could potentially introduce unrecoverable damage from security perspective. Both local and remote attacks are covered, along with accompanying practical demo of most interesting ones.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9c0e35df-4650-43a1-9ccb-2b1397efdb0a/6d134a87-a3c1-4f54-ad1b-c60f2b54257e-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kgFCdbgQTYebc1ePJSc6iC</video:player_loc><video:duration>2930</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T07:08:19.514Z</video:publication_date><video:tag>Android</video:tag><video:tag>Mobile Security</video:tag><video:tag>nsec16</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/1RPGe4JAogvcTvdGu6bQZG</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/6c4acb43-b5c3-4981-a9a1-bd3ee63d2101.jpg</video:thumbnail_loc><video:title>Lex Gill - Law, Metaphor and the Encrypted Machine</video:title><video:description>https://www.nsec.io/2016/04/law-metaphor-encrypted-machine/

Encryption technology raises unavoidable and ideologically loaded problems for courts—as recent cases like the FBI v Apple debate have bluntly illustrated. This tension has meant a real risk of shortsighted policy decisions that both jeopardize our civil liberties and compromise commercial interests. We all have a stake in the outcome of these debates, but the legal arguments are normally murky… at best.

Judges reason through analogy and metaphor, using conceptual bridges to transition between old and new technologies in the law. But when new technologies inherit old metaphors, they also inherit old rules, models and limitations. So how do courts and lawmakers think about the encrypted machine—and how should they?

This talk explores the metaphors we use to imagine, describe and legislate modern encryption technology — and offers a few thoughts about the ones we might want to choose. Together, we’ll examine the historical model of encryption as “weapon,” alongside competing and interdependent narratives of encryption as tool, speech, computation, translation and right.

So what “is” the encrypted device to the law? A locked box? An untranslatable book? Something else entirely? More importantly, what might the legal implications of that choice be for issues of procedural fairness, the criminal law, national security or human rights?</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/06f4d640-3aee-49f7-ac82-ce2de7abcf32/9f63c6f6-d0fe-4c42-9dfa-32891183ef2d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/1RPGe4JAogvcTvdGu6bQZG</video:player_loc><video:duration>2355</video:duration><video:rating>0</video:rating><video:view_count>6</video:view_count><video:publication_date>2025-01-24T07:12:43.712Z</video:publication_date><video:tag>encryption</video:tag><video:tag>law</video:tag><video:tag>nsec16</video:tag><video:tag>privacy</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wN3BpmpZ13YRZpFZP3hfGS</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/dc94d37f-6fb7-4f03-91a3-3bea532ce27e.jpg</video:thumbnail_loc><video:title>Jake Sethi Reiner - Security Problems of an Eleven Year Old and How to Solve Them</video:title><video:description>https://www.nsec.io/2016/01/security-problems-of-an-eleven-year-old-and-how-to-solve-them/

This presentation will focus on the security problems faced by many eleven year olds, including protecting online accounts, securing your devices against siblings, circumventing parental restrictions, etc., and will present some potential solutions to these problems.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f95ffb5f-be0f-4241-bf8c-1fa6e435b8fa/6f5348f1-8930-40d3-a13e-1bca4167c583-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wN3BpmpZ13YRZpFZP3hfGS</video:player_loc><video:duration>452</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T07:12:15.321Z</video:publication_date><video:tag>InfoSec</video:tag><video:tag>Learning</video:tag><video:tag>nsec16</video:tag><video:tag>Youth</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/pGrwyfYZ8jx5bqvPMLxoi1</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/175a5dad-8aba-449b-94f5-10f5a588ebbb.jpg</video:thumbnail_loc><video:title>Guillaume Ross &amp; Jordan Rogers - Real Solutions From Real Incidents: Save Money and Your Job!</video:title><video:description>https://www.nsec.io/2016/01/real-solutions-from-real-incidents-save-money-and-your-job/

This talk will cover scenarios from real incidents and how simple solutions that are very cost effective can be used to prevent them from occurring.

A scenario based on real incidents will be presented.
The typical state of security in enterprise will be presented.
Specific gaps that allowed the incident to occur and for data to be exfiltrated will be scrutinized.
For each observation, a review of how enterprises are protecting themselves, successfully or not, as well as what can be done to potentially prevent the incident from occurring in the first place will be performed.

The presentation will conclude with a discussion on the importance of incident response lessons learned being leveraged to further guide decisions related to security program development.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/bfe7abe4-058b-4464-a780-3aad37a8f5ea/4e96886b-dd56-4c68-a85b-bb7c415db349-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/pGrwyfYZ8jx5bqvPMLxoi1</video:player_loc><video:duration>3423</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T07:32:18.811Z</video:publication_date><video:tag>DFIR</video:tag><video:tag>Enterprise Security</video:tag><video:tag>nsec16</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/dPj2aPUsPrYPuWLqZVTpTR</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2d897ec3-a3a3-42e6-ad09-82dddc82967b.jpg</video:thumbnail_loc><video:title>Masashi Crete Nishihata &amp; John Scott Railton - Not Safe For Organizing...</video:title><video:description>... The state of targeted attacks against civil society

https://www.nsec.io/2016/04/not-safe-organizing-state-targeted-attacks-civil-society/



Groups that work to protect human rights and civil liberties around the world are under attack by the many of the same attackers who target industry and government. These groups and organizations have far fewer resources to defend themselves, yet the stakes of the attacks are often much higher. This talk will give an update on the state of affairs, emphasizing two cases drawn from CItizen Lab’s recent work: attacks against the Tibetan community, and the Packrat group in Latin America.

The Tibetan community has been targeted for over a decade, and is engaged in a longstanding cat and mouse game with well-resourced attackers. Packrat is an attack group active for over eight years in several Latin American countries, and mixes malware and credential theft with large scale disinformation operations to target journalists, human rights campaigners, and politicians. Both cases have hallmarks of state sponsorship. We will begin by giving a window into victims and targets, discussing how they attempt to secure themselves, and the consequences of the attacks for their communities. Then we will pivot to describing attackers’ Tactics, Techniques and Procedures (TTPs), focusing on technologies, and social engineering strategies. We’re going to wrap up by highlighting where we see the trend of attacks going (new technologies, new tactics, larger scale), and speak to what you can do as security researchers to help, without quitting your day job.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/67c8b9f7-47d2-4b5a-bf50-49234c3a52e3/39c115cc-cd28-4d5b-a970-b1e6e0ec2d04-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/dPj2aPUsPrYPuWLqZVTpTR</video:player_loc><video:duration>2706</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T07:30:32.159Z</video:publication_date><video:tag>APT</video:tag><video:tag>government</video:tag><video:tag>Malware</video:tag><video:tag>nsec16</video:tag><video:tag>surveilance</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/x95r26n9hgzRcVqMACmoPn</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/91f271c7-b89f-424b-8ee9-2b8592ca2217.jpg</video:thumbnail_loc><video:title>Jackson Thuraisamy &amp; Jason Tran - Hacking POS PoS Systems</video:title><video:description>Hackers try to find the easiest ways to achieve the most impact. When it comes to credit card fraud, compromising Point of Sale (PoS) systems is the latest trend. The presenters will share their experience on how attackers can exploit both technical and policy gaps to breach organizations. This talk will cover approaches to physical security, kiosk breakouts, and the extraction of sensitive data. It’s laced with real-life examples, including a detailed discussion of recently disclosed critical vulnerabilities in Oracle’s hotel management platform.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/fc2bfac3-40d8-414c-8baf-306f1f7f70b3/ac4240b7-35e8-4323-9a01-9113cc153331-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/x95r26n9hgzRcVqMACmoPn</video:player_loc><video:duration>2276</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T07:59:05.694Z</video:publication_date><video:tag>Point-of-sales</video:tag><video:tag>security</video:tag><video:tag>PCI-DSS</video:tag><video:tag>Oracle</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ey7MDcVvqHgbmHRBtFawQb</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/6a307a11-5162-4957-a850-a6f7a4c42144.jpg</video:thumbnail_loc><video:title>Thomas Pornin -  BearSSL: SSL For all Things</video:title><video:description>BearSSL is a novel SSL/TLS library optimised for constrained systems, aiming at small code footprint and low RAM usage. The talk is about presenting the library in its context, and delving into what makes a good SSL implementation and how BearSSL does it.

Talk structure:
– Why SSL?
– Why yet another SSL library?
– Project goals: secure, embeddable, modular, extensible, pedagogical
– Secure crypto
– Default suite choices
– Constant-time implementations
– Catalog of SSL attacks and defences
– Implementing in fixed, small RAM
– Streaming vs buffering
– The T0 story
– X.509 certificate validation
– Why SSL sucks and how to fix it</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6dc2c92a-c9a4-4f7c-baac-9cd21fc5a41a/a5c96d00-5348-4099-8df8-ae9bdffa8664-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ey7MDcVvqHgbmHRBtFawQb</video:player_loc><video:duration>3883</video:duration><video:rating>0</video:rating><video:view_count>201</video:view_count><video:publication_date>2025-01-24T08:12:09.870Z</video:publication_date><video:tag>ssl</video:tag><video:tag>tls</video:tag><video:tag>bearssl</video:tag><video:tag>openssl</video:tag><video:tag>cryptography</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/vJ7BK5opXjkx9w3EM2ijR1</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5922b46e-df69-42ec-9f9c-8c60139b4c5a.jpg</video:thumbnail_loc><video:title>Richard Thieme - The Impact of Dark Knowledge and Secrets on Security and Intelligence Professionals</video:title><video:description>KEYNOTE: Playing Through the Pain: The Impact of Dark Knowledge and Secrets on Security and Intelligence Professionals

Dismissing or laughing off concerns about what it does to a person to know critical secrets does not lessen the impact on life, work, and relationships of building a different map of reality than “normal people” use. One has to calibrate narratives to what another believes. One has to live defensively, warily. This causes at the least cognitive dissonance which some manage by denial. But refusing to feel the pain does not make it go away. It just intensifies the consequences when they erupt.
Philip K. Dick said, reality is that which, when you no longer believe in it, does not go away. When cognitive dissonance evolves into symptoms of traumatic stress, one ignores those symptoms at one’s peril. But the very constraints of one’s work often make it impossible to speak aloud about those symptoms, because that might threaten one’s clearances, work, and career. And whistle blower protection is often non-existent.

The real cost of security work and professional intelligence goes beyond dollars. It is measured in family life, relationships, and mental and physical well-being. The divorce rate is as high among intelligence professionals as it is among medical professionals, for good reason – how can relationships be based on openness and trust when one’s primary commitments make truth-telling and disclosure impossible?
One CIA veteran wrote: “I was for a while an observer to the Personnel Management working group in the DO. I noted they/we were obscenely proud of having the highest rates of alcoholism, adultery, divorce, and suicide in the US Government. I personally have 23 professional suicides in my mental logbook, the first was an instructor that blew his brains out with a shotgun when I was in training. The latest have tended to be senior figures who could not live with what they knew.”
Richard Thieme has been around that space for years. He has ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f0ba563e-75ba-4dfc-b1d1-c6f2220472fa/cfd85dc5-bee1-445a-8335-e5a005bdfa25-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/vJ7BK5opXjkx9w3EM2ijR1</video:player_loc><video:duration>3383</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T08:33:22.175Z</video:publication_date><video:tag>Keynote</video:tag><video:tag>Dark Knowledge</video:tag><video:tag>intelligence</video:tag><video:tag>security</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/gbx33HHtWN8v58zAzNy6UF</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/22e2936f-16fe-422c-a250-e0efcca9ddb3.jpg</video:thumbnail_loc><video:title>Dimitry Snezhkov - Abusing Webhooks for Command and Control</video:title><video:description>You are on the inside of the perimeter. And maybe you want to exfiltrate data, download a tool, or execute commands on your command and control server (C2). Problem is – the first leg of connectivity to your C2 is denied. Your DNS and ICMP traffic is being monitored. Access to your cloud drives is restricted. You’ve implemented domain fronting for your C2 only to discover it is ranked low by the content proxy, which is only allowing access to a handful of business related websites on the outside.

We have all been there, seeing frustrating proxy denies or triggering security alarms making our presence known.
Having more choices when it comes to outbound network connectivity helps. In this talk we’ll present a technique to establish such connectivity with the help of HTTP callbacks (webhooks). We will walk you through what webhooks are, how they are used by organizations. We will then discuss how you can use approved sites as brokers of your communication, perform data transfers, establish almost real-time asynchronous command execution, and even create a command-and-control communication over them, bypassing strict defensive proxies, and even avoiding attribution.

Finally, we’ll show the tool that will use the concept of a broker website to work with the external C2 using webhooks.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7af1a4ce-9ac9-42fb-95c9-8b6504407f23/2a355293-cab5-45e2-baa6-c71efaca59c7-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/gbx33HHtWN8v58zAzNy6UF</video:player_loc><video:duration>1490</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-01-24T08:42:10.148Z</video:publication_date><video:tag>webhooks</video:tag><video:tag>cnc</video:tag><video:tag>web</video:tag><video:tag>security</video:tag><video:tag>exploitation</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/aZCz64bF6KA6j9gbcJ2qW8</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/e656f452-0525-4a39-be39-140e6f5f462e.jpg</video:thumbnail_loc><video:title>Laurent Desaulniers - Stupid RedTeamer Tricks</video:title><video:description>Who said that you need to be elite to be a good red teamer?

This presentation focuses on simple, easy hacks that can change the result of a red team assessment.

The 30 minute talk will cover improvements on the age old classic of dropping usb keys (35% increase in payload delivery!); how to reduce your C&amp;C discoverabiltiy; techniques for leveraging Outlook against your victim to improve social engineering and other very simple tricks. By the end of the presentation, audience should be inspired to build upon techniques discussed in the talk and feel more confident in doing red team engagements.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/50ee2e20-62b3-4f9e-9c60-a5ad7db4204b/b7efc3a9-7970-4801-9992-3562050e5682-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/aZCz64bF6KA6j9gbcJ2qW8</video:player_loc><video:duration>1285</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T08:56:27.086Z</video:publication_date><video:tag>pentesting</video:tag><video:tag>read team</video:tag><video:tag>tricks</video:tag><video:tag>security</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/amXNqyiX9Pw1CCaWmjnR5k</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/9a39c779-e5a3-44b6-9be2-1bc3047187c7.jpg</video:thumbnail_loc><video:title>Paul Rascagneres - Modern Reconnaissance Phase by APT – Protection Layer</video:title><video:description>The Talos researchers are no stranger to APT attacks. During recent research, we observed how APT actors are evolving and how the reconnaissance phase is changing to protect their valuable 0-day exploit or malware frameworks. During the presentation, we will not speak about a specific malware actor but we will use various different cases to illustrate how the reconnaissance phase is becoming more important and more complex.
This talk will mainly focus on the usage of malicious documents (Microsoft Office and Hangul Word Processor) and watering hole attacks designed to establish if the target is the intended one. We will mention campaigns against political or military organizations targeting USA, Europa and Asia.

The techniques and the obfuscation put in place by these actors will be described in detail. We will explain how the Macros are used and how to desobfuscated them; how the JavaScript and the PowerShell are becoming unmissable languages and how to analyse these languages with standard debugger such as WinDBG or x64dbg; how APT actors includes Flash objects in document to bypass protection and perform reconnaissance on the target; finally, we will see how Python language is used by malware to execute code on MacOS. In some cases, the reconnaissance is performed directly by a first stage malware (PE32) and not directly by the infection vector, we will see an example of the approach that targeted South Korea public sectors at the end of December.
At the end of the presentation, we will show different mitigations in applications (for example in Microsoft Office and Hangul Word Processor) and in the Microsoft Windows Operating System to help attendees protect their constituents against the treats described during the talk.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/4bcf82f5-9e3c-4067-ad0d-647af80521c7/bc97ec4f-f7f0-468d-bf5d-fa3635ea487e-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/amXNqyiX9Pw1CCaWmjnR5k</video:player_loc><video:duration>2051</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T09:04:15.844Z</video:publication_date><video:tag>malware</video:tag><video:tag>security</video:tag><video:tag>reconnaissance</video:tag><video:tag>apt</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/h7WjEjTE1H8ZmeLq7HKm6s</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/e4b9e13a-8081-447a-a149-80e7a8146ddf.jpg</video:thumbnail_loc><video:title>Shawn Marriott - Data Science Tools and Techniques for the Blue Team</video:title><video:description>Every year organizations generate more data, and security teams are expected to make sense of not just a greater volume of data from the myriad of log sources that exist in corporate environments, but new sources of logs and data as well. In this talk we look at the data scientist methodology and some of the statistical and machine learning techniques available to defenders of corporate infrastructure. After explaining the strengths and weaknesses of the different techniques we will walk through analyzing some data and spend some time explaining the python code and what would be needed to scale the code from analyzing hundreds of thousands of data points to tens of millions. This is not a talk about SIEM, and related technologies. SIEM is good at collecting logs to a central location and performing on the fly inspection and correlations, but rarely has the ability to engage in deeper statistical analysis, or employ machine learning techniques.
A white paper, slides and code will be prepared for this presentation.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/828a287b-df91-463a-9f4e-3f1aed76cb14/f2ddeef6-c6e4-4db7-b2e6-32626c098e3b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/h7WjEjTE1H8ZmeLq7HKm6s</video:player_loc><video:duration>2374</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T09:20:28.368Z</video:publication_date><video:tag>blue team</video:tag><video:tag>security</video:tag><video:tag>data science</video:tag><video:tag>machine learning</video:tag><video:tag>big data</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/xpEcKi8ZnybdpeeqeD2iD2</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3816fafd-1464-4b26-9f2f-56ca405f557d.jpg</video:thumbnail_loc><video:title>Charles F. Hamilton - Don’t Kill My Cat</video:title><video:description>The purpose of this presentation is to introduce a tool and the idea behind it. This tool evades antivirus, sandboxes, IDS/IPS using one simple technique. In a nutshell it abuses of polyglot files and compact low level obfuscation using assembly. The target system can then execute the payload using various vectors: powershell or Windows’ executable.

The obfuscated payload can be pretty much everything from classic meterpreter, empire payload and cobalt strike beacon to DLLs and executables. There is no limit, since the tool offers a loader that can deobfuscate an executable in memory and execute it or simply execute shellcode.

Then end goal of that tool was to provide a simple way to evade as many security layers as possible in a single payload instead of using multiple techniques to target each layer of security. This is a must have for pentesting when your target relies on multiple security products!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/fe58f2c4-9ac9-4b43-89c2-0a982be81fdf/85d9d086-4d20-4b66-9708-e630d8c95d7b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/xpEcKi8ZnybdpeeqeD2iD2</video:player_loc><video:duration>1620</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T09:24:25.385Z</video:publication_date><video:tag>pentesting</video:tag><video:tag>security</video:tag><video:tag>obfuscation</video:tag><video:tag>encoding</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/uAYab8ySLkjT2mUwWdgRVu</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a92325b8-344e-4d92-8639-5e30d1751375.jpg</video:thumbnail_loc><video:title>Masarah Paquet-Clouston &amp; Olivier Bilodeau - Attacking Linux Moose Unraveled an Ego Market</video:title><video:description>For this talk, a criminologist and a security researcher teamed up to hunt a large-scale botnet dubbed Linux/Moose that conducts social media fraud. Linux/Moose has stealth features and runs only on embedded systems such as consumer routers or Internet of Things (IoT) devices. Using honeypots set up across the world, we managed to get virtual routers infected to learn how this botnet spread and operated. We performed a large-scale HTTPS man-in-the-middle attack on several honeypots over the course of several months decrypting the bots’ proxy traffic. This gave us an impressive amount of information on the botnet’s activities on social networks: the name of the fake accounts it uses, its modus operandi to conduct social media fraud and the identification of its consumers, companies and individuals.

This presentation will be of interest to a wide audience. First, it will present the elaborate methodology we used to infect custom honeypots with Linux/Moose and led to contributions to the open-source Cowrie Honeypot Project. Second, it will describe the technical details behind the man-in-the-middle attack conducted to decrypt the traffic. The talk will further increase its draw by placing the botnet’s activities within a larger-scope: the illicit market for social media fraud. With the data gathered from the decrypted traffic and open-source research, market dynamics behind the sale of social media fraud will be presented, allowing an overview of the botnet’s potential profitability. Overall, this research elevates the standards of botnet studies as it not only investigates how a botnet is built, but also what drives it.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e7a1c784-cd7c-42d5-97a4-17410a047c5a/dbc0896c-a420-42e3-8fcd-2e113f2302eb-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/uAYab8ySLkjT2mUwWdgRVu</video:player_loc><video:duration>2503</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T09:43:10.584Z</video:publication_date><video:tag>linux/moose</video:tag><video:tag>botnet</video:tag><video:tag>ego market</video:tag><video:tag>security</video:tag><video:tag>instagram</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/pTyCR1qJXgxiedZEirC5Q3</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/037f4d92-2da8-40e8-a593-0867eb171496.jpg</video:thumbnail_loc><video:title>Chris Prince - How Surveillance Law was Expanded in Canada, What the Media has Reported, What’s Next</video:title><video:description>This talk will provide an overview on the specific lawful access powers that came into force in Canada March 2015‎; how they are rolling out in the view of the media and the courts (e.g. the TELUS and Rogers cases), and; how the authorities intersection with S-4 and C-51 (around permissions for information-sharing). Some highlights from the recent ‎submission on rights and security around lawful access, encryption and hacking tools will also be covered.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c1753bcf-f601-4b47-844c-85271553d142/33869418-f275-4f99-9d69-225c4ffd2b95-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/pTyCR1qJXgxiedZEirC5Q3</video:player_loc><video:duration>1420</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T09:39:06.100Z</video:publication_date><video:tag>privacy</video:tag><video:tag>surveillance</video:tag><video:tag>law</video:tag><video:tag>canada</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/791a2icYHaTTvbNr479aAD</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/7b74dbe9-6040-4c9e-a961-a8bb77f0ab15.jpg</video:thumbnail_loc><video:title>David Goulet - Deep Dive Into Tor Onion Services</video:title><video:description>Millions of people around the world use Tor every day to protect themselves from surveillance and censorship. While most people use Tor to reach ordinary websites more safely, a tiny fraction of Tor traffic makes up what overhyped journalists like to call the “Dark Web”. Tor onion services (formerly known as Tor hidden services) let people run Internet services such as websites in a way where both the service and the people reaching it can get stronger security and privacy.

The year 2004 was the first release of the onion service protocol. Over the years, as it aged, weaknesses started to appear in its design. These design flaws are a problem because people rely on onion services for many critical use cases, like metadata-free chat and file sharing, safe interaction between journalists and their sources, safe software updates, and more secure ways to reach popular websites like Facebook.

In this talk I’ll shortly present our legacy onion service, then an in-depth look of our new and improved onion service design, which provides stronger security and better scalability and a status update on the development.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/31b4e0c3-aead-4efd-b0cf-edca7b3bcddd/fe810ef0-9fac-41b4-9db7-499914f0fa20-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/791a2icYHaTTvbNr479aAD</video:player_loc><video:duration>2566</video:duration><video:rating>0</video:rating><video:view_count>5</video:view_count><video:publication_date>2025-01-24T09:48:31.931Z</video:publication_date><video:tag>Tor</video:tag><video:tag>Tor Onion Servies</video:tag><video:tag>security</video:tag><video:tag>anonymitiy</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kEZVXopB9FuK2jufYiNZP3</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/84dcbfc8-ff10-49e2-b51a-53b86bbed5dc.jpg</video:thumbnail_loc><video:title>Adam Shostack - Pentesting: Lessons from Star Wars</video:title><video:description>Everyone knows you ought to threat model, but in practical reality it turns out to be tricky. If past efforts to threat model haven’t panned out, perhaps part of the problem is confusion over what works, and how the various approaches conflict or align. This talk captures lessons from years of work helping people throughout the software industry threat model more effectively. It’s designed to help security pros, especially pen testers, all of whom will leave with both threat modeling lessons from Star Wars and a proven foundation, enabling them to threat model effectively on offense or defense.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9f4f993d-28b7-4f0a-8458-e1c72ab9496c/0c567a92-7101-4ef4-8d76-67ebccb8a9fe-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kEZVXopB9FuK2jufYiNZP3</video:player_loc><video:duration>3439</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T10:09:45.942Z</video:publication_date><video:tag>Threat modelling</video:tag><video:tag>pentesting</video:tag><video:tag>star wars</video:tag><video:tag>security</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/cKqEoodL5VNApeZgR7NS4S</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/c412f4b6-52d8-40a1-9517-460898656f47.jpg</video:thumbnail_loc><video:title>James Kettle - Backslash Powered Scanning: Implementing Human Intuition</video:title><video:description>Existing web scanners search for server-side injection vulnerabilities by throwing a canned list of technology-specific payloads at a target and looking for signatures – almost like an anti-virus. In November I released an open-source scanner that takes an alternative approach, capable of finding and confirming both known and unknown classes of injection vulnerabilities. Evolved from classic manual techniques, this approach reaps many associated benefits including casual WAF evasion, a tiny network footprint, and flexibility in the face of input filtering.


In this presentation, I’ll share with you key insights from the conception of this scanner, through development, to unleashing it on several thousand websites. Then I’ll go further and explore the offensive depth this scanner can reach, unveiling previously unseen salvos capable of automatically escalating middling vulnerabilities like HPP and JSON injection to RCE. As you might expect from a scanner designed to find high-hanging fruit, the issues it spots aren’t always easy to comprehend or exploit. I’ll show how to handle its most confounding and entertaining findings, leaving you equipped to deploy it to maximum effect, and adapt and refine it to complement your testing.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/5f24b4ac-b3e9-4a8b-890b-38e94180f658/824aba34-c679-4129-81e5-e1506badd3ec-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/cKqEoodL5VNApeZgR7NS4S</video:player_loc><video:duration>2249</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T10:04:11.192Z</video:publication_date><video:tag>burp</video:tag><video:tag>web security</video:tag><video:tag>vulnerability scanning</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7KLZYzGRs2xJdbxLND23KG</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/efa18f0a-b3ad-4fe2-bfa6-eca4e88e0f82.jpg</video:thumbnail_loc><video:title>Pierre-Alexandre Braeken - Hack Microsoft Using Microsoft Signed Binaries</video:title><video:description>Imagine being attacked by legitimate software tools that cannot be detected by usual defender tools.
How bad could it be to be attacked by malicious threat actors only sending bytes to be read and bytes to be written in order to achieve advanced attacks?
The most dangerous threat is the one you can’t see. At a time when it is not obvious to detect memory attacks using API like VirtualAlloc, what would be worse than having to detect something like “f 0xffffe001`0c79ebe8+0x8 L4 0xe8 0xcb 0x04 0x10”?
We will be able to demonstrate that we can achieve every kind of attacks you can imagine using only PowerShell and a Microsoft Signed Debugger. We can retrieve passwords from the userland memory, execute shellcode by dynamically parsing loaded PE or attack the kernel achieving advanced persistence inside any system.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/36b38bc9-a08f-4545-829c-d2cfffe24ee6/15985f43-6bd1-4329-a30d-7b662700bd8d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7KLZYzGRs2xJdbxLND23KG</video:player_loc><video:duration>2382</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T10:20:55.711Z</video:publication_date><video:tag>security</video:tag><video:tag>microsoft</video:tag><video:tag>pentest</video:tag><video:tag>shellcode</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/g4fmapxzFw5SUKvjVdiaAH</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/22819d27-01a3-4822-b2d2-486bc8f6694e.jpg</video:thumbnail_loc><video:title>Kristina Balaam - Evading Vulnerability Exploitation Through Secure Android Development</video:title><video:description>The first commercially-available Android device was released in 2008. Despite its nearly 10-year public lifespan, the OS still poses numerous security challenges. Now, as mobile becomes an increasingly popular platform for consumers, we're faced with the challenge of protecting these consumers from new, quickly evolving threats. We’ll discuss why Android security is so much more challenging for software developers compared to iOS and the web, look at the most common attack vectors for the operating system, and walk through best practices for guarding against them.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/79ed273b-333a-410c-9f53-8b90cbefcda9/e333a076-c5a2-4479-8993-e0eb7ff874f4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/g4fmapxzFw5SUKvjVdiaAH</video:player_loc><video:duration>3109</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T10:40:56.286Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/8wgpZ19oRFEG3pAqW1nxZk</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/9f71ce89-1fb1-4df4-8a5a-a6ace4473e03.jpg</video:thumbnail_loc><video:title>Danny Cooper &amp; Allan Wirth - Homeward Bound: Scanning Private IP Space with DNS Rebinding</video:title><video:description>DNS Rebinding attacks have re-entered the spotlight, largely owing to recent high-profile disclosures by Tavis Ormandy including RCE in the Blizzard Update Agent triggered from the browser. However, given the vast amount of consumer software in circulation today and the apparent frequency with which the design (anti)pattern of treating localhost as secure occurs, it is likely that many vulnerable services still exist. In this talk, we will present a set of tools we created to make performing DNS Rebinding attacks fast and easy at scale, discuss how these tools can be used to perform network reconnaissance from inside a browser, and present an opt-in “localhost census” page that uses DNS rebinding to enumerate localhost services listening for HTTP on the visitor’s computer, and adds the results to a database.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3ce9c85a-1773-4b22-8d07-7b3cdd593f61/d29ba82b-52ad-474f-85bf-254bd5fa7de4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/8wgpZ19oRFEG3pAqW1nxZk</video:player_loc><video:duration>2456</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T10:32:24.124Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/dADDPUqDd8X8LFsoEmooeu</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5acd239c-be2a-4a1e-a31a-f7e6a133b02e.jpg</video:thumbnail_loc><video:title>Silvia Väli - Only an Electron away from code execution</video:title><video:description>Over the decades, various security techniques to mitigate desktop specific vulnerabilities have been developed which makes it difficult to successfully exploit traditional desktop applications. With the rise of Electron framework, it became possible to develop multi-platform desktop applications by using commonly known web technologies. Developed by the Github team, Electron has already become amazingly popular (used by Skype, Slack, Wire, Wordpress and so many other big names), bringing adventurous web app developers to explore the desktop environment. These same developers who make the XSS to be the most common web vulnerability are now bringing the same mistakes to a whole new environment.

While XSS in the web applications is bounded by the browser, the same does not apply to Electron applications. Making the same kind of mistakes in an Electron application widens the attack surface of desktop applications, where XSS can end up being so much more dangerous.

So in this talk, I will discuss the Electron framework and the related security issues, its wonderful “features” getting me a bunch of CVE’s, possible attack vectors and the developers in the dark about these issues.

AND as Electron apps do not like to play in the sandbox, this talk will DEMO Electron applications found to be vulnerable, gaining code execution from XSS.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/660427f4-84d3-4e28-a4b7-009be3bf7c16/d7fe089f-d206-4134-9dde-204effa63369-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/dADDPUqDd8X8LFsoEmooeu</video:player_loc><video:duration>1574</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T10:44:11.360Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wZWkCRCyDQ3ZyEfKibtuQD</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/52bfe69d-67a7-43ff-99c7-553a61694c8b.jpg</video:thumbnail_loc><video:title>Stephane Graber - What are containers exactly and can they be trusted?</video:title><video:description>Everyone's talking about containers these days.

But how many actually know what they are?

Do you know there are two big families of containers and that even within those, there are countless different runtimes to set them up and manage them?

Is a VM safer than a container? What about those containers that are using VM technology for containers?

Those are all questions anyone who's dealing with containers in production should know answers to. You should be able to decide whether to use containers at all and if so, what kind of container is the best fit for your particular task.

During this presentation, we'll be going over 15 years of container technologies on Linux (10 years in mainline Linux), how the security features they're built on top have evolved and what's the current state of things. We'll be comparing application containers to system containers, actual containers to lightweight virtualization and briefly cover some of the higher level management tools that come with them and what to keep in mind when trying to keep all of that safe.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/fb090ac0-e8fd-4dc6-be39-0f4e4e98092d/1b2e54c0-cd97-4f67-b797-efbe6c58e264-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wZWkCRCyDQ3ZyEfKibtuQD</video:player_loc><video:duration>3076</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T11:04:20.619Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/fyipX3YwFf7ghQHnvuExg2</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5e88a630-5534-46d1-8816-d585aa72559b.jpg</video:thumbnail_loc><video:title>Sarah Friend &amp; Jon Maurelian - Smart contract vulnerabilities</video:title><video:description>Smart contract security is a brave, new, and sometimes terrible field. This presentation will take you through some of the most famous vulnerabilities of these first few years (from the Dao hack, to the Parity wallet vulnerabilities ... and including less-well-known but very interesting events like the DDOS attacks from late 2016). We'll explain the details of how these attacks work(ed), some of the idiosyncrasies of Ethereum, and through these examples some general principles of smart contract security.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/75e27914-9fd3-41d9-ba3a-6a2ab5a84b53/d03e856e-1816-464b-a2c9-87c36f178cd1-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/fyipX3YwFf7ghQHnvuExg2</video:player_loc><video:duration>3073</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T11:12:34.414Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/es5pCqNAkpehb2H9fj3mG2</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2e447b01-fcf8-4a84-ae1c-b274717b98ed.jpg</video:thumbnail_loc><video:title>Marc-André Labonté - The Blackbear Project</video:title><video:description>In typical enterprise networks today, ingress filtering is taken care of by firewall or similar devices. Unfortunately, the ability of devices and applications to reach the outside world is often overlooked or intentionnaly left open as Web services might need to be reacheable.

We will present a fork of an OpenSSH daemon, that is able to exploit the often loose egress filtering and maneuver around network restrictions.

Designed for more comfortable post-exploitation, it also extends regular forwarding and tunneling abilities in order to circumvent network rules that may otherwise hinder lateral movement.

In addition, it can also act as a regular SSH server listening for an incoming connection, and provides reliable interactive shell access (must be able to run top, sudo, screen, vi, etc) as opposed to crafted reverse shells or even meterpreter which allow basic commands but fail at interactive ones.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6ceadb53-9c04-44c5-94bd-d0ce240c1b91/1692a0ce-0faa-4433-8213-f00fb95953c8-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/es5pCqNAkpehb2H9fj3mG2</video:player_loc><video:duration>1659</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T11:27:58.317Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/oEirece7MFEyjjjYecB3Vh</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/31946816-3137-4055-8e0a-98ae602dfb2e.jpg</video:thumbnail_loc><video:title>Paul Rascagnères &amp; Warren Mercer -  Surprise Supplies!</video:title><video:description>Supply chain attacks are often long thought about and often overlooked in terms of how well a business prepares itself for any associated compromise or breach.

2017 has truly marked itself as 'The Year Of The Supply Chain Attack' and marked a turning point concerning supply chain attacks.

Talos was involved in two major campaigns: MeDoc compromise that paralyzed the Ukraine and CCleaner compromise that impacted a reported 2.27M consumers.

In this presentation we will first present these two cases. In both cases, we will present how the attackers modified a legitimate application and what was the result of the modification. We will explain the purpose of the attackers and the malware used against the victims.

For the MeDoc compromise, we were directly involved in the incident response and we will provide a timeline of the events to give an idea of the before, during and after picture associated with Nyetya and MeDoc.

Concerning the CCleaner compromise, we will provide some data and statistics from the attacker's database and the profiles of the targeted organizations. In a second part, we will speak globally about supply chain attacks. We will remember that it's not the first time in the history that this kind of attacks occurred and we will finally open the discussion on the future of this attacks.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/b7820ef6-ce0d-41f0-a275-aaff8bbdc3a2/e82a2cca-763f-4c1c-8a6b-0b13a2da7659-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/oEirece7MFEyjjjYecB3Vh</video:player_loc><video:duration>2781</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T11:42:34.588Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/nyjcECSyZbx7SKRAYtDsWG</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/7845fd92-020a-4afe-a69a-b75e5abad72f.jpg</video:thumbnail_loc><video:title>Olivier Arteau -- Prototype pollution attacks in NodeJS applications</video:title><video:description>Prototype pollution is a term that was coined many years ago in the JavaScript community to designate libraries that added extension methods to the prototype of base objects like "Object", "String" or "Function". This was very rapidly considered a bad practice as it introduced unexpected behavior in applications. In this presentation, we will analyze the problem of prototype pollution from a different angle. What if an attacker could pollute the prototype of the base object with his own value? What APIs allow such pollution? What can be done with it?

--

Olivier Arteau is a security researcher that works for a large financial institution. In his early day, he was a web developer and transitioned into the security field during his university. He gave in the last few years a good amount of workshop for the usergroup MontreHack and is also part of the organization of a few CTF (Mini-CTF OWASP and NorthSec).</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/ae92ede9-f209-4667-ade9-8d0ea8100b84/2f26b2d2-7729-4b3d-9dfc-c28a96f89632-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/nyjcECSyZbx7SKRAYtDsWG</video:player_loc><video:duration>1369</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T11:44:12.100Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/2o3Uu7PhMYXeqCeeKztZYi</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/ebc3de6a-4109-4d7f-b3a5-88cf6f852823.jpg</video:thumbnail_loc><video:title>Dave "gattaca" Lewis - Data Breaches: Barbarians in the Throne Room</video:title><video:description>Often defenders worry about the intangible security problems. Defenders need to concentrate their efforts defending the enterprise by focusing on the fundamentals. Too often issues such as patching or system configuration failures lead to system compromise. These along with issues such as SQL injection are preventable problems. Defenders can best protect their digital assets by first understanding the sheer magnitude that a data breach can have on an enterprise.

In this talk I review my findings after analyzing hundreds of data breach disclosures as it pertains to what went wrong.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/0b2d4ab4-59b4-4c7d-a004-8654c68f66ad/b690f4d4-7551-466e-a2f5-f740e8024ae7-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/2o3Uu7PhMYXeqCeeKztZYi</video:player_loc><video:duration>2604</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T11:57:25.426Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7ocDw5ZwR2w3L7r7SAztEC</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/89889c86-1754-4b27-ad47-31daf83a1aac.jpg</video:thumbnail_loc><video:title>Daniel Bohannon - Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)</video:title><video:description>Skilled attackers continually seek out new attack vectors and effective ways of obfuscating old techniques to evade detection. Active defenders can attest to attackers’ prolific obfuscation of JavaScript, VBScript and PowerShell payloads given the ample availability of obfuscation frameworks and their effectiveness at evading many of today’s defenses.

However, advanced defenders are increasingly detecting this obfuscation with help from the data science community. This approach paired with deeper visibility into memory-resident payloads via interfaces like Microsoft’s Antimalware Scan Interface (AMSI) is causing some Red Teamers to shift tradecraft to languages that offer defenders less visibility. But what are attackers using in the wild?

In the past year numerous APT and FIN (Financial) threat actors have increasingly introduced obfuscation techniques into their usage of native Windows binaries like wscript.exe, regsvr32.exe and cmd.exe. Some simple approaches entail randomly adding cmd.exe’s caret (^) escape character to command arguments. More interesting techniques like those employed by APT32, FIN7 and FIN8 involve quotes, parentheses and standard input.

The most interesting obfuscation technique observed in the wild was FIN7’s use of cmd.exe’s string replacement functionality identified in June 2017. This discovery single-handedly initiated my research into cmd.exe’s surprisingly effective but vastly unexplored obfuscation capabilities.

In this presentation I will dive deep into cmd.exe’s multi-faceted obfuscation opportunities beginning with carets, quotes and stdin argument hiding. Next I will extrapolate more complex techniques including FIN7’s string removal/replacement concept and two never- before-seen obfuscation and full encoding techniques – all performed entirely in memory by cmd.exe. Finally, I will outline three approaches for obfuscating binary names from static and dynamic analysis while highlighting lesser-known cmd.exe replacement binar...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/33b05f5e-dfc5-419a-bb4d-85e0cbd41214/511a61aa-8ad7-4d22-927c-62c83791238f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7ocDw5ZwR2w3L7r7SAztEC</video:player_loc><video:duration>3276</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T12:15:57.984Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/vr4WXrp6hUg9aAWxfrGy5U</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/107d6355-01da-4757-9584-2ced3568b29c.jpg</video:thumbnail_loc><video:title>Mark Mossberg - Binary analysis, meet the blockchain</video:title><video:description>Ethereum is a novel, decentralized computation platform that has quickly risen in popularity since it was introduced in 2014, and currently controls the equivalent of one hundred ten billion dollars. At its foundation is a virtual machine which executes “smart contracts”: programs that ultimately control the majority of the value transfer within the network. As with most other types of programs, correctness is very important for smart contracts. However, somewhat uniquely to Ethereum, incorrectness can have a direct financial cost, as evidenced by a variety of high profile attacks involving the loss of hundreds of millions of dollars. The error-prone nature of developing smart contracts and the increasing amounts of capital processed by them motivates the development of analysis tools to assist in automated error and vulnerability discovery.

In this talk, we describe our work towards smart contract analysis tooling for Ethereum, which focuses on a modern technique called symbolic execution. We provide context around both Ethereum and symbolic execution, and then discuss the unique technical challenges involved with combining the two, touching on topics including blockchains, constraint solvers, and virtual machine internals. Lastly, we present Manticore: an open source symbolic execution tool which we have used to enhance smart contract security audits.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/ee590c52-5d16-41a8-897f-c016593c4dec/9474f91a-a042-4d62-b9d3-913e8eb6f2b4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/vr4WXrp6hUg9aAWxfrGy5U</video:player_loc><video:duration>3125</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T12:12:03.502Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/f4yAgR2avNWGwKgM56cBtQ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/08f4b6c7-b42e-4ecc-8f5c-14ae636777ac.jpg</video:thumbnail_loc><video:title>Sebastien Larinier (sebdraven) - Python and Machine Learning</video:title><video:description>Machine learning can be useful for helping analysts and reverse engineers. This presentation will explain how to transform data to use machine-learning algorithms to categorize a malware zoo. To cluster a set of (numerical) objects is to group them into meaningful categories. We want objects in the same group to be closer (or more similar) to each other than to those in other groups. Such groups of similar objects are called clusters. When data is labeled, this problem is called supervised clustering. It is a difficult problem but easier than the unsupervised clustering problem we have when data is not labeled. All our experiments have been done with code written in Python and we have mainly used scikit-learn. With the dataset the Zoo, we present how to use unsupervised algorithms on labeled datasets to validate the model. When the model is finalized, the resulting clusters can be used to automatically generate yara rules in order to hunt down the malware.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/71df41e6-0655-41f3-8649-4284c1c2a782/239dfb4e-e1a4-461b-8695-79975e397ee1-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/f4yAgR2avNWGwKgM56cBtQ</video:player_loc><video:duration>3534</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T12:37:34.836Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/g7TqzUk1W9R3U9nN4Zj3xs</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/dfceffad-a217-4c13-b012-b2cc963db4a5.jpg</video:thumbnail_loc><video:title>Laurent Desaulniers - Stupid Purple Teamer Tricks</video:title><video:description>Stupid tricks for everyone! This talk will present very simple, low tech attacks to better achieve your goals, both attack and defense. From a defense standpoint, this talk will present simple tricks to identify Responder on your network, pinpoint BurpSuite activities, block some active crimeware and other simple tricks. Offensive tricks include a very simple NAC bypass, even more physical pentesting tricks and some very simple changes to social engineering that can help a lot.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7a6f3bcd-a09f-4288-aab3-e0cc68003da8/2d7391a3-780b-45e9-920d-8c3b16bc4dea-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/g7TqzUk1W9R3U9nN4Zj3xs</video:player_loc><video:duration>1130</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T12:39:20.219Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/x7wXgPzaXn4jGYr6pg3NGF</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1eba0807-53fc-4bc8-8544-2ade2e8b8f4e.jpg</video:thumbnail_loc><video:title>Filip Kafla -- From Hacking Team to Hacked Team to…?</video:title><video:description>Hacking Team came into the spotlight of the security industry following its damaging data breach in July 2015. The leaked data revealed several 0-day exploits being used and sold to governments, and confirmed Hacking Team’s suspected business with oppressive regimes. But what happened to Hacking Team after one of the most famous hacks of recent years?

Hacking Team’s flagship product, the Remote Control System (RCS), was detected in the wild in the beginning of 2018 in fourteen countries, including those contributing to previous criticism of the company’s practices. We will present the evidence that convinced us that the new post-hack Hacking Team samples can be traced back to a single group – not just any group – but Hacking Team’s developers themselves.

Furthermore, we intend to share previously undisclosed insights into Hacking Team’s post-leak operations, including the targeting of diplomats in Africa, uncover digital certificates used to sign the malware, and share details of the distribution vectors used to target the victims. We will compare the functionality of the post-leak samples to that in the leaked source code. To help other security researchers we’ll provide tips on how to efficiently extract details from these newer VMProtect-packed RCS samples. Finally, we will show how Hacking Team sets up companies and purchases certificates for them.

--

Filip Kafka is a malware analyst at ESET's Malware Analysis Laboratory. His main responsibilities include detailed malware analyses and training new reverse engineers in the ESET Virus Lab, but his professional interests, as well as his latest research, focus on APTs. His experience as a speaker includes speaking at the Virus Bulletin conference, the AVAR conference, and at several events aimed at raising awareness about malware and computer security, presented for local universities. He also teaches a reverse engineering course at the Slovak University of Technology and the Comenius University and runs work...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/fbf4d626-dd53-4d7f-b129-75d02ece6d0f/71a9e0dd-7453-4eeb-8f3a-96de934fda10-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/x7wXgPzaXn4jGYr6pg3NGF</video:player_loc><video:duration>1145</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T12:50:11.427Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kEyohND43iGYTrW4iaiKHa</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5aa4b91e-24fb-4310-95c2-cb4c2f6f01c4.jpg</video:thumbnail_loc><video:title>Charles Hamilton - A Journey into Red Team</video:title><video:description>This talk will describe many issues that a redteamer may face during a Red Team exercise. Being stealth is one of them; avoiding detection of your lateral movements, phishing campaign and post exploitation are crucial to succeed. Over the years I've developed tools and different approaches that can be used during standard engagement and Red Team to remain stealth and move more efficiently into your victim network.

During the presentation several techniques will be described and analyzed to understand the idea behind them.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9f3fdaf7-6183-4f8c-a93d-67c9e68ca0f7/db1ae94a-ab63-464a-a600-13c08dd5177f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kEyohND43iGYTrW4iaiKHa</video:player_loc><video:duration>3179</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T13:13:06.542Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/hsxbh9NjC1kjEPWq4jA2Tr</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0eb866d4-808b-402f-8cf3-b6c6ee59fc58.jpg</video:thumbnail_loc><video:title>Robert Sell - Exploits in Wetware</video:title><video:description>Robert discusses his third place experience at the Defcon 2017 SE CTF and how his efforts clearly show how easy it is to get sensitive information from any organization. The 2017 Verizon report clearly shows the dramatic growth rate of social engineering attacks and Robert demonstrates how he collected hundreds of data points from the target organization using OSINT techniques. He then goes into the vishing strategy he implemented to maximize the points he collected in the 20 minute live contest. Without much effort Robert was able to know their VPN, OS, patch level, executive personal cell phone numbers and place of residence.

Robert lifts the curtain of the social engineering world by showing tricks of the trade such as the “incorrect confirmation” which is one of many methods to loosen the tongues of his marks. Robert then shows the pretexts he designed to attack companies and the emotional response each pretext is designed to trigger. By knowing these patters we can better educate our staff.

With that much information at his fingertips, how long would it take him to convince your executive to make a bank transfer? If your organization lost a few million dollars due to social engineering, who would be to blame? Are you insured for that? Who is getting fired?

Robert wraps up his talk with a series of strategies companies can take to reduce exposure and risk. He goes over current exposure, building defenses, getting on the offense and finally… a culture shift</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/8546c52d-3976-473b-8c54-aa9a8b2bd61b/9d5a2544-e1be-42ed-9aee-ebdd92856d40-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/hsxbh9NjC1kjEPWq4jA2Tr</video:player_loc><video:duration>2637</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T13:10:47.265Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/k6pRNLryRsjrPWy7Wa8BNG</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/9f935900-ac46-4216-a397-efbf941eea98.jpg</video:thumbnail_loc><video:title>Wan Mengyuan (Nevermoe) - One Step Before Game Hackers -- Instrumenting Android Emulators</video:title><video:description>Commercial Android emulators such as NOX, BlueStacks and Leidian are very popular at the moment and most games can run on these emulators fast and soundly. The bad news for game vendors is that these emulators are usually shipped with root permission in the first place. On the other hand, cheating tools developers are happy because they can easily distribute their tools to abusers without requiring the abusers to have a physical rooted device, nor do they need to perform trivial tuning for different Android OS / firmware version. However, luckily for game vendors, commercial Android emulators usually use an x86/ARM mixed-mode emulation for speed-up. As a result, a standard native hooking/DBI framework won't work on this kind of platform. This drawback could discourage the cheating developers.

In this talk, I will introduce a native hooking framework on such a kind of mixed-mode emulators. The talk will include the process start routine of both command-line applications and Android JNI applications as well as how these routines differ on an emulator. The different emulation strategies adopted by different emulators and runtime environments (Dalvik/ART) will also be discussed. Based on these knowledge, I will explain why the existing hooking/DBI frameworks do not work on these emulators and how to make one that works.

Lastly, I will present a demo of using this hooking framework to cheat a game on emulator. With this demo, I will discuss how the dark market of mobile game cheating may develop in the foreseeable future.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9a9f0e8e-00f8-4c61-96a8-c6d2b34a3868/0abdab5f-3db4-472f-bbfe-9929ee82f37f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/k6pRNLryRsjrPWy7Wa8BNG</video:player_loc><video:duration>1540</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T13:33:38.573Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7vQXpcMS4y2KBWufT3ogWo</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2485d02f-e427-4ef2-bb4b-1ee81dc68352.jpg</video:thumbnail_loc><video:title>Thaís aka barbie Moreira Hamasaki - Logic against sneak obfuscated malware</video:title><video:description>Malware is sneaky. Malicious codes are implemented to stay hidden during the infection and operation, preventing their removal and the analysis of the code. Most samples employ some sort of packing or obfuscation techniques in order to thwart analysis. Similar techniques are also used to protect digital assets from intellectual property theft.

Analysis tools help getting new insights that can be used to secure software and hardware by identifying vulnerabilities and issues before they cause harm downstream. Tools and techniques beyond standard debuggers can enhance analysts capabilities with better adaptability and automation.

This talk will give you a small taste on some practical applications of SMT solvers in IT security, investigating the theoretical limitations and practical solutions, focusing on their use as a tool for binary static analysis and code deobfuscation.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/34c1922c-3c50-486f-b9da-c0d3d1bf4f5e/5e1b2a9e-7c48-4451-87ab-fcd34bdb1cc7-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7vQXpcMS4y2KBWufT3ogWo</video:player_loc><video:duration>1294</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T13:39:52.439Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/6niwLso69MzmbN7vdJNj5C</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/cf9bd5c4-4447-43b4-92dd-fddee95e9fa6.jpg</video:thumbnail_loc><video:title>Martijn Grooten  -- Getting ahead of the elliptic curve</video:title><video:description>Elliptic curves are relatively obscure mathematical objects: you can get a PhD in maths without ever having come across them. Yet these objects play an important role in modern cryptography and as such are found in most HTTPS connections, in Bitcoin, and in a large number of other places.

To really understand elliptic curve cryptography (ECC) to the point that you can implement algorithms, you'd have to study the maths behind it. This talk assumes that you haven't studied the maths, but just want to understand what ECC is about, how is works and how it is implemented.

It will discuss how 'point addition' works and how the Elliptic Curve Diffie-Hellman algorithm is used, for example in HTTPS - and how you can find it using Wireshark. It will explain how to use elliptic curve for digital signatures and why you don't want to be like Sony when it comes to implementing them. It will discuss how ECC was used in an infamous random number generator and, finally, will take a brief look at the use of elliptic curves in post-quantum algorithms.

The goal of this talk is to keep things simple and understandable and no knowledge of maths is assumed. The talk won't make you an expert on ECC -- that would take years of studying. But it might help you understand the context a bit better when you come across them in your research. And hopefully it will also be a little bit fun.

--

Martijn Grooten is a lapsed mathematician who by chance ended up working in security - and loved it. He's spend more than a decade testing security software but his interest in security is broad and he has a weak spot for cryptography. He currently is Editor of Virus Bulletin.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/2b771db2-028a-48e7-a09f-d4e71370d724/3c09e010-c757-4dbb-8846-e58ec2b37fec-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/6niwLso69MzmbN7vdJNj5C</video:player_loc><video:duration>2730</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T13:48:13.298Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ndds5GmEh17jw2vVP7sHsV</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b983f49a-fc0a-4971-a077-5bbc73c4593f.jpg</video:thumbnail_loc><video:title>Dimitry Snezhkov -- Quick Retooling with .NET Payloads</video:title><video:description>PowerShell gave us a super-highway of convenient building blocks for offensive toolkits and operational automation. In the post offensive PowerShell world, a move in the direction of .NET implants may be a desirable option in some cases.

However, Red Teams are faced with challenges when moving automation down into managed code. Can .NET based toolkits maintain flexibility, quick in-field retooling and operational security in the face of current detection mechanisms?

We think the answer is yes.

In this talk, we will focus on quick in-field retooling and dynamic execution aspect of .NET implants as the crucial trait to overcome static defensive mechanisms.

We will dive deeper into OpSec lessons learned from dynamic code compilation. We will attempt to move beyond static nature of .NET assemblies, into reflective .NET DLR.

We will showcase on-the-fly access to native Windows API and discuss methods of hiding sensitive aspects of execution in the managed code memory.

All that, with the help of the DLRium Managed Execution toolkit we have in development.

-- 

Dimitry Snezhkov does not like to refer to himself in the third person :) but when he does he is a Sr. Security Consultant for X-Force Red at IBM, performing penetration testing, occasional Red Teaming and application security assessments.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/abc4826d-7396-43e6-9878-cea8aaca906d/3122103d-5b23-4455-80c9-de3537db959e-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ndds5GmEh17jw2vVP7sHsV</video:player_loc><video:duration>3184</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T14:02:48.855Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/pmcoP7oaheFAF6GrvCus8N</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b8ed8ac8-72cd-4d76-8fed-dcea4d1c345a.jpg</video:thumbnail_loc><video:title>Melanie Segado -- Brain Implants &amp; Mind Reading</video:title><video:description>At a certain level of technological sophistication you gain the ability to grant others read, write, and execute permissions to your brain. That ability creates a unique set of security concerns. In this talk we will discuss the current state of both brain scanning and brain stimulation technology, the practical implications of merging brains with artificial intelligence, and the role infosec can play in shaping the dystopic cyberpunk future that we’re currently careening towards. 

--

Melanie really likes brains and computers. This is why she co-founded NeuroTechX, a non-profit whose mission is to grow the global neurotechnology community. She is currently pursuing a PhD in cognitive neuroscience. Melanie spends her free time hacking on brain technology and thinking about its societal implications.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/bd141601-6da3-4daa-9dc8-795e31b2286c/02f90f8c-1cb4-449a-b5fd-4f0d91f85d20-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/pmcoP7oaheFAF6GrvCus8N</video:player_loc><video:duration>2103</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T14:06:31.542Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/1JNSzuwCiV6XpoA1jhB6Re</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/760688eb-9be4-41c2-ae4c-6b72659fa42e.jpg</video:thumbnail_loc><video:title>Karla Burnett - Ichthyology: Phishing as a Science</video:title><video:description>Many companies consider phishing inevitable: the best we can do is run training for our employees, and cross our fingers. But does phishing training actually work?

In this talk we'll cover the psychology of phishing, then walk through a series of real-world attacks conducted against a Bay Area tech company - including conversion rates for each attack, and ways in which existing protections were bypassed. We'll cover recent technological advancements in this area, then combine these with our case studies to provide evidence-based techniques on how to prevent, not just mitigate, credential phishing.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/05fa1fce-f573-4f6d-9b36-09cd99d47b93/a2d0c6ea-4967-468b-81b0-27dc466b7708-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/1JNSzuwCiV6XpoA1jhB6Re</video:player_loc><video:duration>1683</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T14:25:40.447Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/g83xqkAf1G4bxL1aYrENQo</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/4cebaadf-6738-479c-bfa8-d7f8265762c1.jpg</video:thumbnail_loc><video:title>Thomas Pornin - Non-Crypto Constant-Time Coding</video:title><video:description>Cache attacks are a class of side-channel attacks that have been used since 2005 to break implementations of cryptographic algorithms. However, they do not impact only cryptography; if a given context makes cache attacks applicable, then everything that handles confidential data is potentially vulnerable. The SGX technology offers such a context where all the code in an enclave, not only its encryption code, shall be made robust to such attacks. In this talk, we present a summary of cache attacks, SGX, and a toolkit of C functions designed to help with writing generic, non-crypto, constant-time code.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7a74da49-2a65-431c-9ea5-77777badd52e/3c85438b-69f2-440b-a9a1-28727481577c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/g83xqkAf1G4bxL1aYrENQo</video:player_loc><video:duration>1950</video:duration><video:rating>0</video:rating><video:view_count>243</video:view_count><video:publication_date>2025-01-24T14:29:25.598Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kBR5JMci7qth7o2LmZJ5MS</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/841dbe47-5dda-42c8-ae0d-cbe7112b3cef.jpg</video:thumbnail_loc><video:title>Ron Bowes - Video game hacks, cheats, and glitches</video:title><video:description>Ron built his security career in a unique way: writing cheats for video games. In highschool, while others were having fun, he was trying to find new and creative ways to confuse Starcraft.

In this presentation, he will look at some of the major hacks, cheats, and glitches in video games, from famous ones (like arbitrary code execution in Super Mario World) to obscure ones (like stacking buildings in Starcraft).

But more importantly, he will tie these into modern vulnerabilities: the Legend of Zelda "bottle glitch" is a type-confusion vulnerability, for example: similar vulnerabilities in normal software could lead to remote code execution.

This talk will bridge video game cheating with real-world security vulnerabilities, and explore the history of both!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9edeea05-d073-432e-985d-521d96e16a14/9020b2c2-d05c-4b7e-9e5f-8548eb1055ed-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kBR5JMci7qth7o2LmZJ5MS</video:player_loc><video:duration>2655</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T14:45:47.577Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/xwdePSeokaPRupj8Cz2Qh2</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/bb6c5c32-6c06-4d43-8ece-e459914d2d00.jpg</video:thumbnail_loc><video:title>Mahsa Alimardani - Tightening the Net in Iran</video:title><video:description>How do Iranians experience the Internet? Various hurdles and risks exist for Iranians and including outside actors like American technology companies. This talk will assess the state of the Internet in Iran, discuss things like the threats of hacking from the Iranian cyber army; how the government are arresting Iranians for their online activities; the most recent policies and laws for censorship, surveillance and encryption; and the policies and relationships of foreign technology companies like Apple, Twitter and Telegram with Iran, and the ways they are affecting the everyday lives of Iranians. This talk will effectively map out how the Internet continues to be a tight and controlled space in Iran, and what efforts are being done and can be done to make the Iranian Internet a more accessible and secure space.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/ff43275a-45d3-4c3a-a7ba-9eded60f51d9/7e0398b1-d079-43ad-b9fe-18ffacf4635a-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/xwdePSeokaPRupj8Cz2Qh2</video:player_loc><video:duration>3021</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T14:50:47.721Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jBNuRRSjewyaVUSXY91W6q</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/d3e593c8-414d-4950-9863-51de7a6b703c.jpg</video:thumbnail_loc><video:title>Eleanor Saitta - How to Think (About Complex Adversarial Systems)</video:title><video:description>It's possible to approach security as a series of one-off technical problems to solve in series (from either the attacker or defender perspective). While this can often help you find and fix specific bugs, it's not particularly useful for either securing or attacking an organization at scale, and tends to fail badly when you attempt to interact with humans. Everyone who works in security finds patterns in their work, and scaling up and orchestrating interactions with those patterns is a large part of how we make progress.

We rarely talk about the larger structures of these patterns, though, and, being of a practical bent, often try to turn back to practice too quickly -- hence much of e.g. the lackluster discourse around threat modeling. In this talk, I'll look into some of the things I've noticed about how to think that may be useful for security practitioners of all stripes.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/96c42ed7-e40d-4cf9-8b35-497485e4a912/33e31a97-a134-4034-a274-ac9936cf2fc5-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jBNuRRSjewyaVUSXY91W6q</video:player_loc><video:duration>2793</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T15:05:01.061Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7NvPAnZmrxM1JgeytqmTyw</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b87209e1-0d7a-4dac-a629-f993218bbaf0.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Eva Galperin – Where Do We Go From Here? Stalkerware, Spouseware etc</video:title><video:description>Where Do We Go From Here? Stalkerware, Spouseware, and What We Should Do About It

Eva Galperin is EFF's Director of Cybersecurity. Prior to 2007, when she came to work for EFF, Eva worked in security and IT in Silicon Valley and earned degrees in Political Science and International Relations from SFSU. Her work is primarily focused on providing privacy and security for vulnerable populations around the world. To that end, she has applied the combination of her political science and technical background to everything from organizing EFF's Tor Relay Challenge, to writing privacy and security training materials (including Surveillance Self Defense and the Digital First Aid Kit), and publishing research on malware in Syria, Vietnam, Kazakhstan. When she is not collecting new and exotic malware, she practices aerial circus arts and learning new languages.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/37156c46-d4b2-47e1-8d41-8ef6e25c0d8a/17410cc0-a39e-4b44-8ddd-72790d8a6236-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7NvPAnZmrxM1JgeytqmTyw</video:player_loc><video:duration>2126</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T15:14:46.332Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7wk9maG8zq7yLcLRVxx3Gw</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/e21bdefe-e85f-42e4-80af-86b01aeda998.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Arezou Hosseinzad-Amirkhizi &amp; Apurva Kumar – xRAT</video:title><video:description>xRAT: Monitoring Chinese Interests Abroad With Mobile Surveillance-ware

Arezou Hosseinzad-Amirkhizi is a security researcher and reverse engineer with experience working in different domains of security. She has discovered software vulnerabilities and leaded threat intelligence and incident response teams. Since 2017, she's been with Lookout mobile security focusing on reversing mobile malware.

Apurva Kumar is a security researcher at Lookout that spends most of her time uncovering and exposing threats as they emerge in and around the mobile space. Her work incorporates threat hunting, reverse engineering, and penetration testing. Apurva has also spoken at a number of cyber security meetups and conferences such as KW Security Meetup, DefCon416, TASK and RSA 2019.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/34d2f163-6f91-49ef-8182-65cc80d7509e/d5493442-3819-469c-943b-1b3bb0bc18c3-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7wk9maG8zq7yLcLRVxx3Gw</video:player_loc><video:duration>2911</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T15:26:22.277Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/dMErg2SoVL5zwsDErdTnvV</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/029ab633-3b09-4201-b9d7-da83485b8735.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Hugo Porcher – Wajam: From a Start-up to Massive Spread Adware</video:title><video:description>Hugo Porcher is a malware researcher at ESET. He focuses mainly on malicious softwares targeting UNIX based operating systems (especially the Apple flavour ones). His previous researches include the analysis of 21 different Linux OpenSSH backdoors families (mostly undocumented). He spoke at various conferences like Botconf, GoSec or LCA. In his free time, he enjoys sliding sports such as surfing and skiing, and expanding his knowledge in doing various projects related to program analysis and CTF challenges.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/678dd1fe-8a1d-4885-ae78-e5712cd16613/9258acc4-9d09-4e8a-812c-048c8f1855c0-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/dMErg2SoVL5zwsDErdTnvV</video:player_loc><video:duration>2067</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T15:37:10.007Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/gSBk62gnLLx38CwYXypuLK</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0f14ebbf-2e3f-4961-b5d5-6f756e20cc1f.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Kristin Del Rosso – Using Geopolitical Conflicts for Threat Hunting</video:title><video:description>Using Geopolitical Conflicts for Threat Hunting - How Global Awareness Can Enable New Surveillanceware Discoveries


Kristin Del Rosso is a member of Lookout's Threat Intelligence Team in San Francisco, where she hunts for nation state malware and targeted surveillanceware. She recently spoke at BlackHat Europe on a state-sponsored malware campaign, and continues to work with her team to map out attacker infrastructure and better understand the actors and motives behind these mobile threats. Her happy place combines history, languages and security intelligence.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/808a0a6c-84af-4973-89e4-b34f2fdd8e0b/84ce6eed-fc5f-4e17-9401-21a66bf36d96-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/gSBk62gnLLx38CwYXypuLK</video:player_loc><video:duration>1914</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T15:52:31.212Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/viYYKCa8okiPfSP9E2amAm</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3ed3c356-2d8b-44dd-b74c-ba8fbbc9ff87.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Emilien Le Jamtel &amp; Ioana-Andrada Todirica  – Trick or treat?</video:title><video:description>Trick or treat? Unveil the “stratum” of the mining pools

Emilien Le Jamtel is a security analyst for CERT-EU since 4 years, also responsible for the monitoring and hunting activities in CERT-EU.

Ioana-Andrada Todirica: I am currently working In Brussels for Computer Emergency Response Team (CERT-EU) as an IT Security Administrator. Previously I worked as an IT System Administrator for the Romanian Ministry of Defense. Passionate about Information Technology , I graduated from Technical Military Academy with a master's degree in Information Technology Security - Bucharest, Romania I was always curious about IT , but cybersecurity really caught my attention, by never letting me the chance to get bored and keep me challenged everyday. It soon became an exciting career prospect, with endless opportunities to grow and learn.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/ed5bc78b-4248-46d5-9ac3-8f4981380e50/3199314a-4a1e-4de8-92e2-b97035da07d1-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/viYYKCa8okiPfSP9E2amAm</video:player_loc><video:duration>2386</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T15:52:31.864Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7XUoDjHZjQL8j8YvdwMVAL</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/6d19f605-2b23-4a5d-b76e-01013751a4c7.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Elissa Shevinsky – What is our Ethical Obligation to Ship Secure Code?</video:title><video:description>Elissa Shevinsky is CEO of Faster Than Light, where she is building developer tools. Shevinsky previously launched Everyday Health (IPO), Geekcorps (acquired) and Brave ($35M ICO.) Her focus is on bringing security best practices earlier into the development lifecycle, and building tools to make it easier to ship secure code. Shevinsky is also the author of "Lean Out" published by OR Books.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/386506aa-d601-4e9d-9513-f12577a17cfc/5d59dcf2-6373-4dc4-be40-c7309b6e85bd-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7XUoDjHZjQL8j8YvdwMVAL</video:player_loc><video:duration>1387</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T16:05:48.103Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/h87ZijawnVW2zM27SH3Afb</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/df003ccf-1777-4d92-aae9-4fdde8f77213.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Mathieu Saulnier – The SOC Counter ATT&amp;CK</video:title><video:description>Mathieu Saulnier is a “Security Enthusiast” ©@h3xstream. He has held numerous positions as a consultant within several of Quebec’s largest institutions. For the last 6 years he has been focused on putting in place a few SOC and has specialized in detection (Blue Team), content creation and mentorship. He currently holds the title of « Senior Security Architect » and acts as “Adversary Detection Team Lead” and “Threat Hunting Team Lead” in one of Canada’s largest carrier. In the last decade, he has taken two separate sabbaticals to travel Africa and Asia.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/8290bb3c-fe40-4d22-bb18-12a6c6e4021e/1b410e13-bc3d-4d67-bff9-41854e6a7cd0-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/h87ZijawnVW2zM27SH3Afb</video:player_loc><video:duration>1800</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T16:12:55.525Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/164g2oM5HSKJ6zLLZw8wpp</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/ba9e55c4-ee29-44f0-a76d-058d71053763.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Kurtis Armour &amp; Jacob Grant – Threat hunting in the cloud</video:title><video:description>Kurtis Armour – We help architect and deploy solutions to prevent, detect and respond to security incidents. I work on the Field CTO Team at eSentire Inc.


Jacob Grant is a Security Strategist at eSentire, a Cambridge, Ontario based Managed Detection and Response services company.

Jacob has worked within the MDR space for over 8 years in various roles from SOC Analyst, Operations, and Professional Services. Mainly focused on security as it relates to networking, cloud services, and automation.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/00b4ba30-6e36-403a-96b2-b2f0a1d8831d/d03fc76d-9abf-45fb-b257-dc53fb6963c2-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/164g2oM5HSKJ6zLLZw8wpp</video:player_loc><video:duration>2565</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T16:25:53.785Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/3eREjUJHKEnZwqRCNTehaz</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/fbdf3e53-6c72-44e1-8038-d825af624058.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Thomas Pornin – T1: Secure Programming For Embedded Systems</video:title><video:description>Thomas Pornin is a cryptographer, author of the BearSSL library. He works as a consultant for NCC Group, as part of the Cryptography Services team.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/12218d06-8f7c-4682-af66-cf3eaf5e58e3/0e882c57-0e3e-4480-a31a-87a4806c80bc-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/3eREjUJHKEnZwqRCNTehaz</video:player_loc><video:duration>3733</video:duration><video:rating>0</video:rating><video:view_count>163</video:view_count><video:publication_date>2025-01-24T16:39:52.625Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/bT4z9fXQwii9FAa7xLcnN9</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/91112839-c7b3-41c7-822c-8b8a262f5752.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Norman Shamas – Safer Online Sex: Harm Reduction and Queer Dating Apps</video:title><video:description>Norman Shamas is a security and privacy harm reduction specialist. They work with activists globally and have a particular focus on sex workers, queer, trans*, and gender nonconforming communities. Norman works an independent consultant and is a member of Open Privacy's board of directors.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/581c8513-f684-421c-94fd-7855335d0f40/338c1bf4-fed8-4cb4-9d94-aba9c64505d6-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/bT4z9fXQwii9FAa7xLcnN9</video:player_loc><video:duration>2602</video:duration><video:rating>0</video:rating><video:view_count>4</video:view_count><video:publication_date>2025-01-24T16:52:59.522Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/qH5YiB7gJKfkeKhxAYPiiQ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b30b0388-fa2a-49be-8df3-107fa1a226e0.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Erica Portnoy – Making it easier for everyone to get Let's Encrypt certs w/ Certbot</video:title><video:description>Making it easier for everyone to get Let's Encrypt certificates with Certbot


Erica Portnoy is a technologist at the Electronic Frontier Foundation (EFF). She develops the Let's Encrypt client Certbot, which makes it easy for people who run websites to turn on https, keeping their users private and secure against network-based attackers. She writes and speaks about encryption in practice, including what people need from secure messaging providers and what the next generation of encryption in the cloud might look like. Erica also works on EFF's net neutrality project, writing technical filings and opinion pieces and organizing technologists from the networking industry to speak up for technical accuracy in policy decisions.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c817e2c0-1928-4244-99ac-894b183f5e46/5ebd7985-c935-413f-aedd-2ea9a8ebe192-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/qH5YiB7gJKfkeKhxAYPiiQ</video:player_loc><video:duration>1428</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-01-24T17:06:00.262Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/hxMFZ8tk8jr2JHtkBVwT3M</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2b00b19f-65f2-4987-9945-099ef25f58d7.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Philip Young – Mainframe Hacking in 2019</video:title><video:description>Philip Young, aka Soldier of FORTRAN, is a leading expert in all things mainframe hacking. Having spoken and taught at conferences around the world, including DEFCON, RSA, BlackHat and keynoting at both SHARE and GSE Europe, he has established himself as the thought leader in mainframe penetration testing. Since 2013 Philip has released tools to aid in the testing of mainframe security and contributed to multiple opensource projects including Nmap, allowing those with little mainframe capabilities the chance to test their mainframes. In addition to speaking, he has built mainframe security programs for multiple Fortune 100 organizations starting from the ground up to creating a repeatable testing program using both vendor and public toolsets. His hope is that through raising awareness about mainframe security more organizations will take their risk profile seriously.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/86026eb9-acb2-4e83-95f8-e0610dd703ed/06503910-dbc7-4793-b180-ecdd3b2df8fd-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/hxMFZ8tk8jr2JHtkBVwT3M</video:player_loc><video:duration>3315</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T17:13:04.267Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/6QDAMcctDGQf4bXZTAC2tP</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b8b4f448-d397-49e4-98de-c57cad0c452c.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Philippe Lamontagne – Post-Quantum Manifesto</video:title><video:description>Philippe Lamontagne completed his Ph. D. in quantum cryptography from the Universté de Montréal in 2018. Since his graduation, he has been working as a machine learning analyst at Irosoft, a Montreal based company specializing in NLP. In April 2019, he will take on the role of research officer that Canada's National Research Council.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/2f4890dc-5761-4b52-9884-422c9d0321d1/225b2795-6039-438a-86de-8bee425c5fc5-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/6QDAMcctDGQf4bXZTAC2tP</video:player_loc><video:duration>1693</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T17:20:38.023Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ao4p1EDinkvVnJZuvuJaUm</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/aba64d72-7adb-476c-b19f-76f0fbd8702a.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Yamila Vanesa Levalle – M33tfinder</video:title><video:description>Yamila Vanesa Levalle is an Information Systems Engineer, Security Researcher and Offensive Security Professional with more than 15 years of experience in Infosec. Over the years, she has discovered vulnerabilities in various applications and systems.

Yamila currently works as Security Researcher in ElevenPaths (Telefonica Cibersecurity Unit) where she specializes in offensive/defensive techniques, conducts researches, publishes articles on different information security issues and develop security tools in Python. She is an international security conferences speaker and has presented her researches at important events such as OWASP Latam Tour, Infosec UTN and Notpinkcon. She has also taught ethical hacking courses for women, CTF courses for beginners and several information security awareness and training courses and talks.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/4bf6b446-89c9-4c52-b56b-8a82d8cdab10/2eb7efde-b5bb-4c83-b643-eb9b45412c63-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ao4p1EDinkvVnJZuvuJaUm</video:player_loc><video:duration>1803</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T17:30:51.977Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/5Wz8Bq2H4CaDV1EgZxzLos</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f23875ad-725f-4b68-91b8-d806e894c43a.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Joan Calvet – The (Long) Journey to a Multi-Architecture Disassembler</video:title><video:description>Joan Calvet is (almost) a developer and (sometimes) a reverse-engineer, working on JEB decompiler since 2016. He previously worked as ESET as a malware researcher, and presented at conferences such as REcon, Hack.lu and Virus Bulletin.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/280322d4-b171-4f6b-a117-856dc24e36be/78fdb081-4297-4d3d-8af0-898b5fad73f2-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/5Wz8Bq2H4CaDV1EgZxzLos</video:player_loc><video:duration>2797</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T17:40:42.584Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/iwnFwhfiSbHAYJLTzaVrH4</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/90637290-d534-4f38-ad41-f96224f3b630.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Christian Paquin – Post-Quantum Cryptography</video:title><video:description>Post-Quantum Cryptography: today's defense against tomorrow's quantum hackers

Christian Paquin

I am a cryptography specialist in Microsoft Research’s Security and Cryptography team. I’m currently involved in projects related to post-quantum cryptography, such as the Open Quantum Safe project. I’m also leading the development of the U-Prove technology. I’m also interested in privacy-enhancing technologies, smart cloud encryption (e.g., searchable and homomorphic encryption), and the intersection of AI and security.

Prior to joining Microsoft in 2008, I was the Chief Security Engineer at Credentica, a crypto developer at Silanis Technology working on digital signature systems, and a security engineer at Zero-Knowledge Systems working on TOR-like systems.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/8de9082e-f5ef-4a8d-a8ff-2d59263d7209/655faa09-bd4e-49de-983f-840d35890af5-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/iwnFwhfiSbHAYJLTzaVrH4</video:player_loc><video:duration>1618</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T17:44:20.706Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/2PmoReKFPf8dCJmXEqXp84</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/bf3db915-4077-4ff8-a964-2047ae0cd6ad.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Chloé Messdaghi – Fixing the Internet's Auto-Immune Problem</video:title><video:description>Fixing the Internet's Auto-Immune Problem: Bilateral Safe Harbor for Good-Faith Hackers


Chloé Messdaghi: Security Researcher Advocate/PM @Bugcrowd, board member for 4 nonprofits, heads WIST SF, mentors, speaker on diversity and inclusion in InfoSec, and Drop Labels founder.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/0eb5aa00-3f3d-4b3c-bb0a-6c3ad099816d/d09947be-e66e-4ffd-9a24-3f54d310a090-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/2PmoReKFPf8dCJmXEqXp84</video:player_loc><video:duration>971</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T17:53:43.316Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/eGznaoumQiFRfTQym4czGK</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/981ac66c-6347-487c-8231-fb5cf2b2984c.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Kelly Villanueva – Hacking Heuristics</video:title><video:description>Kelly is an operator at SpecterOps. She has several years of experience improving the security posture of Fortune 500 companies through adversary simulation and detection activities. Since graduating from the University of Miami School of Business Administration, Kelly has informally continued her studies in behavioral science and economics, and she enjoys applying her abstract ideas to red team operations.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6ef11d7e-15ee-48c5-b2ef-25fbe418bd47/c8b4568a-0691-44cc-8d12-5f73d3018d3d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/eGznaoumQiFRfTQym4czGK</video:player_loc><video:duration>2713</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T18:06:04.565Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/uZnUdeztDSPG78ySVidgaX</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1908e924-4287-4d7a-a94a-fa1dda6e1a95.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Warren Mercer &amp;  Paul Rascagnères – DNS On Fire</video:title><video:description>Warren Mercer joined Talos coming from a network security background, having previously worked for other vendors and the financial sector. Focusing on security research and threat intelligence, Warren finds himself in the deep, dark and dirty areas of the Internet and enjoys the thrill of the chase when it comes to tracking down new malware and the bad guys! Warren has spent time in various roles throughout his career, ranging from NOC engineer to leading teams of other passionate security engineers. Warren enjoys keeping up to speed with all the latest security trends, gadgets and gizmos; anything that makes his life easier in work helps!


Paul Rascagnères is a security researcher within Talos, Cisco’s threat intelligence and research organization. As a researcher, he performs investigations to identify new threats and presents his findings as publications and at international security conferences throughout the world. He has been involved in security research for 7 years, mainly focusing on malware analysis, malware hunting and more specially on Advanced Persistence Threat campaigns and rootkit capabilities. He previously worked for several incident response team within the private and public sectors.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/eac2c61a-6748-4cd7-be69-ea5b603f9ced/33ce636a-0b6b-4e8b-90e4-2ffe9b917c73-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/uZnUdeztDSPG78ySVidgaX</video:player_loc><video:duration>2816</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T18:12:18.063Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/mq8zY2kXDGfdvFBEpmPsDN</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/ba164b78-62b4-416e-ac9a-6b7e063d471e.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Matt Mitchell – Cybersecurity vs the world</video:title><video:description>Matt Mitchell is a hacker,and the Director of Digital Safety &amp; Privacy, at Tactical Tech (also known as the Tactical Technology Collective). In his work there Matt leads security training efforts, curricula, and organizational security for the organization in their mission to raise awareness about privacy, provide tools for digital security, and mobilize people to turn information into action.

Matt is a well known security researcher, operational security trainer, and data journalist who founded &amp; leads CryptoHarlem, impromptu workshops teaching basic cryptography tools to the predominately African American community in upper Manhattan.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a5554c69-6e42-46a2-9e16-1b7e5278b830/93ba0aad-3e9b-4caa-a13a-b6419cfab370-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/mq8zY2kXDGfdvFBEpmPsDN</video:player_loc><video:duration>1773</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T18:27:11.452Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/8fWGNhtK3HZRcKkhjxprEt</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b3707264-6e96-4b84-b9cf-1cab90cb1935.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Louis Dion-Marcil – Cache Me If You Can: Messing with Web Caching</video:title><video:description>Louis Dion-Marcil is a consultant working for Mandiant. He specializes in offensive appsec and pentesting medium to large scale organizations. A seasoned CTF participant and sometimes finalist with the DCIETS team, he has also written challenges for various competitions. His prior research at GoSecure introduced a new class of attack, coined Edge Side Include Injection, which was presented at BlackHat and DEF CON in 2018.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3ac61877-b3b7-4eb6-a961-5f46777d3583/f9332ecd-f009-49d0-8f5b-8fe9af913592-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/8fWGNhtK3HZRcKkhjxprEt</video:player_loc><video:duration>2626</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T18:39:05.657Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/bvww3Vgcyksr8ykbD2yBdP</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f9289092-2bb5-42a8-a15f-60ad1068535b.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Yolan Romailler – One Key To Rule Them All</video:title><video:description>Yolan Romailler is a security researcher delving into (and dwelling on) cryptography, crypto coding, blockchains technologies and other fun things. He has spoken at Black Hat USA, BSidesLV, Cryptovillage and DEF CON, on topics including automation in cryptography, public keys vulnerabilities, or vulnerability research, and presented at FDTC the first known practical fault attack against the EdDSA signature scheme.
Yolan tweets as @anomalroil.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/551ac36d-0cfe-4a3c-be41-b8bb9f28a103/f3e07bde-10f2-4179-b970-5557a455d88c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/bvww3Vgcyksr8ykbD2yBdP</video:player_loc><video:duration>1820</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T18:47:04.186Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/iMRXJZebRxHkXVorLhNShp</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b2c69479-6ea2-40f8-9dd9-b856e71e03c8.jpg</video:thumbnail_loc><video:title>NorthSec 2019 – Kelley Robinson – Call Center Authentication</video:title><video:description>Kelley Robinson works on the Account Security team at Twilio, helping developers manage and secure customer identity in their software applications. Previously she worked in a variety of API platform and data engineering roles at startups in San Francisco. She believes in making technical concepts, especially security, accessible and approachable for new audiences. In her spare time, Kelley is an avid home cook and greatly enjoys reorganizing her tiny kitchen to accommodate completely necessary small appliance purchases.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/90129dd0-8d42-491f-ada4-8139db0aa2af/f8704b75-b8e3-49ea-b90e-6cfc7ca1f0a9-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/iMRXJZebRxHkXVorLhNShp</video:player_loc><video:duration>2250</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T19:04:00.803Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/rZk7WscVXvHb7trd5fQpWA</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8032efcf-0c13-4430-9526-0e7a22919061.jpg</video:thumbnail_loc><video:title>NorthSec 2020 – Christian Paquin – Stay quantum safe: future-proofing encrypted secrets</video:title><video:description>I present last year’s progress on the development of quantum-safe cryptography to protect communications susceptible to being intercepted today and decrypted later with the help of a quantum computer.

As the world prepares for the advent of quantum computers, the security community must also prepare to defend against it: most of the cryptography in used today succumb to quantum attacks. I'll present recent progress in the development of quantum-resistant cryptography, it’s (2nd round of) standardization by NIST, it’s implementation in our Open Quantum Safe project, and results from our recent experiments integrating and benchmarking it in TLS, SSH, and VPN. Last year’s work allows developers to start experimenting with post-quantum cryptography to protect encrypted data that could be recorded today and decrypted with a quantum computer within a decade; I'll conclude with guidance to help such efforts.



–
Christian Paquin – I am a crypto specialist in Microsoft Research's Security and Cryptography team. I’m currently involved in projects related to post-quantum cryptography, such as the Open Quantum Safe project. I’m also leading the development of the U-Prove technology. I’m also interested in privacy-enhancing technologies, smart cloud encryption (e.g., searchable and homomorphic encryption), and the intersection of AI and security. Prior to joining Microsoft in 2008, I was the Chief Security Engineer at Credentica, a crypto developer at Silanis Technology working on digital signature systems, and a security engineer at Zero-Knowledge Systems working on TOR-like systems.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d275a4ef-c181-4b1a-8a12-8ed69ea377fa/91e91097-c702-4147-a6c2-8993dfe07d05-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/rZk7WscVXvHb7trd5fQpWA</video:player_loc><video:duration>2158</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T19:07:36.095Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/6YCHd7hJzSZXi4ttuouGDw</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/4e5001b3-9402-4b09-8f79-8705000e2d51.jpg</video:thumbnail_loc><video:title>NorthSec 2020 – Octavia Hexe &amp; Sara-Jayne Terp  – AMITT - Adversarial Misinformation Playbooks</video:title><video:description>We describe the use of adversarial misinformation playbooks to detect and counter disinformation, and explore advances in misinfosec tooling appropriated from the infosec community.

Adversarial Misinformation Influence Tactics and Techniques (AMITT) framework is a common language for describing organized communication attacks.

Misinformation, and more nefariously disinformation, has become a hot button issue as the public and private sector struggle to contain influence operations which threaten to degrade political and social fabrics.

Using well-established information-sharing standards and tooling appropriated from the InfoSec community, we explore the use of the AMITT for the detection and disruption of influence operations. Where response to disinformation has been largely reactive, we discuss left-of-boom operational playbooks and strategies for working with disinformation at scale.


–
Octavia Hexe is a security analyst at Ubisoft Montreal where she specializes in adversary emulation and threat intelligence.

In 2019 she worked closely with the Credibility Coalition misinfosec working group to develop counters for disinformation, and to provide tooling to the AMITT community.

Octavia volunteered with the Cognitive Security Collaborative where she builds capabilities to bootstrap elf communities, provides trainings, and evangelizes the need for greater awareness of disinformation. Her recent work at Cognitive Security Collaborative includes the launch of a MISP sharing community for influence operations.


Through Cognitive Security Collaborative, Octavia recently joined the CTI League to counter COVID-19 disinformation.

Sara-Jayne “SJ” Terp is a data nerd with a long history of working on the hardest data problems she can find. Her background includes designing unmanned vehicle systems, transport, intelligence and disaster data systems with an emphasis on how humans and autonomous systems work together; developing crowdsourced advocacy tools, managing ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3065f7d3-3b98-45cf-9ee5-0e6ed52d94a0/e073a2b1-92c2-4d17-a728-38150c39bfec-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/6YCHd7hJzSZXi4ttuouGDw</video:player_loc><video:duration>2653</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T19:28:47.379Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/8aWmzrE6ezCKG8haKzLR2v</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/6c28ee65-8cde-4735-a39d-251d276b2f07.jpg</video:thumbnail_loc><video:title>NorthSec 2020  – Kelley Robinson  – Designing Customer Account Recovery in a 2FA World</video:title><video:description>This session will show how to securely accommodate account recovery when the user has 2FA enabled while minimizing account takeover and support overhead.

You've built login for your application—and even added 2FA—but what happens when a customer upgrades their phone, loses their device, or otherwise gets locked out of their account? This session will show how to accommodate account recovery when the user has 2FA enabled while minimizing account takeover and support overhead.

At Twilio, we provide a free consumer 2FA service via the Authy App. We've spent over seven years thinking about account recovery, refining the process, and designing our system to balance the support burden with necessary friction. During that time I've tracked dozens of other account recovery procedures to learn how everyone from utility companies to crypto startups attempt to re-verify identity when life happens. This talk will look at that research and outline best practices you can use depending on your industry and customer risk profile.


Security keys and app based authentication are great until the user loses the device but SMS 2FA is too insecure to use as the only account recovery mechanism. Since phone support is commonly used for account recovery, we'll highlight how to build guardrails for your call center agents to minimize costs and delight customers. You'll leave understanding the trade-offs of mechanisms for 2FA recovery (like government ID verification, forced waiting periods, security questions) and debating the value of recovery tokens.


– 

Kelley Robinson works on the Account Security team at Twilio. Previously she worked in a variety of API platform and data engineering roles at startups. Her research focuses on authentication user experience and design trade-offs for different risk profiles and 2FA channels. Kelley lives in Brooklyn, is an avid home cook, and spends too much time on Twitter (@kelleyrobinson).</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3a132970-1388-47bd-8550-c091d1f2e74b/84fa4050-0157-42ca-8e2c-d1c4e956312f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/8aWmzrE6ezCKG8haKzLR2v</video:player_loc><video:duration>2426</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T19:31:32.623Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/1ik646UmbU7EdvacAdHZo4</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/49effa80-cf6f-4a6a-99c5-f207a713c64d.jpg</video:thumbnail_loc><video:title>NorthSec 2020  – Holger Unterbrink – Dynamic Data Resolver IDA plugin</video:title><video:description>Dynamic Data Resolver IDA plugin – Extending IDA with dynamic data

This IDA Plugin is instrumenting the binary using the DynamoRIO framework. It can resolve most of the dynamic values for registers and memory locations which are usually missed in a static analysis. It can help to find jump locations e.g. call eax or interesting strings e.g. “PE” which are decoded at runtime. You can also instrument the binary in a way that it can dump interesting buffers and last but not least you have several options to patch the binary at runtime to avoid anti-analyzing functions.


The talk would first describe the basics about the DynamoRIO instrumentation framework and then the capabilities, architecture and features of the plugin, followed by a live demo. The plugin can significantly improve the analyzing time of malware samples.


–
Holger Unterbrink is working for Cisco Talos, the threat research organization of Cisco. Our goal is to find and reverse engineer new unknown malware campaigns. My team uncovered attacks like NotPetya, WannaCry, DNSpionage, SeaTurtle and many more. I am frequently presenting on internal and external conferences, for example: Microsoft Digital Crime Consortium (DCC), Google Annual RE Meeting, FIRST, ISC, 4th International Conference on Cybersecurity and Privacy Balkan, BSIDES Munich, SecIT Germany, CiscoLive and more.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/026b682d-f35c-4867-a1b7-84f1eeac9eab/51c420cc-f1bb-46b9-ac15-5eda938e91c8-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/1ik646UmbU7EdvacAdHZo4</video:player_loc><video:duration>2349</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T20:08:43.056Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/tgbVwRBQoMEgQJVtHqTXhZ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/399dce99-e16c-4905-a39b-506ae0aa37b8.jpg</video:thumbnail_loc><video:title>NorthSec 2020  – Alex Ivkin  – Practical security in the brave new Kubernetes world</video:title><video:description>Dive into a typical Kubernetes cluster by messing with the default security controls, popular sidecar containers and supporting infrastructure.

Kubernetes' broad adoption has triggered a growth of frameworks, tools and technologies supporting it. It also means a growth in the attack surface. Instead of taking Kubernetes clusters head on, learn how to do a recon on a real-world k8s cluster and the common sets of sidecar containers that it relies on. Then see what it takes to pwn ingress point, service mesh, network infrastructure, package manager and performance monitoring tools. From there, get persistence in Docker registries and images.



– 

Alex Ivkin is a director of solutions at Eclypsium, a US security company. His focus is on secure deployments of (in)secure software, including container orchestration, application security, and firmware security. Alex has two decades of security integration experience, presented at numerous security conferences, delivered trainings, holds MS in CSci, co-authored the ISACA CSXP certification and climbs mountains in his spare time.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/dcc5a1c3-4cb5-41ad-8348-a0449b15b7ed/9d2b8cad-0c3a-4a36-b03c-a9438a3ec3c7-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/tgbVwRBQoMEgQJVtHqTXhZ</video:player_loc><video:duration>2355</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T20:10:14.850Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/uzhYNwrdArwfEDo6YdLqWs</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/d02e27e6-16e5-4d13-b195-fb57418d4970.jpg</video:thumbnail_loc><video:title>NorthSec 2020 – Vitor Ventura &amp; Paul Rascagneres  – High speed fingerprint cloning: myth or reality?</video:title><video:description>During this presentation, we will explain how the democratization of resin 3D printers impacts the fingerprint cloning. And the security implications on devices such as phones, laptops or padlocks.

Fingerprint scanners have become a default feature on most mobile devices. They give users a sense of security and are usually a convenient way to unlock a mobile device.

But all of this biometric data can be a security risk. Suprema Corp. was in the news earlier this year when it was discovered the company exposed more than 1 million users’ biometric information, including fingerprints and facial recognition data. It is unclear if the data allowed attackers to reconstruct users’ fingerprints, or if any of the data was exfiltrated Still, this information was sure to be attractive to threat groups.

In July, news broke that China was installing malware on tourists’ phones. So we started to wonder how hard would it be to silently install malware into users’ devices silently.

We wanted to find out how much time is needed to go from fingerprint scanning to malware deployment on mobile devices. Could it be fast enough to be the equivalent of someone being stopped at the border having their fingerprints scanned during an interview while their devices are in the “x-ray machine”? Or would the amount of time needed to be a couple of hours? In this real-world scenario, time is only important for foreign opportunistic targets. Most country’s citizens will have their fingerprints on file, meaning that everything can be prepared in advance. Fingerprint authentication — like other biometric authentication mechanisms — has been broken before. Now that it’s grown in popularity, it’s time to test how to bypass the authentication, and more importantly, test a real-world attack scenario and the level of sophistication needed to execute it. Finally, our research showed that technology has not advanced enough to be considered generally safe. These practical attacks don’t require state-l...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e765e40a-7124-4913-8b94-b23c7645dd96/5f9bd516-57ad-457c-ab8d-46f263921f1f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/uzhYNwrdArwfEDo6YdLqWs</video:player_loc><video:duration>2423</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T20:34:57.538Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wC1A4tgFHUhQUc7NaCtMXq</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/61e8af7a-3950-41d6-8233-d064f499428d.jpg</video:thumbnail_loc><video:title>NorthSec 2020 – Jean Christophe Delaunay  – IOMMU and DMA attacks</video:title><video:description>Direct Memory Access technology allows peripherals to access RAM without relying on CPU. DMA increases performances but bring up security issues. An IOMMU was incorporated to address these concerns.

This talk presents the current knowledge on Direct Memory Access attacks aiming to unlock a user logon session. The Input Output Memory Management Unit (IOMMU)[1] functioning and its integration within the main operating systems (Windows, macOS and Linux) is firstly addressed. Then, the existing DMA attacks using an external peripheral on a switched on computer are explained with a particular focus on IOMMU bypassing on macOS until 10.12.4 version. These attacks give an access to a valid logon session even if the computer is locked. This research was performed in order to prepare the upcoming french RAPID project by Synacktiv: DMArvest.



–
Jean-Christophe Delaunay – Former pentester, I used to play a lot with Microsoft Active Directory infrastructures, both on defensive and offensive aspects at Synacktiv, a french offensive security company. I am now in the Reverse Engineering team within my company, focusing on Windows and hardware topics.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f7f94c23-99e0-42ac-9599-4d1628e1e87a/d96f51ba-fb77-489c-a423-8d96efd626f5-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wC1A4tgFHUhQUc7NaCtMXq</video:player_loc><video:duration>2053</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T20:33:34.817Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/dK5Z4NjaUySri3o8GT4zow</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f5020881-6f58-44c1-8bfa-51854b78f537.jpg</video:thumbnail_loc><video:title>NorthSec 2020 – Alyssa Miller – Look! There's a Threat Model in My DevSecOps</video:title><video:description>Threat Modeling is a crucial activity that often gets left out of DevSecOps. This session will present a fast-paced backlog-based approach that doesn’t require tools or slow down development.

What if I told you that you can bring threat modeling into a DevSecOps, CI/CD environment and that you can do it without buying another automated tool? When developers and security professionals alike think about threat modeling, all too often they become obsessed with frameworks like STRIDE, DREAD, PASTA, etc. Threat modeling is predominantly viewed as a heavy-weight, time-consuming exercise that is simply not compatible with high-paced development paradigms. As a result, as organizations shift into DevSecOps paradigms, they commonly scratch threat modeling off their Secure SDLC checklist as simply impossible to implement without breaking their DevSecOps model. They lose sight of the core purpose of threat modeling and as a result are unable to tailor an approach that fits their development lifecycle.

However, the importance of Threat Modeling cannot be understated. Recent surveys show us how effective Threat Modeling is in developing the culture of shared responsibility for security that is at the very foundation of DevSecOps. In this session, we’ll turn the misconceptions about Threat Modeling upside down. We’ll go back to the core purpose of threat modeling. We’ll discuss what components of threat modeling are most crucial, what questions we should be asking and who should be answering them. Ultimately, this will all culminate into presentation of an alternative approach to Threat Modeling. We’ll walk through the details of how to implement a backlog-based approach in any development paradigm and demonstrate how leveraging the user story can enable Threat Modeling to be done without affecting our development timelines.



–

Alyssa Miller (CISM) is a hacker, security advocate, author, professional, and public speaker with almost 15 years of experience in the security i...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6731b7ab-72b2-446b-9c00-957575912326/af3fffb4-03c4-4d1b-869f-86b6b353cb95-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/dK5Z4NjaUySri3o8GT4zow</video:player_loc><video:duration>2500</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-24T20:57:27.502Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/t5oLACEVuHRsQ3AJhDB3QK</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/84096d4b-8a5b-4730-b8cc-aa0ad076d10e.jpg</video:thumbnail_loc><video:title>NorthSec 2020  –  Philippe Arteau – Unicode vulnerabilities that could byͥte you</video:title><video:description>Transformation of Unicode characters can lead to various side effects. In this talk, you will learn why normalization and capitalization can be misused and affect modern applications.

The number of Unicode code points has never stopped growing just like its integration in modern technologies. Web applications you have developed or used are likely to support input and output formatted in UTF-8 character encoding.

In this talk, you will learn about the security implications of encoding conversion. Normalizing a UTF-8 string to ASCII only character has numerous potential side effects. The latest research affecting Unicode will be summarized including the HostSplit and HostBond attacks. The HostSplit attack abuses minor characters conversion to trigger open redirect or Server-Side Request Forgery (SSRF). While HostBond is a risk affecting service provider giving subdomain to account created by users. Aside from normalization, uppercase and lowercase transformation can introduce vulnerability. Encoding can be used to circumvent security controls such as Web Application Firewalls. Punycode is the new representation to support domains with special characters outside of ASCII. This representation can be used to create visual confusion to end users.


While some issues were patched in major software, many risks remain or are likely to resurface. Get ready for a complete summary of everything security professionals should know about Unicode!


– 

Philippe Arteau is a security researcher working for GoSecure. His research is focused on Web application security. His past work experience includes pentesting, secure code review and software development. He is the author of the widely used Java static analysis tool OWASP Find Security Bugs (FSB). He is also a contributor to the static analysis tool for .NET called Security Code Scan. He built many plugins for Burp and ZAP proxy tools: Retire.js, Reissue Request Scripter, CSP Auditor and many others. Philippe has presented at...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/db43c030-a9c3-414e-8069-990a38b0639b/67eb68a6-783e-459a-b08c-ea19ea8b0d48-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/t5oLACEVuHRsQ3AJhDB3QK</video:player_loc><video:duration>2502</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T21:00:37.370Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jzVfPvGFGVosi4Y61nsBMR</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/9d931b2f-27b7-4f75-81d2-92ee2141d9d0.jpg</video:thumbnail_loc><video:title>NorthSec 2020  – Etienne Maynier – Defending Human Rights in the Age of Targeted Attacks</video:title><video:description>In this talk, we will see what type of attacks are targeting Human Rights Defenders, how they evolved over the past years and how we are trying to respond to these attacks at Amnesty International.

Since 2010 and the Aurora attacks, the infosec community has largely improved the skills, methods and tools available to protect large organizations against targeted attacks by well-resourced adversaries. The same tools and methods are not available to Human Rights Defenders (HRDs) yet we have ample evidence that they face the exact same attacks from the same groups.

Human Right Defenders very often have a hard threat model : little resources, limited technical skills and a high risk of being targeted by different forms of surveillance. The latest expensive security middle-box won’t help here, and they may be infected by a malware listed in your favorite threat feed without them knowing.

Within Amnesty International we have been doing technical investigations on these attacks and tracking several attack groups targeting HRDs for a few years. We are seeing some trends into these attacks, for instance more and more of them targeting smartphones, but also a wider gap between technical levels. We have developed new tools to help identify phishing emails (such as PhishDetect) or easing forensic investigations during research mission (focusing more on live forensic than cold forensic).


In this talk, we will share technical details of malware and phishing attacks against HRDs, from low/medium level of sophistication in Pakistan to highly technical attacks in Morocco, and we will see how these attacks are evolving today. We will talk about the challenges of investigating such attacks and the solutions we are developing within Amnesty International to identify and block them. Finally, we’ll see how people in the infosec community can help supporting HRDs


– 

Etienne Maynier is a security researcher and activist working in the Amnesty Tech team on digital surveillance of ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9680dc33-6c00-4326-8f7d-8ab934eba0ef/fe3616ac-5259-44e9-a9cd-ec7ddc623692-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jzVfPvGFGVosi4Y61nsBMR</video:player_loc><video:duration>2250</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T21:22:24.406Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7WRFzSYhmNbTQtoEsmsw5F</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/c83b35d8-170b-4b88-b0d5-8ca5efc176d0.jpg</video:thumbnail_loc><video:title>NorthSec 2020 – bx – Regions are types, types are policy, and other ramblings</video:title><video:description>Compilers and interpreters make use of *types* to ensure a degree of semantic sanity. I will describe how *types* can be used outside this narrow paradigm to apply policies across address spaces.

Semantically related objects often get grouped together in memory, and it is about time we take advantage of this in developing software hardening measures. Types can be naturally assigned to regions of memory in a flexible manner. Such types can form the basis of a practical and intelligible access control policy. This observation allowed me to retroactively harden an instance of the U-Boot bootloader, to model the bootloader's intentions and build an access control policy that mediated its behavior.


Typed region-based hardening measures can be applied to other kinds of software to not only protect against low-level memory vulnerabilities but also to help protect and address high-level logic-based attacks (i.e., instances of weird machines).


–
bx enjoys tinkering with systems in undocumented manners to find hidden sources of computation. She has previously studied the weird machines present in application linkers and loaders, publishing some nifty PoC along the way, but has since turned her focus towards the kinds of loaders that bootstrap systems. bx is currently a senior security researcher at Narf Industries.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/383f9d0b-a6eb-4116-b19d-3921a0d8b657/75eea5af-cc30-42c8-84ee-6126333f0c6f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7WRFzSYhmNbTQtoEsmsw5F</video:player_loc><video:duration>2412</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T21:31:22.933Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/2oWnHqB7UbocNWNZ7ajrae</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/fff2b3e8-2b2a-4ce7-8b69-fd9e9caa5887.jpg</video:thumbnail_loc><video:title>NorthSec 2020 – Yehuda Lindell – Path to Software-Defined Cryptography via Multi-Party Computation</video:title><video:description>The Path to Software-Defined Cryptography via Multi-Party Computation

Exploring applied cryptography (Secure Multi-Party Computation) as an enabler of innovation, growth, and risk aversion in enterprise key management and protection.

Imagine a scenario where data is only kept on hard drives or disks you own. Welcome to 1999. Back then, cryptographic keys were secured only by hardware - that, for the most part, worked well. In 2019, hardware is still standard – even with the widespread adoption of cloud services and critical data stored on IoT devices. So why are we stuck in the past? This presentation will explore: • Why hardware fails when faced with rapid changes e.g. development process, regulation, and new security and privacy needs • The future of cryptography – as software-defined • Multi-party computation (MPC) for flexible, scalable key management



– 

Prof. Yehuda Lindell is a professor at Bar-Ilan University in Israel and the CEO of Unbound Tech. Yehuda attained his Ph.D. at the Weizmann Institute of Science in 2002 and spent two years at the IBM T.J. Watson research lab as a Postdoctoral fellow in the cryptography research group. Yehuda has carried out extensive research in cryptography, and has published over 100 conference and journal publications, as well as one of the leading undergraduate textbooks on cryptography. Yehuda has presented at numerous international conferences, workshops and university seminars, and has served on program committees for top international conferences in cryptography. In addition to Yehuda's notable academic work, he has significant industry experience in the design and deployment of cryptography in a wide variety of scenarios.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/0b4d02d1-29f3-4e0b-a8c3-254a692cddfb/3a461da6-862f-4535-a199-014ae61391d8-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/2oWnHqB7UbocNWNZ7ajrae</video:player_loc><video:duration>3094</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T21:51:21.480Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/1gY4CWU8BopLH2mbDTWDmQ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/6f7b72da-a250-4118-96d7-eb5f7b74aa22.jpg</video:thumbnail_loc><video:title>NorthSec CTF Closing Ceremony</video:title><video:description>NorthSec CTF Closing Ceremony</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/023ab4d7-fe56-4b8d-8416-855ae9e5ad2c/8707597b-8f4a-445b-9f92-2fe7ad9ed8f0-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/1gY4CWU8BopLH2mbDTWDmQ</video:player_loc><video:duration>1184</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T21:48:05.861Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/8zedWaKdyRUqRW3sdZ2GQD</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/9f0c8b19-3403-4413-9093-bbe8174a4d6a.jpg</video:thumbnail_loc><video:title>CTF Designers Interview</video:title><video:description>CTF Designers Interview</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3d53a9fb-6936-45d2-bcd5-30141821b65d/6a11ac49-ff81-4567-b5cf-e45a09058e39-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/8zedWaKdyRUqRW3sdZ2GQD</video:player_loc><video:duration>1135</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T21:59:04.103Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/qrX6n2V4bhidzkVS3a7fEA</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/92d7d7f6-02f4-4361-910a-e55a473b9a5f.jpg</video:thumbnail_loc><video:title>NorthSec CTF 2021 Theme</video:title><video:description>NorthSec CTF 2021 Theme</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c5fadfc0-0b24-4f17-b155-18d2655c6876/50225f89-619a-41b0-a4bb-fc2592333db8-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/qrX6n2V4bhidzkVS3a7fEA</video:player_loc><video:duration>105</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T22:07:06.989Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/d8ia5gkLmDeUrnjJwd5UbJ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/408142ea-12c1-4b1f-b322-16e185098b66.jpg</video:thumbnail_loc><video:title>NorthSec 2021 Conference Organizers Interview</video:title><video:description>NorthSec 2021 Conference Organizers Interview</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6232717e-d843-4143-97c8-b3e23806065e/108ee894-0ce2-40c3-8877-3996b3e8ee77-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/d8ia5gkLmDeUrnjJwd5UbJ</video:player_loc><video:duration>697</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T22:12:37.589Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/tueT5YjZntvZbrZuVs3D8q</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/cfb51468-f3f3-4790-92eb-047834d06d83.jpg</video:thumbnail_loc><video:title>#DoWeLookLikeHackers</video:title><video:description>Video made by Rhiz Guendouz from Aresaphrodite for NorthSec &amp; GoSecure for the #DoWeLookLikeHackers Contest
Music by kornevmusic: https://elements.envato.com/fr/inspirational-techno-BTWME4J</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/de981fac-1198-494c-9608-7cf384114872/e3abd166-234f-4802-a24c-d4d559299839-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/tueT5YjZntvZbrZuVs3D8q</video:player_loc><video:duration>100</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T22:09:27.902Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/p9ZHMbAcf3Lc7X6SfsDPBu</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/87aca4df-afad-484e-ba99-3e9846c7a83f.jpg</video:thumbnail_loc><video:title>NSEC2021 - Ange Albertini - You're not an idiot</video:title><video:description>Ever thought that something isn't right? That you don't belong? That you're not worth it? No, you're not the only one, and no, you're not an idiot. Let's see that together.

Slides are available here: https://speakerdeck.com/ange/you-are-not-an-idiot

-
Ange Albertini is a reverse engineer and file format expert, single father of three and currently Infosec engineer at Google.

-
Want to be part of the 2022 edition? Submit a talk at https://cfp.nsec.io !</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/bb83b5f4-1459-4a68-b59a-3bba223ae7ce/aa41f96e-f0bc-4a42-bf29-6a39a97af3bd-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/p9ZHMbAcf3Lc7X6SfsDPBu</video:player_loc><video:duration>1627</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T22:25:03.486Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/h4znbtjsQe5gaAWkMYQ6iJ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/43859308-63dc-470d-81ed-88de49f6cd0d.jpg</video:thumbnail_loc><video:title>NSEC2021 - Mansi Sheth - Cryptography Do's and Don't in 2021</video:title><video:description>Do you feel unequipped to understand real world crypto attacks? Are you overwhelmed with the over-abundance of choices provided by any modern cryptography API, to make a secure decision while choosing a randomness provider, encryption scheme or digital signature APIs? Are you on top of all the latest happenings in cryptographic communities, to know which cryptographic primitives is deemed broken? Due to sheer lack of documentation of the chosen API, do you feel paralyzed on where and how to start designing or analyzing any cryptographic systems?

If any of these answers are "yes", come join me in this talk. I will be going over each cryptographic primitive like Random Number Generators, Encryption/Decryption algorithms, message authentication codes, digital signatures, password storage etc. We will be discussing common crypto insecure patterns observed in real world applications, best secure practices and what to be wary of. All this based on evaluating bunch of leading cryptographic implementations while not loosing sight of future-proofing applications. This should help security architects/developers while designing their crypto applications and security practitioners while auditing these system.

-
Mansi Sheth is a Principal Security Researcher at Veracode Inc. In her career, she has been involved with breaking, defending and building secure applications. Mansi researches various languages and technologies, finds insecure usage in customer code and suggests automation measures in finding vulnerabilities for Veracode's Binary Static Analysis service. She is an avid traveller with the motto "If not now, then when?”

-
Want to be part of the 2022 edition? Submit a talk at https://cfp.nsec.io !</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/8212030b-7550-4c73-9e98-f6392b1b7b98/310ec73f-350b-4cc5-8121-16112e2946ee-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/h4znbtjsQe5gaAWkMYQ6iJ</video:player_loc><video:duration>1896</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T22:41:29.579Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/uuk3tFrQYxEc4aBFpYwLQA</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a01bc7c9-922a-411b-99a6-f0de13d95f2d.jpg</video:thumbnail_loc><video:title>NSEC2021 - Mitchell Cohen - How to harden your Electron app</video:title><video:description>Let’s be honest — when you decided to build an Electron app, it wasn’t because of the framework’s stellar reputation for security. Like so many developers before you, you weighed your options and made a practical choice. But now you have to make the best of it and protect your users and their data. Hardening your Electron app is not straightforward, but it is also not impossible. Through a combination of threat modelling, careful separation of concerns, and simply reading the docs, you can achieve the security goals for your app. This talk is about how we built a secure password manager in a framework that’s infamous for being insecure. We’ll look at how the security model for our Electron-based frontend for 1Password, what pitfalls we encountered along the way, and how you can apply what we’ve learned to your own projects. We’ll also reveal our hardened Electron starter kit and invite you to see how it works — and try to break it.
Electron and web apps may never be the first choice for security-conscious developers, but they are an industry reality. We recently faced this dilemma at 1Password when we set out to build the new Linux desktop client for our flagship password manager.

Compromising on security was not an option. At the same time, building a web app was the only practical option. Undeterred, we set out to harden Electron to meet our unique client-side requirements.

I am not going to pretend we made it all the way — no software framework ever will. But we did end up with an app we are proud to call 1Password, and to entrust with our user’s most sensitive data.

I hope to share what we learned so that others in a similar situation will have an easier time. At the same time, I invite the community to see what we’ve built and look at what we’ve gotten right — or wrong.

-
Mitchell is Product Lead at 1Password, where he specializes in delivering usable security in the browser and on the desktop. Before he joined the joined the dark side and became a softw...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e6b4718b-027c-496a-bc7c-ebbca098f102/27b18778-93f4-4ea1-b742-536778a3dd0e-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/uuk3tFrQYxEc4aBFpYwLQA</video:player_loc><video:duration>1305</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T23:16:06.587Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/cwgLJ1QRPM2bc4jTEoKATZ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1a37958e-bd42-410d-aaed-addd822b3007.jpg</video:thumbnail_loc><video:title>NSEC2021 - Dolev Farhi - Damn GraphQL - Attacking and Defending APIs</video:title><video:description>Security teams are in a never ending race against new uprising technologies. Often, these technologies are not secure by default and require deep research to defend them, ain order to succeed in balancing technology adoption with security. The challenge with new technologies is that the security knowledge and tooling may not be as mature as with older technologies. This talk will provide insight into GraphQL, a REST API alternative and focus on how to run security tests against it, as well as defend against the various possible attack vectors.
WIth the uprising of GraphQL as a technology, a query language made by Facebook, security professionals must be ready for the day GraphQL hits their company’s networks.

In this talk, we will walk through GraphQL basics, followed by a deep dive into the various GraphQL attack vectors, from Information Gathering to Denial of Service and Injections.

Additionally, we will discuss a recent security platform release - Damn Vulnerable GraphQL Application (DVGA), a platform made for security practitioners to learn GraphQL and its various weaknesses in a safe testing environment.

-
Dolev is a security engineer and author with extensive experience leading security engineering teams in complex environments and scale in the Fintech and cyber security industries. Currently, he is the Principal Security Engineer at Wealthsimple, building defences for one of the fastest Fintech companies in North America.

Dolev has previously worked for several security firms and provided training for official Linux certification tracks. He is one of the founders of DEFCON Toronto (DC416), a popular Toronto-based hacker group. In his spare time, he enjoys researching vulnerabilities in IoT devices, participating and building CTF challenges and contributing exploits to Exploit-DB.

-
Want to be part of the 2022 edition? Submit a talk at https://cfp.nsec.io !</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/5d4e8ec2-4549-4ac6-ab0c-2a8c20056127/7e9e0524-ca7d-4f1a-950e-da3129be86e4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/cwgLJ1QRPM2bc4jTEoKATZ</video:player_loc><video:duration>1605</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T23:21:27.449Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wL6JtFrqYP4t7cJvyQLzk9</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/6ea4bb2a-cbf8-4e8c-8923-f356b80acda8.jpg</video:thumbnail_loc><video:title>NSEC2021 - Discussion: Application Security</video:title><video:description>Q&amp;A and discussion for the malware block, hosted and moderated by Laurent Desaulniers Questions will be gathered from the audience during the four prior talks.

-
Laurent is the Director of Penetration Testing for GoSecure. He has conducted over 400 pentesting and red team engagements over the span of 10 years and is still enthusiastic about it. Laurent is also a challenge designer for Northsec and has given talks to RSA, CQSI, NCFTA, HackFest, RSI, Montrehack, Owasp Montreal and Northsec. Besides security, Laurent is interested in Lockpicking, magic and pickpocketing.

Indiana is a security engineer at Security Innovation who specializes in testing web applications, APIs, and cloud configurations. He has a background in web development and previously worked in telecommunications and banking, performing penetration tests and security assessments. In his spare time, he works on personal coding projects and eats copious amounts of sushi.

Dolev is a security engineer and author with extensive experience leading security engineering teams in complex environments and scale in the Fintech and cyber security industries. Currently, he is the Principal Security Engineer at Wealthsimple, building defences for one of the fastest Fintech companies in North America.

Dolev has previously worked for several security firms and provided training for official Linux certification tracks. He is one of the founders of DEFCON Toronto (DC416), a popular Toronto-based hacker group. In his spare time, he enjoys researching vulnerabilities in IoT devices, participating and building CTF challenges and contributing exploits to Exploit-DB.

Mitchell is Product Lead at 1Password, where he specializes in delivering usable security in the browser and on the desktop. Before he joined the joined the dark side and became a software developer, Mitchell followed a circuitous path through technical writing, journalism, and liberal arts. His interests span from operating systems, to UX, to linguisti...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f91a6b1a-ae60-4b2c-bd2b-776b3aae251a/5cc39c27-d34f-4c5d-a1b4-a709b438003a-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wL6JtFrqYP4t7cJvyQLzk9</video:player_loc><video:duration>1264</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T23:36:44.500Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/sD1ojvF7AwYGMABx3q79Lt</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/285926c2-bd88-4310-93c8-a4c47cac0435.jpg</video:thumbnail_loc><video:title>NSEC2021 - Cory Doctorow - Privacy Without Monopoly: Beyond Feudal Security</video:title><video:description>If our best bet for preventing the next Cambridge Analytica is to trust Facebook to defend our privacy, we are so dead. Big Tech says that we can't have interoperability because they need to be able to exclude competitors to defend us from bad guys...but what if THEY'RE the bad guys? Interoperability is fully compatible with privacy - and security through monopoly is no security at all.

-
Cory Doctorow (craphound.com) is a science fiction author, activist, and journalist. His latest book is ATTACK SURFACE, a standalone adult sequel to LITTLE BROTHER. He is also the author HOW TO DESTROY SURVEILLANCE CAPITALISM, nonfiction about conspiracies and monopolies; and of RADICALIZED and WALKAWAY, science fiction for adults, a YA graphic novel called IN REAL LIFE; and young adult novels like HOMELAND, PIRATE CINEMA and LITTLE BROTHER. His first picture book was POESY THE MONSTER SLAYER (Aug 2020). He maintains a daily blog at Pluralistic.net. He works for the Electronic Frontier Foundation, is a MIT Media Lab Research Affiliate, is a Visiting Professor of Computer Science at Open University, a Visiting Professor of Practice at the University of North Carolina’s School of Library and Information Science and co-founded the UK Open Rights Group. Born in Toronto, Canada, he now lives in Los Angeles.

-
Want to be part of the 2022 edition? Submit a talk at https://cfp.nsec.io !</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d7b85c9e-e0a0-43de-83ef-d1af1b6b3a23/b3583dbf-b2b5-458d-abf7-17d99188832c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/sD1ojvF7AwYGMABx3q79Lt</video:player_loc><video:duration>2341</video:duration><video:rating>5</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-01-24T23:43:09.028Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/5CL1z8xAmniK9RXAhZ5KZ5</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8ef83a58-a5b3-43b4-a655-bfc7d9f80265.jpg</video:thumbnail_loc><video:title>NSEC2021 - Marie-Pier Villeneuve-Dubuc - Social bots: Malicious use of social media</video:title><video:description>This research focuses on the malicious use of social media, specifically Twitter, during the 2019 Canadian Federal Election Campaign. Social-bots have often been used in the past to manipulate public discourse through disinformation campaigns aimed at committing political interference. The mixed methodological approach combining descriptive analyses with interviews is used to draw a portrait of social-bots role during this electoral campaign. A digital analysis tool called Botometer is used to find social-bots within a database initially collected in 2019 by Commissionaires du Québec. This tool makes it possible to identify the social-bots and rate them with a score from 0 (not a social-bots) to 5 (most likely a social-bots), which will then be analyzed to determine how they inserted themselves into the political discussion during the period under study. The interviews conducted with experts in the field aim to deepen and give meaning to the results obtained previously. The results show that several social-bots did not publish content in English, the tweets analyzed are mainly retweets, thousands of users have been suspended, and the hashtags used promoted the election of Liberal Justin Trudeau to the detriment of Conservative Andrew Scheer.

This talk will be about a research project that focuses on the malicious use of social media, specifically Twitter, during the 2019 Canadian Federal Election Campaign. Social-bots have often been used in the past to manipulate public discourse through disinformation campaigns aimed at committing political interference. The mixed methodological approach combining descriptive analyses (quantitative) with interviews (qualitative) is used to draw a portrait of social-bots role during this electoral campaign. A digital analysis tool called Botometer is used to find social-bots within a database initially collected in 2019 by Commissionaires du Québec. This tool makes it possible to identify the social-bots and rate them with a sc...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/258673d0-0214-4833-87fd-d6f76420682a/e06824ac-4315-4a97-83ea-85079789e40c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/5CL1z8xAmniK9RXAhZ5KZ5</video:player_loc><video:duration>1702</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-24T23:50:52.011Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jVAWpVL8FAk98HKzfw68mA</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3a32f89f-ff60-4047-80bf-8af37acd0d56.jpg</video:thumbnail_loc><video:title>NSEC2021 - Octavia Hexe and Sara-Jayne Terp - AMITT: Defensive Framework to Counter Disinformation</video:title><video:description>AMITT (Adversarial Misinformation and Influence Tactics and Techniques) is an open-source framework for describing the strategic, operational, and tactical elements of influence operations. By enabling researchers, practitioners, and policy makers to communicate their findings, AMITT is bringing together an international community to help combat disinformation.

Last year we introduced our work seeding communities and training them on the practical application of AMITT, as well as the framework's integration into free, open-source threat intelligence tools.

This year, the Cognitive Security Collaborative introduces major updates to the AMITT framework which now includes a complementary set of countermeasures to be used against adversarial influence operations.

In this talk we address some of the major disinformation events of 2020 relating to COVID-19 and the 2020 US Presidential election. Additionally, we explore the practical application of AMITT countermeasures.

-
 Octavia Hexe is a security specialist at Ubisoft and a member of Cognitive Security Collaborative. In 2020, Cognitive Security Collaborative set up the CTI League's disinformation team, and continues to work with groups around the world to bootstrap communities of disinformation responders.

Her work involves security consulting, adversary emulation, and malware development. At Cognitive Security Collaborative he researches influence operation TTPs and develops mitigation strategies for the AMITT framework, performs red team exercises, and develops trainings.

Sara-Jayne “SJ” Terp is a data nerd with a long history of working on the hardest data problems she can find. Her background includes designing unmanned vehicle systems, transport, intelligence and disaster data systems with an emphasis on how humans and autonomous systems work together; developing crowdsourced advocacy tools, managing innovations, teaching data science to Columbia’s international development students, designing probabilist...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/99407274-5bac-4577-beb1-0cdf8ac882ce/f838e0b3-5805-45cc-9af1-29f4a2860202-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jVAWpVL8FAk98HKzfw68mA</video:player_loc><video:duration>2320</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T00:08:37.915Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wjRu2VSqx8XVqcMFL6dUZi</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/bf35365c-cde0-4e99-b055-1f27b2c7e86e.jpg</video:thumbnail_loc><video:title>NSEC2021 - Discussion: Privacy, online platforms &amp; misinformation</video:title><video:description>Q&amp;A and discussion for the malware block, hosted and moderated by Lex Gill. Questions will be gathered from the audience during the four prior talks.

-
Cory Doctorow (craphound.com) is a science fiction author, activist, and journalist. His latest book is ATTACK SURFACE, a standalone adult sequel to LITTLE BROTHER. He is also the author HOW TO DESTROY SURVEILLANCE CAPITALISM, nonfiction about conspiracies and monopolies; and of RADICALIZED and WALKAWAY, science fiction for adults, a YA graphic novel called IN REAL LIFE; and young adult novels like HOMELAND, PIRATE CINEMA and LITTLE BROTHER. His first picture book was POESY THE MONSTER SLAYER (Aug 2020). He maintains a daily blog at Pluralistic.net. He works for the Electronic Frontier Foundation, is a MIT Media Lab Research Affiliate, is a Visiting Professor of Computer Science at Open University, a Visiting Professor of Practice at the University of North Carolina’s School of Library and Information Science and co-founded the UK Open Rights Group. Born in Toronto, Canada, he now lives in Los Angeles.

Octavia Hexe is a security specialist at Ubisoft and a member of Cognitive Security Collaborative. In 2020, Cognitive Security Collaborative set up the CTI League's disinformation team, and continues to work with groups around the world to bootstrap communities of disinformation responders.

Her work involves security consulting, adversary emulation, and malware development. At Cognitive Security Collaborative he researches influence operation TTPs and develops mitigation strategies for the AMITT framework, performs red team exercises, and develops trainings.

Sara-Jayne “SJ” Terp is a data nerd with a long history of working on the hardest data problems she can find. Her background includes designing unmanned vehicle systems, transport, intelligence and disaster data systems with an emphasis on how humans and autonomous systems work together; developing crowdsourced advocacy tools, managing innovations, teaching ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f5940af7-fd53-4641-b3cb-feb66e998e3b/de0e0fa3-a413-468e-919e-22f0a2e09ce4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wjRu2VSqx8XVqcMFL6dUZi</video:player_loc><video:duration>2833</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T00:15:37.775Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/vQjNLxYwFbocWyGZsQEN9k</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/92f51e65-3a57-4072-9cb1-ce504cd94e1c.jpg</video:thumbnail_loc><video:title>NSEC2021 - Pedro Ribeiro - Critical Vulnerabilities in Network Equipment: Past, Present and Future</video:title><video:description>In this talk, we will discuss common vulnerability patterns in network equipment (consumer and enterprise routers, firewalls, VPN, TLS accelerators, switches, WAF, etc). This critical infrastructure is unfortunately a lot more vulnerable than most people believe, although its security stance has improved within the last few years. We will go through the history of these vulnerabilities, why they occur and what should we expect to happen in the future, as exploit protections in these devices improve.

Routers are considered easy to hack, and that's kind of true. But is that much harder to hack a home router than an enterprise firewall? Think twice before answering!

The purpose of this talk is to demonstrate the similarities in inner workings, technology, hardware and vulnerability density between every piece of network equipment, be it for home or enterprise.

We will walk through specific examples of vulnerabilities found in these equipments in the past and present. Vulnerability patterns will be identified, and we will discuss why they keep occurring and what circumstances led to them appearing in the first place.

Finally, we will discuss future trends for vulnerabilities in network equipment. And because it can't all be negative, we will also discuss how the constant hardening of these devices will make exploitation much harder (but far from impossible :) in the future.

-
Pedro started working in security by doing ISO27001 audits. After almost dying of boredom, he jumped into penetration testing, reverse engineering and vulnerability research, focusing on embedded systems and enterprise software.

He is the Founder &amp; Director of Research at Agile Information Security, a boutique security consultancy that focuses in providing hardcore technical cyber security solutions to its clients.

In his spare time Pedro hacks hardware and software and has made public dozens of remote code execution vulnerabilities resulting in 140+ CVE, and authored 60+ Metasploit explo...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f1984fda-2c50-4ece-8e59-ae48cd0c65cb/da80bd00-011f-4227-9e82-543d4ea8ac10-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/vQjNLxYwFbocWyGZsQEN9k</video:player_loc><video:duration>1858</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T00:27:42.511Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/8CRUf9JGZkQeQ5JNKpgMgf</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/18cf5390-1b41-4842-9c3b-ffcb7c7f5ed6.jpg</video:thumbnail_loc><video:title>NSEC2021 - Yuan Stevens &amp; Stephanie Tran - See Something, Say Something?</video:title><video:description>See Something, Say Something? The State of Coordinated Vulnerability Disclosure in Canada’s Federal Government

Countries around the world like the US, the UK and the Netherlands have all adopted coordinated vulnerability disclosure (CVD) frameworks to better secure government computer systems. CVD is an approach to vulnerability disclosure that provides good faith external security researchers a procedure for disclosing security flaws. However, the topic has largely remained understudied and underutilized in the Canadian context, leaving federal government institutions potentially more vulnerable in the face of internal and external threat actors. This talk identifies best practices and the policy frameworks needed to harness the efforts of security researchers who find and disclose security flaws in Canada’s federal government software, web applications, and potentially hardware, vehicles and critical infrastructures before adversaries do.
Our research confirms that Canada is falling behind when it comes to the use of transparent and clear CVD frameworks in comparison to jurisdictions across the globe. Numerous federal laws, including criminal and copyright legislation, may also have a chilling effect on security research in Canada, with deficient whistleblowing protection laws that could otherwise protect people who disclose security vulnerabilities. Our work identifies the need for increased transparency and explicit regulation in Canada’s current approach to vulnerability disclosure at the federal level.

-
Yuan (rhymes with Suzanne) Stevens works at the intersections of law, policy, and technology with a focus on privacy and cybersecurity. She holds the position of Policy Lead on Technology, Cybersecurity and Democracy at the action-oriented think tank Ryerson Leadership Lab at Ryerson University. Her work equips society with the ability to understand and patch up harmful vulnerabilities in sociotechnical and legal systems. Based in Montréal, she is a resea...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3dd57faf-b4e6-48ee-9e11-20e22fa169f0/d9a57055-8cd9-49bc-89c9-662e0da37f93-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/8CRUf9JGZkQeQ5JNKpgMgf</video:player_loc><video:duration>1495</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T00:39:27.024Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/3RoEYYKD9f12wzBAjeS1aY</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5cbfa9c0-a628-47c1-9997-709036e5280c.jpg</video:thumbnail_loc><video:title>NSEC2021 - Jeff Dileo and Addison Amiri - dRuby Security Internals</video:title><video:description>dRuby is a "distributed object system" built into Ruby that is generally known to be insecure, but which has never been properly audited... until now. In this talk, we will discuss how dRuby works, where its insecurities lie, and how it is much more insecure than previously understood to be — which is a feat, considering that dRuby already provides code execution as a service. This talk will focus on a discussion of the dRuby API, its internals, and its underlying wire protocol, covering the security issues inherent in each along the way. As part of the this, we will also demonstrate several novel exploitation techniques that can be used against both dRuby servers and clients, the latter of which have not been known to be vulnerable until now. Following this, we will discuss some of our work to harden dRuby against each of the issues we identified. We will then close our talk by covering our work to exploit the exploits used to compromise dRuby-based services for some very ironic honeypotting.
dRuby is a "distributed object system" for Ruby (think CORBA or Java's RMI). Included in the Ruby standard library and implemented in vanilla Ruby without native extensions, it provides a simple-to-use interface to interact with Ruby objects from other Ruby processes, locally or over a network. While dRuby makes it fairly easy to expose objects and their interfaces to other processes, including those running on separate systems, it leaves a lot to be desired in terms of its security. While its own API documentation warns coyly of its insecurity with a simple-to-understand example exploit written in Ruby, the actual implementation and protocol of dRuby are not documented at all, nor are the actual risks dRuby exposes. While dRuby is well known to be a readily exploitable service enabling remote code execution, the underlying protocol exposes a number of additional risks that enable not only alternate methods of compromising dRuby services, but also the means to compromise dR...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/1717b1b9-5679-4da5-ac8f-90d4e50f2222/7c6c4599-2029-4673-a797-403d3b4dba2f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/3RoEYYKD9f12wzBAjeS1aY</video:player_loc><video:duration>2091</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T00:47:54.604Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/2WxhFu7vEmj82See3N92eJ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/83c828cb-7e4c-4aa5-a675-a8a1b0638788.jpg</video:thumbnail_loc><video:title>NSEC2021 - Ivica Stipovic - Bypassing advanced device profiling with DHCP packet manipulation</video:title><video:description>Network Access Control is a mechanism that checks security posture of a device before it is allowed access to a network. One of the oldest inspection techniques uses MAC address inspection, however, this is a trivial defence mechanism to bypass.
More advanced device profiling techniques deploy various techniques such as nmap scan , DNS inspection, DHCP inspection, SNMP checks, and OSI layer two protocols such as Cisco Discovery Protocol or Link Layer Discovery Protocol to identify the connecting device’s features. The mechanism explained in this paper is a manipulation or spoofing of DHCP packets to trick the advanced device profiling into thinking the attacking device is a legitimate one. Essentially, we are masquerading an attacking device with crafted DHCP packets so that the device appears to the inspection engine as a legitimate device. The proof of concept has been developed that allows an attacker to define the DHCP payload to mimic the fingerprint of an arbitrary device. To the best of the author’s knowledge, no such or similar tool is publicly available. Also, this is the first paper to describe in-depth a client-based DHCP attack which is neither denial of service (server starvation) nor a rogue server.

-
Ivica works as an Information Security Consultant. He tries to understand the intricacies of security processes and find the ways to undermine them. In a previous life a network and system administrator, he moved recently towards security research. Currently, a proud employee of Ward Solutions. Formal education encompasses BSc in Computing and Telecom ,MSc in Computer Forensics and Masters in Business Administration.

-</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/0fb6957b-02f4-460d-b444-d96540a57760/89b28a65-1f99-4ce3-99ef-4e1aba90d7f1-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/2WxhFu7vEmj82See3N92eJ</video:player_loc><video:duration>1686</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T01:04:38.273Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/gv271121pfPchM79fNE9xq</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/77ddadce-2549-4cb4-b48f-749316704f7c.jpg</video:thumbnail_loc><video:title>NSEC2021 - Discussion: Vulnerability Research</video:title><video:description>Q&amp;A and discussion for the malware block, hosted and moderated by Rayna Stamboliyska.

-
Rayna Stamboliyska focuses on EU cyber diplomacy and resilience including issues related to cybersecurity, strategic autonomy and data protection. An award-winning author for her most recent book "La face cachée d'Internet" ("The dark side of the Internet",  Larousse 2017), Rayna is also an IoT hacker and a staunch proponent of open source, data and science. Rayna has served in various Directorship and security-related foreign policy positions: she has consulted for international organisations, private companies, governments and non-profits, interfacing with public sector actors and guiding them through innovative policy-making processes. A longtime diversity advocate, she is Council Member of Women4Cyber Europe.

Currently, Rayna is the VP Governance and Public Affairs at YesWeHack, a global bug bounty and coordinated disclosure leader. She also manages the EU-funded SPARTA research and innovation project, which is a pilot for the EU Cyber Competences Network. She teaches at Sciences Po Paris and writes up the cybersecurity expert column "50 shades of Internet" at ZDNet.fr.

Ivica works as an Information Security Consultant. He tries to understand the intricacies of security processes and find the ways to undermine them. In a previous life a network and system administrator, he moved recently towards security research. Currently, a proud employee of Ward Solutions. Formal education encompasses BSc in Computing and Telecom ,MSc in Computer Forensics and Masters in Business Administration.

Jeff is a security consultant by day, and sometimes by night. A Technical Director at NCC Group, he specializes in application security, and regularly assesses mobile device firmware applications, embedded platforms, web applications, and "privileged" code of all kinds. He has spoken publicly at conferences such as DEF CON, ToorCon, RECON, and CCC, covering a wide range of topics including ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7d865449-fe4e-4006-a0a0-20a15773dbce/503e2c3a-e4fb-467e-a9d8-f786c2e99502-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/gv271121pfPchM79fNE9xq</video:player_loc><video:duration>2507</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T01:32:16.145Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/mUbfMyqJFqmK9fjt3bD6eu</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1edb7ace-ea5b-4b72-8d26-d14c360800f1.jpg</video:thumbnail_loc><video:title>NSEC2021 - Igor Kozlov - Data Science way to deal with advanced threats</video:title><video:description>Is your SOC flooded with False Positives, but you are afraid to raise the rules' thresholds as this will allow advanced attackers to stay under the radar? Are your SOC analysts overwhelmed with the amount of data that they have to go through in order to give initial assessment of a security event? In this talk we will share Data Science methods that proved successful in addressing the above mentioned challenges in our corporate setup. Specifically, we will go over combining Unsupervised and Supervised Learning (Elastic and Scikit-Learn), advanced visualizations providing "light speed" deep dive into anomalies triage and environment monitoring (Python and Plotly dashboard). We will demonstrate how all this was used to detect distributed credential attacks that stayed under the radar of other solutions while saving time to our analysts.

The talk will start with an explanation of the flexibility that the Machine Learning (ML) approach brings compared to the static rule based one. (Throughout the talk, we will be following a credential attack T1078 example for illustrative purposes, but it will be explained how the suggested approach generalizes to other Mitre ATT&amp;CK TTPs.) Specifically, the latter suffers when thresholds change over time and/or vary from one monitored entity (corporation/user/server/website/etc) to another. This leads to either attackers being able to "stay under the radar" or analysts being flooded with False Positives.

First part of our response to this challenge consists in utilizing Unsupervised ML for anomaly detection, which performs historical profiling of sources and outputs the measure of deviation of a given observable from the "norm". This can be done in a number of ways, but we currently use the Elastic ML component. Taking into account the recent license change announcement by Elastic, we mention that Elastic ML can be substituted with free open source solutions, for example, Python and Scikit-Learn ML library.

This is not the end of...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a93fc4e1-2254-4975-91b5-b985c5eb4a2a/a73eadb5-5456-4a84-9fc4-2ed3f8358aa4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/mUbfMyqJFqmK9fjt3bD6eu</video:player_loc><video:duration>1708</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T01:39:17.541Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jYHgHrHeiu35Kb6tTZkjvd</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/132eec6c-d747-401d-881a-f276fc040167.jpg</video:thumbnail_loc><video:title>NSEC2021 - Mathieu Saulnier - Full Circle Detection: From Hunting to Actionable Detection</video:title><video:description>How do you create new efficient, accurate, resilient detection rules? There is a lot of steps to follow. This talk will take you to what I call Full Circle Detection. Starting with where to get hunting ideas to giving a turnkey alerts for your Security Analysts using a real world step by step example.
In this talk the audience will see how a simple blog article (about an Outlook Persistence technique) can and should spark a whole chain of action from your security team.

For each of the applicable steps below, sample code will be provided.

1. The idea/hypothesis
    ○ You read a good blog on an technic and you hunt for the IOC
2. Converting the hunt query/analytics into detection in your SIEM
    ○ Nobody wants to run the same search over and over again
3. Make sure your detection is working
    ○ It's not because your query is good that you will find events
    ○ Make a Atomic Red Team (ART) test to mimic the attack on a test server
    ○ Submit a PR for your ART test
4. Share detection with the community
    ○ Make a Sigma rule and PR
    ○ Of course some of the exclusions are Org specific so be careful how/what you share 
5. Make sure your detection pipeline is working
    ○ You need to make sure your whole pipeline is working. 
    ○ Did the last update to your SIEM change something that prevents future events from triggering your alert?
    ○ Use Schedule Tasks, CI/CD pipeline, Docker, etc to launch the ART test on a regular basis
    ○ Remove the test system from the alert to avoid SOC Analyst fatigue
6. Create the IR Playbook
    ○ Before your SOC Analysts can actually handle this alerts, they need to have a step by step guide
    ○ Will try to base on a opensource project like https://github.com/atc-project/atc-react
    ○ There's also a good SANS presentation that propose a very clear Flow chart
    ○ I'm working on open sourcing some Playbooks I've built at work as well.
7. Training
    ○ You should build a training for your current and future analyst....</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/99af94c4-4fa0-4197-8c09-33b14b00e0ce/1f5058d0-48e4-488c-a895-e68496eebedb-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jYHgHrHeiu35Kb6tTZkjvd</video:player_loc><video:duration>1402</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T02:08:35.745Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/xoqMjGk7BKemooDBvhkzdU</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/17397e04-53f0-4101-ad93-3eba5adc6672.jpg</video:thumbnail_loc><video:title>NSEC2021 - Discussion: Detection Engineering</video:title><video:description>Q&amp;A and discussion for the malware block, hosted and moderated by Jared Atkinson.

-
Jared is a security researcher who specializes in Digital Forensics and Detection Engineering. Recently, he has been building and leading private sector Detection and Response programs. In his previous life, Jared led incident response missions for the U.S. Air Force Hunt Team, detecting and removing Advanced Persistent Threats on Air Force and DoD networks. Passionate about PowerShell and the open source community, Jared is the lead developer of PowerForensics, Uproot, maintains a DFIR focused blog at www.invoke-ir.com, and is the host of the Detection: Challenging Paradigms podcast.

Mathieu Saulnier is a Core Mentor member for Defcon's Blue Team Village. He has held numerous positions as a consultant within several of Quebec’s largest institutions. Since 2011, he has been focused on putting in place SOC and has specialized in detection (Blue Team), content creation and mentorship. He worked as a "Senior Security Architect" and acted as "Adversary Detection Team Lead" and "Threat Hunting Team Lead" for one of Canada’s largest carrier for more than a decade and he is now "Sr Manager Incident Response" at Syntax. He loves to give talk and had the honor to do so at Derbycon, Defcon’s BTV, NorthSec, BSidesLV, Grayhat, GoSec and BSidesCharm.

Igor Kozlov received his PhD from McGill University, Canada. He co-authored 9 research articles in 3 different fields, including computational studies of data from the LHC (biggest experiment in human history). Currently he works as a Data Scientist in Cyber Security at Bell Canada. He is always happy to share his passion for everything (data, computer, natural, applied, fundamental) science.

Carlos aka Plug started his journey in computer security back in 1996 when he discovered a 2600 magazine that eventually led him to his first LA2600 meeting in 1998. From that point forward, he has been involved in computer security. In his free time he e...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/fe2ceef9-5649-4a54-a16a-17c75329c2e8/4cc14b47-5228-4ecf-89e0-22f4dfbf89c9-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/xoqMjGk7BKemooDBvhkzdU</video:player_loc><video:duration>2304</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T02:31:02.149Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/xjjdbVwbypmD4rDNnG5dmM</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/01496de9-6abc-4c33-ae39-fbb69ef9eb08.jpg</video:thumbnail_loc><video:title>NSEC2021 - Ofir Shaty &amp; Sarit Yerushalmi - CrimeOps of the KashmirBlack Botnet</video:title><video:description>The KashmirBlack botnet mainly infects popular CMS platforms. It utilizes dozens of known vulnerabilities on its victims’ servers, performing millions of attacks per day on average, on thousands of victims in more than 30 different countries around the world.

Its well-designed infrastructure makes it easy to expand and add new exploits or payloads without much effort, and it uses sophisticated methods to camouflage itself, stay undetected, and protect its operation.

It has a complex operation managed by one C&amp;C (Command and Control) server and uses more than 60 - mostly innocent surrogate - servers as part of its infrastructure. It handles hundreds of bots, each communicating with the C&amp;C to receive new targets, perform brute force attacks, install backdoors, and expand the size of the botnet.

Takeaways: - Security is only as strong as the weakest link. - CMS platforms have the potential to be the weakest link in the security chain, because they are so modular with thousands of plugins and themes. Owners are notorious for poor cyber hygiene, using old versions, unsupported plugins and weak passwords. It’s not that CMS platforms are very vulnerable like they have the potential to be. - A large scale botnet doesn’t necessarily need an exsotic exploit to expand, it can exploit old vulnerabilities to infect millions of victims. But in order to create a stable and long-term botnet, it needs a well designed agile infrastructure. - The COVID pandemic has created more opportunities for hackers, as more businesses digitize their operations. Just like the world adjusts and more businesses go online, the community needs to adjust and aducate for better security hygiene.

-
Ofir Shaty
Security Researcher at Imperva for the last 3 years &amp; 2 years as a database security &amp; complience expert. Web application vulnerability research &amp; analysis. Database Security &amp; Web Application Security. Data &amp; Information Security, Compliance and Regulations. Risk Management, Vulnerability A...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/fd99e8a1-d4a3-4c8f-b33d-0232cbd46aa5/f9428dd3-96e3-492c-b6ac-0b9fc155f79c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/xjjdbVwbypmD4rDNnG5dmM</video:player_loc><video:duration>1436</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T02:34:20.348Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/25apvrQrQ2cytTn3DF2tSZ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/14d51e21-b997-4388-9235-8c8dcc76d8e2.jpg</video:thumbnail_loc><video:title>Happy Holiday Season 2021</video:title><video:description>Northsec wishes you all the best for this holiday season!
Stay safe and take care!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/08ade8f3-77e2-454e-a39c-726113124811/1c0c6ec9-9a82-4679-b1bd-57ca955b16b4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/25apvrQrQ2cytTn3DF2tSZ</video:player_loc><video:duration>47</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T02:50:14.379Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/r6AxLPvXyb6Y5Mx8x6J9TN</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/85ab041f-3bad-43a5-ad46-f4a967b40412.jpg</video:thumbnail_loc><video:title>NSEC2021 - David Décary-Hétu - Unmasking the Cameleons of the Criminal Underground</video:title><video:description>Large corporations have access to, and use, incredibly sophisticated anti-fraud systems that monitor dozens of signals each time one of their customers or employees log into their web portal. These signals include what browser is used, what plugins are installed, and even the language of the users’ software. Past investigations have shown that malicious actors use malware to build profiles of their victims, and create virtual environments that replicate precisely the victims’ computers fingerprint. These profiles can be loaded up in specially crafted browser plugins and used in account takeover attacks. These profiles are sold on private markets and can fetch in the hundreds of dollars when they also include the cookies and credentials of the victims for financial institutions. The aim of this presentation is to build on past research and to map over a period of a month all of the Canadian activities of a machine fingerprint market. Our analysis extends past research first by developing a new understanding of how, and which, Canadians are targeted by this type of attack. Secondly, it presents models that predict not only the price of profiles for sale – i.e., what makes a profile more valuable – but also which profiles will end up being sold among the thousands that are for sale. Through these analyses, we end up with estimations for the Canadian market for profiles for sale, and propose hypotheses as to the size of the impact of these illicit activities on the Canadian economy. The market for fingerprinting victims is growing exponentially, and is promising to be, along with ransomware, one of the biggest threats of the coming year. With more detailed knowledge about this problem, companies and individual victims will be better suited to protect themselves against these attacks, and limit the monetization of the criminal underground.

-
David Hétu est cofondateur et chef de la recherche de Flare Systems. David est titulaire d'un doctorat en criminologie de l'Uni...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/cb3c79e7-b1d6-4f0d-b65b-21205fc9cd5c/99e3e77c-9f88-425a-91b1-bb4d87cb1aa6-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/r6AxLPvXyb6Y5Mx8x6J9TN</video:player_loc><video:duration>1615</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T03:06:55.734Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wadmKkaSadyv5wmXzYzfPr</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1f43e2ab-6656-410e-a55e-352e7a97d875.jpg</video:thumbnail_loc><video:title>NSEC2021 - Sam Quinn - Hacking K-12 school software in a time of remote learning</video:title><video:description>During the COVID-19 pandemic students across the country started to participate in e-learning for the first time. While the students had to adapt to new environments so did the software. Since school computers are now being taken home, educational software is exposed to a wider range of threats. If classroom management software was comprised, not only would a school district be affected, but attacks could spread to home devices. This talk will take an in-depth look at the zero-day vulnerabilities discovered by McAfee’s Advanced Threat Research Team in a K-12 classroom management solution used in over 9,000 school districts. The focus will be on how four vulnerabilities combined lead to a wormable unauthenticated remote code execution (RCE) resulting in System level privileges. This presentation will include a technical dissection of the network protocol leading to custom Scapy layers and a demo showing a single click exploit.

A deep dive of how four zero-day vulnerabilities in an educational management software can lead to a wormable unauthenticated attack allowing an attacker to gain system level privileges on every student computer on a network. This talk will cover the thought process and technical details of reverse engineering network traffic, creating custom Scapy layers, and the development of a single click exploit.

-
Sam Quinn is a Security Researcher on McAfee’s Advanced Threat Research team , focused on finding new vulnerabilities in both software and hardware. Sam has a focus on IOT and embedded devices with knowledge in the fields of reverse engineering and penetration testing.

-</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f43b782d-1633-4f6d-8da9-3ab159950abf/40e90dc3-26e4-4d25-8ddb-f4f100ce7454-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wadmKkaSadyv5wmXzYzfPr</video:player_loc><video:duration>1807</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T03:16:15.142Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/gCujNHLf1UL3uPhXX68hXq</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/bc2bdafb-4f9c-4c83-8633-27e0351a77c2.jpg</video:thumbnail_loc><video:title>NorthSec StoryTime - Episode 1 - NorthSectoria</video:title><video:description>Host: Gabrielle B.
Story Teller: Eric Boivin NorthSec CTF Scenario Designer</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7e914fa0-e29f-4f66-aaef-9c86684b4b56/c8dcefce-007d-4897-a804-3d1bb62ca4c2-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/gCujNHLf1UL3uPhXX68hXq</video:player_loc><video:duration>311</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T03:29:02.858Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7AyRbXHXp2FKTopvnGPeVW</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/24efa125-170d-4260-936b-4b65b2dff136.jpg</video:thumbnail_loc><video:title>NSEC2021 - Warren Mercer &amp; Vitor Ventura - Blurred lines - The mixing of APTs with Crimeware groups</video:title><video:description>State-sponsored actors and APT groups are not necessarily the same. A state-sponsored actor can be defined as an APT that is supported in some way by a state. This does not automatically make all APTs state-sponsored. APT actors that provide hacking-as-a-service are not necessarily a state-sponsored actor because they can’t be tied to a specific state — they will work for whoever pays the most. But this doesn’t mean that they shouldn’t be considered an APT. These lines get even blurrier when an actor has the characteristics and behaviour we observe in Gamaredon and Prometium groups. These groups whose main interest has been espionage, without any indications of being interested in using crimeware techniques to monetize their activity. Which should put them outside the crimeware gang definitions, however their behavior certainly resembles a crimeware gang rather than an APT.

Our presentation shows there is a space for the second-tier APT classification, one where the actor provides breach services to a larger actor, almost mimicking what happens in the crimeware scene, where some groups just gather credentials which they then sell to other crimeware groups. There are other groups that may offer hacking-as-a-service, but rather than working for the highest bidder, they serve a specific country or group, perhaps to align with their own intentions. At the same time, these groups will do whatever is best to maximize their gains. The advantage in this case is that they benefit from the “protection” of the APT for which they provide the services. Finally, this second-tier category should also include the APTs that lack the sophistication of others and often have their operations exposed due to bad opsec or amateuristic mistakes. We believe that challenging the status quo on Gamaredon and others that could fit the previous definition, is beneficial as a whole. It will help organizations better understand the threats that they must focus their resources on. The fact rema...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/356a5d0d-d136-4895-b9c8-ff1f651433c4/31d61e71-d60c-4fe3-8424-8e3c96c9b5af-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7AyRbXHXp2FKTopvnGPeVW</video:player_loc><video:duration>1311</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T03:47:50.046Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/iy8XrhikARTZoNCd9WhJaN</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/4b992051-9a79-430a-b180-6fb133a4866c.jpg</video:thumbnail_loc><video:title>NSEC2021 - Discussion: Malware &amp; geopolitics</video:title><video:description>Q&amp;A and discussion for the malware block, hosted and moderated by Marc-Etienne M. Léveillé.

-
Warren Mercer joined Talos coming from a network security background, having previously worked for other vendors and the financial sector. Focusing on security research and threat intelligence, Warren finds himself in the deep, dark and dirty areas of the Internet and enjoys the thrill of the chase when it comes to tracking down new malware and the bad guys! Warren has spent time in various roles throughout his career, ranging from NOC engineer to leading teams of other passionate security engineers. Warren enjoys keeping up to speed with all the latest security trends, gadgets and gizmos; anything that makes his life easier in work helps!

Vitor Ventura is a Cisco Talos security researcher. As a researcher, he investigated and published various articles on emerging threats. Most of the days Vitor is hunting for threats, investigating, them reversing code but also looking for the geopolitical and/or economic context that better suits them. Vitor has been a speaker in conferences, like NorthSec, Virus Bulletin, Recon Brussels, Defcon Crypto Village and BSides Lisbon and oPorto among others. Prior to that he was IBM X-Force IRIS European manager where he was lead responder on several high profile organizations affected by the WannaCry and NotPetya infections, helping to determine the extent of the damage and to define the recovery path. Before that he did penetration testing at IBM X-Force Red, where Vitor lead flagship projects like Connected Car assessments and Oil and Gas ICS security assessments, custom mobile devices among other IoT security projects. Vitor holds multiple security related certifications like GREM (GIAC Reverse Engineer Malware), CISM (Certified Information Security Manager).

David Hétu est cofondateur et chef de la recherche de Flare Systems. David est titulaire d'un doctorat en criminologie de l'Université de Montréal. Ses principaux intérêts de re...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/8e280f8f-f2ea-4763-a48e-bbce225e3600/9068ecdd-5987-44a9-8ea0-59bbc8a4171d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/iy8XrhikARTZoNCd9WhJaN</video:player_loc><video:duration>2209</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T04:01:51.998Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/2zHP38jkdsRAwYD2jfj7SF</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/caa750bc-aa35-4c4e-8c1f-2d1b096b4811.jpg</video:thumbnail_loc><video:title>NSEC2021 - Renzon Cruz - Forensicating Endpoint Artifacts in the World of Cloud Storage Services</video:title><video:description>In this presentation, I will discuss the key forensic artifacts that can be used whenever DFIR professionals encounter cloud storage services into the host such as OneDrive, Google Drive, Box and Dropbox. These are all essentials especially when the attacker or insider threat leverage these services to exfiltrate data. I will also show how to perform data acquisition to get these artifacts in forensically sound manner.

Today we are embracing the benefits and advantages of having cloud storage in most environments especially now when everyone is working work from home and data transmits from one place to another by the use of cloud storage services such as one drive, box, dropbox &amp; google drive. There are a couple of artifacts on the endpoint side that gives us the ability to see the bigger picture when these cloud services are being used to perform data exfiltration and any malicious actions. In short, cloud storage data can be more accessible on the local device and can contain files and metadata distinctly different than the current cloud repository. I'm going to show how to perform data acquisition on these cloud storage applications installed in endpoint and what are those metadata and evidence that we can extract from the forensics standpoint.

-
Renzon Cruz, a Filipino security professional living in Dubai who works as Digital Forensics &amp; Incident Response in a FinTech company based in the UK. He previously worked as Senior Security Consultant as part of a National Cyber Security Agency in Doha, Qatar. Prior to working in Dubai, he was also assigned as Sr. Security Analyst &amp; Incident Responder and was also a previous college instructor at New Era University, Philippines. He was also accepted to various international conferences as a speaker such as BSides Vancouver (2019), BSides London (2019), BSides Doha (2020), and ROOTCON Hacking Conference (2020). He is also a co-founder, course developer, and instructor of GuideM, a real-world cybersecurity training ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/0cce7333-32f6-4a1f-bbff-b4cdec5dcc03/1a1f15c8-33e1-4234-bfe3-2a49060423f8-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/2zHP38jkdsRAwYD2jfj7SF</video:player_loc><video:duration>2072</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T04:19:34.300Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/du12tLcFbS8fCgWtGLYdQx</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2ae5f879-3092-495a-af24-6f6c3df99bf7.jpg</video:thumbnail_loc><video:title>NSEC2021 - Discussion: Cloud Security</video:title><video:description>Q&amp;A and discussion for the cloud security block, hosted and moderated by Max Habra.

-
Max Habra is a Lead Cloud Integrator for the Data Analytics &amp; Innovation Team at Mouvement Desjardins, Max is a Security Consultant for Financial Services, specialized in cloud, application security and secure pipelines.

Philippe is a security researcher working for GoSecure. His research is focused on Web application security. His past work experience includes pentesting, secure code review and software development. He is the author of the widely used Java static analysis tool OWASP Find Security Bugs (FSB). He is also a contributor to the static analysis tool for .NET called Security Code Scan. He built many plugins for Burp and ZAP proxy tools: Retire.js, Reissue Request Scripter, CSP Auditor and many others. Philippe has presented at several conferences including Black Hat Arsenal, SecTor, AppSec USA, ATLSecCon, NorthSec, and 44CON.

Renzon Cruz, a Filipino security professional living in Dubai who works as Digital Forensics &amp; Incident Response in a FinTech company based in the UK. He previously worked as Senior Security Consultant as part of a National Cyber Security Agency in Doha, Qatar. Prior to working in Dubai, he was also assigned as Sr. Security Analyst &amp; Incident Responder and was also a previous college instructor at New Era University, Philippines. He was also accepted to various international conferences as a speaker such as BSides Vancouver (2019), BSides London (2019), BSides Doha (2020), and ROOTCON Hacking Conference (2020). He is also a co-founder, course developer, and instructor of GuideM, a real-world cybersecurity training center based in the Philippines. He also holds different certifications such as GCFA GCFE, GCIH, eCTHP, eCDFP, eJPT, CFR. He is mainly interested in defensive strategy, threat hunting, digital forensics, and incident response, malware analysis, adversary simulation.

Evelyn Lam is an Identity and Access Management Lead Security Archi...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/65168154-3512-4a13-be89-06db7b1fc7ef/8f0bbea4-b6a9-4611-9f9d-abece238feea-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/du12tLcFbS8fCgWtGLYdQx</video:player_loc><video:duration>1897</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T04:48:48.528Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/tQbVBKun2Mzn6UVXmjYaty</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1ce2a0f7-0648-44d3-b235-1afb940241e0.jpg</video:thumbnail_loc><video:title>NSEC2021 - Tanya Janca - Security Metrics That Matter</video:title><video:description>We measure so that we can improve and report. Reporting is for our bosses and job security. Improvement is for us. As an outnumbered security professional you will never, ever have enough time, money and resources to add every layer of defence you wish you could, which means we need to work smarter. Learn about which metrics truly matter, and which vanity metrics you can learn to safely ignore, so that you can work the most effectively at protecting your organization.

We measure so that we can improve and report. Reporting is for our bosses and job security. Improvement is for us. As an outnumbered security professional you will never, ever have enough time, money and resources to add every layer of defence you wish you could, which means we need to work smarter. Learn about which metrics truly matter, and which vanity metrics you can learn to safely ignore, so that you can work the most effectively at protecting your organization.

-
Tanya Janca, also known as SheHacksPurple, is the best-selling author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, &amp; Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger &amp; streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.

-</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e1612d5c-8399-418b-9430-4611363e7722/dc166610-e9e1-4f01-8b37-6479b2c9c718-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/tQbVBKun2Mzn6UVXmjYaty</video:player_loc><video:duration>1849</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T04:58:08.453Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/suo89F1Tf8QFuRytKUonEz</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1fde9b16-d0d1-42d8-804f-5aeac32ad113.jpg</video:thumbnail_loc><video:title>NSEC2021 - Chloe Messdaghi - Burnout: Destabilizing Retention Goals</video:title><video:description>Full title: Burnout: Destabilizing Retention Goals and Threatening Organizational Security

-
Several trends are now colliding to make burnout among security professionals a greater threat to business continuity than ever before. From alignment of deployment decisions with employee training to judgement-free skills assessments and engaging upskilling, every organization can take common sense-yet-uncommon steps to prevent and address burnout, and increase security talent retention.
Did you notice a shift in your mental health and/or your colleagues? Burnout was at an all time last year due to the surreal 2020. As we approach 2021, we recognize how critical mental health plays when accomplishing goals and productivity output. This talk dives into the factors that lead to burnout among security professionals, the clear line between burnout and failure to retain cybersecurity talent, and how to invest in your team to make sure your team is able to thrive during stressful times.

-
Chloé Messdaghi is an award-winning changemaker who is innovating tech and information security sectors to meet today and tomorrow demands. For over 10 years, she has accelerated startups through solutions that empower organizations and people to stand out from the tech crowd. She is an international keynote speaker at major information security and tech conferences and events, and serves as a trusted source for national and sector reporters and editors, such as Forbes and Business Insider. Additionally, she is one of the Business Insider’s 50 Power Players of Cybersecurity, a SC Magazine honoree, Cybersecurity Advocate of the Year, and Cybersecurity Women of the Year by Cybersecurity Excellence Awards.

Outside of her work, she is the cofounder of WoSEC and Hacking is NOT a Crime, and founder of WeAreHackerz. She holds a Master of Science from The University of Edinburgh, and a BA in International Relations from University of California, Davis, as well as executive education certificates f...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d684108e-1307-4e35-981a-e552d7acb301/fd5da0b5-4cd6-4278-bd13-08ce374be6d1-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/suo89F1Tf8QFuRytKUonEz</video:player_loc><video:duration>1515</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T05:24:40.139Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/2E4PYS6utMM6xedfb1AFs5</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/87efdff8-bd1a-4535-b4ad-f1e92093e129.jpg</video:thumbnail_loc><video:title>NorthSec StoryTime - Episode 2 - NorthSectoria</video:title><video:description>Host: Gabrielle B.
Story Teller: Eric Boivin NorthSec CTF Scenario Designer</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/0d69c2b3-1e45-4230-be1f-0b41b065cc74/0aa901d0-3631-4c7f-931c-f4c207c460f5-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/2E4PYS6utMM6xedfb1AFs5</video:player_loc><video:duration>363</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T05:23:35.984Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/j2tq5FjQenntWKhjYUPgki</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/45cded8b-e7cb-48ff-b749-c16fb3f2b04d.jpg</video:thumbnail_loc><video:title>NSEC2021 - Discussion: Security Teams</video:title><video:description>Q&amp;A and discussion for the security teams block with Joëlle-Alexandra Desmarais.

-
Joëlle-Alexandra Desmarais-Lauzon is a graduate of HEC Montreal in business administration and holds a master's degree in software engineering from the University of Sherbrooke. She has held numerous positions as an information security consultant for several large Canadian institutions and now works for Ubisoft as a security team leader (IAM).

In parallel to her professional career, she is involved in various initiatives that promote the leadership of women in the IT field.

She is also the co-founder of a small company specialized in balcony optimization, Demain Dimanche, whose products are proudly made in Montreal.

Ange Albertini is a reverse engineer and file format expert, single father of three and currently Infosec engineer at Google.

Tanya Janca, also known as SheHacksPurple, is the best-selling author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, &amp; Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger &amp; streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.

Chloé Messdaghi is an award-winning changemaker who is innovating tech and information security sectors to meet today and tomorrow demands. For over 10 years, she has accelerated startups through solutions that empower organizations and people to stand out from the tech crowd. She is an international keynote speaker at major information security and tech conferences...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/91f92285-fe24-4a28-9d6d-4d338f81bc93/b191aeff-e1e1-45a9-88fa-b88274c85bd0-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/j2tq5FjQenntWKhjYUPgki</video:player_loc><video:duration>1764</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T05:54:06.053Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/9DnUohwdquSQJLE6qNhAro</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5adce96e-56ac-49b2-84c6-1514849370e2.jpg</video:thumbnail_loc><video:title>NSEC2021 - Eric Evenchick - Building CANtact Pro: An Open Source CAN Bus Tool</video:title><video:description>Ever wanted to build your own hardware tool? In this talk, we'll discuss the design and release process for the CANtact Pro device. From PCB design to driver development, there's a lot of steps that go into bringing a hardware idea to market. This talk will give you a better understanding of this process and how you can launch your own hardware product. We'll talk about open source tools for designing PCBs, writing cross-platform drivers using Rust, the economics of releasing a device, and the unavoidable logistical headaches of building hardware.

Back in 2014, I launched an open source CAN bus tool called CANtact. This was one of the first widely available CAN bus tools that was open source and low cost. Since then CANtacts have found their way into many automotive companies, government agencies, and hobbyist's tool boxes.

CANtact Pro is the successor to the CANtact device. It adds isolation, high speed USB, CAN-FD support, and a case. This project was launched through Crowd Supply and shipped to backers in late 2020.

This talk will discuss the process of developing, releasing, and selling an open source hardware device. We'll cover the device design process and the logistics of bringing it to market. If you've ever wanted to release your own hardware tools, this talk will give you an understanding of how to do it.

-
Eric is a Technical Director working within the Transportation and Hardware practices at NCC Group. His work has been focused on automotive system security, firmware binary analysis, and tool development.

Eric has developed several open-source tools for automotive security testing including CANtact and CANtact Pro. These tools have been used by a wide variety of automotive companies, security firms, and government agencies.

Eric holds a Bachelor of Applied Science in Electrical Engineering from the University of Waterloo. While in school, he performed research on development of alternative fuels vehicles in partnership with General Motors. Eri...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/46012088-6fe0-4688-816d-00d0582c9528/78627918-f6fb-4e01-b09c-d2c5b37b2ca6-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/9DnUohwdquSQJLE6qNhAro</video:player_loc><video:duration>1850</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T05:58:54.892Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/sj6tJN1GWcuUE24iuy1DrC</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/d3a0b326-a667-4a71-9331-a4abb56f6e24.jpg</video:thumbnail_loc><video:title>NSEC2021 - Ben Gardiner - Just Add More LEDs: NSec 2018 and 2019 Badge Mods</video:title><video:description>Here's what you can do with a hardware badge once a con is over besides just hanging it up on the lanyard. Specifically, how to modify the Nsec 2018 'Sputnik' and 2019 'Brain' badges for off-board LED strips. e.g. as a monitor backlight, or just BLINKEN LIGHTS! With a bonus of how to do a hardware-port of a 503 party badge to the nsec 2018 badge.

I'll share all the parts lists with links and steps on how to do it. The LED strip mods are pretty simple and could be completed at home by those with some soldering experience, but I will show a few ways not to do it that I learned the hard way anyways. We will try to always include the "why it's possible" for those of you not familiar with HW stuff: Attendees will leave with parts lists and plans to add off-board LEDs to the 2018 and 2019 Nsec badges as well as the burning desire to make their own mods to other conference badges, whether or not they probably should. I love making my own use of HW -- usually involving a mess of wires and I hope it rubs off on you too.

-
Mr. Gardiner is an independent consultant at Yellow Flag Security, Inc. presently working to secure heavy vehicles at the NMFTA. With more than ten years of professional experience in embedded systems design and a lifetime of hacking experience, Gardiner has a deep knowledge of the low-level functions of operating systems and the hardware with which they interface. Prior YFS Inc. and joining the NMFTA team in 2019, Mr. Gardiner held security assurance and reversing roles at a global corporation, as well as worked in embedded software and systems engineering roles at several organizations. He holds a M.Sc. Eng. in Applied Math &amp; Stats from Queen’s University. He is a DEF CON Hardware Hacking Village (DC HHV) and Car Hacking Village (CHV) volunteer. He is GIAC GPEN certified and a GIAC advisory board member, he is also chair of the SAE TEVEES18A1 Cybersecurity Assurance Testing TF (drafting J3061-2), and a voting member of the SAE Vehicle Electronic Syst...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d5145e7d-98ea-4d13-a1a4-ac613997d242/a2530e48-34cf-4fea-a71f-90dc8653121e-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/sj6tJN1GWcuUE24iuy1DrC</video:player_loc><video:duration>1628</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T06:38:36.604Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wHAwjgE4z4hEJ84urjJBBN</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3aff9f13-7e72-4a59-8b1b-e60f9edda21f.jpg</video:thumbnail_loc><video:title>NSEC2021 - Discussion: Hardware</video:title><video:description>Q&amp;A and discussion for the hardware block, hosted and moderated by Geneviève Lajeunesse.

-
Geneviève is a cybersecurity professional and maker. Her professional experience spans almost 2 decades in technology in various industries, currently focusing on cloud security. A seasoned educator, she has initiated hundreds of teenagers to the maker movement and disruptive technologies such as rapid prototyping of electronics and 3D printing. She volunteers alongside marginalized and at-risk groups to empower them in adopting the best cybersecurity posture possible and to innovate to futher their missions.

Eric is a Technical Director working within the Transportation and Hardware practices at NCC Group. His work has been focused on automotive system security, firmware binary analysis, and tool development.

Eric has developed several open-source tools for automotive security testing including CANtact and CANtact Pro. These tools have been used by a wide variety of automotive companies, security firms, and government agencies.

Eric holds a Bachelor of Applied Science in Electrical Engineering from the University of Waterloo. While in school, he performed research on development of alternative fuels vehicles in partnership with General Motors. Eric is a member of the Black Hat and SecTor review boards. He has also presented at numerous security conferences including: Black Hat, SecTor, DEF CON, ToorCon, PyCon USA, and NorthSec.

Marc-andre Labonte was a system administrator for more than a decade at the McGill Genome Center while it was known as the McGill University and Genome Quebec Innovation Center. There, he took part in the design, deployment, operation and maintenance of the data center as it went through multiple upgrade cycles to accommodate ever powerful high throughput genome sequencers coming to market.

Then, he joined the ETTIC team at Desjardins in 2016 as infrastructure penetration tester. Currently doing research and testing on IOT devices, he also pre...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f8c0ee02-4a85-4470-9b49-eb0bf4e047d8/3792de95-2e41-4b2a-ba41-585088253eb3-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wHAwjgE4z4hEJ84urjJBBN</video:player_loc><video:duration>1844</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T06:46:47.312Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/8sSmHwWSrZujM77m8NDsxo</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/d24c827a-9e4d-428c-b715-afe84c483cc7.jpg</video:thumbnail_loc><video:title>NorthSec StoryTime - Episode 3 - NorthSectoria</video:title><video:description>Host: Gabrielle B.
Story Teller: Eric Boivin NorthSec CTF Scenario Designer</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3c7057a4-521a-452c-b5ad-d1663439e0cc/1d0c404f-e2ae-4ebb-9039-c438ba36737a-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/8sSmHwWSrZujM77m8NDsxo</video:player_loc><video:duration>322</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T07:06:06.047Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/6feWdTiDABN2fRnMFnCUGb</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/ddff776b-e397-4e70-9f17-cfd123a9684d.jpg</video:thumbnail_loc><video:title>NorthSec &amp; CyberAegis #BadgeLife</video:title><video:description>Tribute to NorthSec Badge team and CyberAegis #BadgeMonth
#BadgeLife</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/2a7ab199-4c32-4bb8-8078-00a15d3f767a/a7a9b590-e34a-4402-b755-93620c55c285-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/6feWdTiDABN2fRnMFnCUGb</video:player_loc><video:duration>60</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T07:07:29.999Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/1NupihWCHHY2xS4wQbz1bG</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/ec8859ab-568c-4ebb-9681-c6b1ee64d9f9.jpg</video:thumbnail_loc><video:title>NSEC2021 - Philippe Arteau - Request Smuggling 101</video:title><video:description>This presentation provides an overview of the latest research on HTTP Request Smuggling (HRS), an attack abusing inconsistencies between the interpretation of requests’ ending by HTTP request parsers. The attack occurs when, for the same stream, the proxy component sees one request while the web backend component sees two distinct requests. The most common risks will be presented, along with a set of payload variations and a live attack demonstration.

Load balancers and proxies, such as HAProxy, Varnish, Squid and Nginx, play a crucial role in website performance, and they all have different HTTP protocol parser implemented. HTTP Request Smuggling (HRS) is an attack abusing inconsistencies between the interpretation of requests’ ending by HTTP request parsers. What might be considered the end of one request for your load balancer might not be considered as such by your web server.

In this presentation, we will see how an attacker can abuse several vulnerable configurations. HTTP Request Smuggling (HRS) enable multiple attack vectors, including cache poisoning, credential hijacking, URL filtering bypass, open-redirect and persistent XSS. For each of these vectors, a payload will be showcased and explained in-depth. Also, a live demonstration will be made to see the vulnerability in-action. Aside from exploitation, we will show how developers and system administrators can detect such faulty configurations using automated tools.

By the end of this talk, security enthusiasts from any level will have solid foundations to mitigate request smuggling, a vulnerability that has greatly evolved in the past 15 years.
-

Philippe is a security researcher working for GoSecure. His research is focused on Web application security. His past work experience includes pentesting, secure code review and software development. He is the author of the widely used Java static analysis tool OWASP Find Security Bugs (FSB). He is also a contributor to the static analysis tool for .NET ca...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/067db772-1708-452a-ad3f-811095425934/eb720e7a-59a9-4009-9991-b67653b55b69-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/1NupihWCHHY2xS4wQbz1bG</video:player_loc><video:duration>2061</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T07:31:37.471Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jsRqJmBhfvnxRFZg7WtQtq</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/22fdf3a2-1b83-4182-b245-057d6303ad5e.jpg</video:thumbnail_loc><video:title>NSEC2021 - Evelyn Lam - Authentication challenges in SaaS integration and Cloud transformation</video:title><video:description>Enterprise companies are using cloud applications at an increasing pace. The Work-from-home (WFH) new normal has turned the Cloud transformation evening more demanding than ever. Software as a Service (SaaS) access model is prevalent for WFH as it enables devices to connect from the internet and the corporate network. Even though many enterprises today adopted SaaS solutions, a workable integration does not necessarily imply a secure one. Enterprises shall come up with a strategic solution to maintain security standards sustainably. Managing authentication in the Cloud is a complex problem, more complicated than the traditional, on-premise "Walled Garden" environments. Public Cloud applications reside in a more "open" and "shared" environment and therefore have different attack vectors and vulnerabilities. The conventional ways to handle authentication are not good enough to securely protect Public Cloud resources and SaaS applications from unauthorized access. In this presentation, I will go through some common SaaS integration security pitfalls, the risk of unmanaged Cloud identities, and explain why adopting an Identity provider (IDP) solution is critical to handle Cloud authentication security. The audience would also look at how a Cloud-based IDP solution tackles the Cloud authentication problems more intelligently than a traditional IDP.

Now more than ever, enterprise companies are using cloud apps at an increasing pace. The pandemic outbreak has accelerated the digital shift. Work-from-home is the new normal, and this trend is unlikely to go away when the pandemic ends. This phenomenon has made the Cloud transformation evening more demanding. The access model of Software as a Service (SaaS) enables devices to connect from the internet and the corporate internal network - a prevalent access model for WFH.

We have seen enterprises rely more on business-critical SaaS applications, such as Google G Suite, Microsoft Office 365, and Salesforce. Some of them ev...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/95844b43-0096-4555-a7f1-d2c97b80eb8e/ae592930-89bf-408d-babb-1c679627b641-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jsRqJmBhfvnxRFZg7WtQtq</video:player_loc><video:duration>1768</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T07:33:10.930Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ebGvRmibpu4ZFJTjS3Lqw5</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/19bb8846-36e4-49ee-804f-d06bbd149ea4.jpg</video:thumbnail_loc><video:title>NSEC2022 - Michael Geist - What Lies Behind Canada’s Internet Regulation Reversal?</video:title><video:description>Canadian government’s Internet regulation plans that tries to sweep up broadcast regulation, news media regulation, online harms, and privacy.

The Canadian government has recently reversed years of Internet regulation policy, shifting from a pro-innovation approach to one that emphasizes regulation, taxation, and government engagement in Internet streaming, speech, and the availability of news. Professor Michael Geist will unpack the latest developments and discuss what lies behind the government plans.

-

Dr. Michael Geist is a law professor at the University of Ottawa where he holds the Canada Research Chair in Internet and E-commerce Law and is a member of the Centre for Law, Technology and Society. He regularly appears in the Globe and Mail, is the editor of several monthly technology law publications, and the author of a popular blog on Internet and intellectual property law issues. Dr. Geist serves on many boards, including Ingenium, Internet Archive Canada, and the EFF Advisory Board. He was appointed to the Order of Ontario in 2018 and has received numerous awards for his work including the Kroeger Award for Policy Leadership and the Public Knowledge IP3 Award in 2010, the Les Fowlie Award for Intellectual Freedom from the Ontario Library Association in 2009, the EFF’s Pioneer Award in 2008, and Canarie’s IWAY Public Leadership Award for his contribution to the development of the Internet in Canada.

-

Submit to our CFP at: https://cfp.nsec.io !</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6ac53555-4574-4722-9417-373b24d2d870/82bdad25-63ae-45e5-be66-2a8ba960dbe6-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ebGvRmibpu4ZFJTjS3Lqw5</video:player_loc><video:duration>1689</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T08:05:09.443Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/5Qw1EykxaqH1iwvGaaufac</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/eb6b91ed-680e-4b09-a0ef-8c8a76101385.jpg</video:thumbnail_loc><video:title>NSEC2022 - Andréanne Bergeron - Tell me where you live and I will tell your P@ssw0rd</video:title><video:description>There are many ways to attack organizations, and credential stuffing is one of these. Depending on the strength of users’ passwords, crackers can decrypt passwords in a matter of seconds, hours or they may never succeed. Even if there was a significant advancement in attackers' abilities to perform password cracking, passwords remain the dominant authentication method not replaced but merely augmented by multi-factor authentication (MFA). The knowledge about passwords’ use must be deepened in order to respond to the protection needs of cybersecurity clients and adapting to specific aspect of their reality. Adopting a macrosocial approach, the present study explores different factors influencing passwords’ quality. We combined NorthPass’s list of the 200 most common passwords in 49 different countries to several other databases of country’s social and economic indicators like GDP, mean education level, amount of data breaches experienced in the country, etc.

The results reveal that a higher literacy level is associated with higher passwords’ quality. Also, the number of Internet users is inversely associated with password quality which indicates that living in a highly connected country is not a factor that increase information’s protection. The study participates in the understanding of macrosocial protection’s factors in order to adapt password lists.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/272ac035-c4a3-4380-8baa-d2a4cb92191d/03dd91fa-ad77-46f5-8c21-2b468d5b33c7-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/5Qw1EykxaqH1iwvGaaufac</video:player_loc><video:duration>1239</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T08:06:01.974Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/tjjxUrRRnneRsmH26y1wnh</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/600a4bf2-cb90-48aa-962d-89db3f1f17e9.jpg</video:thumbnail_loc><video:title>NSEC2022 - Olivier Bilodeau &amp; Lisandro Ubiedo - The Risks of RDP and How to Mitigate Them</video:title><video:description>Remote Desktop Protocol (RDP) is the de facto standard for remoting in Windows environments. It grew in popularity over the last couple of years due to the pandemic. Many remote workers are now relying on it to perform duties on remote systems. RDP is secure when well deployed but, unfortunately, that’s rarely the case and thus clicking through warnings is common. We have spent the last 3 years working on and reimplementing parts of RDP in PyRDP, our open-source RDP library. This presentation is about what we have learned and can be applied to attack and defend against RDP attacks.

From an attacker’s perspective, we will cover conventional RDP attacks such as Monster-in-the-Middle (MITM) of RDP connections, capture of NetNTLMv2 hashes and techniques to bypass conventional defense mechanisms such as Network Level Authentication (NLA). Case in point: Did you know that by default all clients allow server-side NLA downgrades right now? This will enable us to understand and identify the risks with RDP.

From the Blue Team’s perspective, we will provide techniques and tools to detect attacks showcased previously. Finally, we will provide step-by-step instructions to deploy an accessible RDP server that is both secure and functional.

--

Olivier Bilodeau is leading the Cybersecurity Research team at GoSecure. With more than 10 years of infosec experience, he enjoys luring malware operators into his traps, writing tools for malware research and vulnerability research. Olivier is a passionate communicator having spoken at several conferences including BlackHat, Defcon, Botconf, NorthSec, Derbycon, and HackFest. Invested in his community, he co-organizes MontréHack, a monthly workshop focused on hands-on CTF problem solving, and NorthSec, a large non-profit conference and CTF based in Montreal.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/dd359046-0536-4725-a564-816471b945ea/97ae0596-441a-49c6-9ec2-da1061d77c82-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/tjjxUrRRnneRsmH26y1wnh</video:player_loc><video:duration>1846</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T08:31:51.909Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ueMeiGm2Eev6sH1NYEFhcL</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f0c8850e-17b2-4f66-b8aa-49e3a797ce7e.jpg</video:thumbnail_loc><video:title>NSEC2022 - Rolland Winters - Passive recon &amp; intelligence collection using cyber-squatted domains</video:title><video:description>Domain squatting presents the creative attacker with low cost, and extremely effective ways to passively gather large amounts of useful data &amp; intelligence. These techniques can be highly targeted, or they can be used by cyber criminals to cast a wide net, taking advantage of victims as the opportunities present themselves.

For our research, we are using "catch-all" email inboxes on squatted variants of a very popular public email service. Our intention for this data is to analyse &amp; demonstrate the diversity of information obtainable using this technique. A single typo or bitflip in the domain name of an email address will result in our inboxes receiving email intended for someone else! Using roughly a dozen domain names, we are currently capturing thousands of emails each week. Are you curious to know what we've found, and how you can defend your organisation about this type of attack? See you at the talk!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e4ac6cd3-236c-49ae-842a-9aba8fcef4e2/8ad948db-c869-4dcc-a1d4-e70fea1ef57d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ueMeiGm2Eev6sH1NYEFhcL</video:player_loc><video:duration>1460</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T08:30:48.091Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jXxn4BKK2CqPV6wJMSFxih</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8da33fbf-cd75-44d8-b457-4287faef130e.jpg</video:thumbnail_loc><video:title>NSEC 2022 - Q&amp;A - Red team block</video:title><video:description>Hosted panel discussion and Q&amp;A.
Olivier Bilodeau, Cybersecurity Research Lead @ GoSecure 
Rolland Winters, Cyber Operator @ Canadian Armed Forces &amp; SOC Analyst @ Commissionnaires du Quebec
Martin Dubé, Ethical Hacking @ Desjardins</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9985bb40-925e-4586-bf46-fba91100961e/fbf74fa5-1a4d-4837-a433-19d75a579a83-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jXxn4BKK2CqPV6wJMSFxih</video:player_loc><video:duration>1999</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T08:59:59.040Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/s3WZ5ASrN9tx34zbEzXxq3</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0dca28a8-e59f-4ea1-8a9c-32e3597e4127.jpg</video:thumbnail_loc><video:title>NSEC2022 - Yolan Romailler - Public, verifiable, and unbiasable randomness: wassat?</video:title><video:description>In this talk, we will walk through what's randomness, and why it matters. We will discover the different "flavours" of randomness, from the "private" to the "public" one, including the "verifiable", the "distributed" and the infamous "lack of" randomness.
We will discover a few use-cases for each of these, discuss the problems lurking behind each, and existing solutions to avoid them.
Finally we will (re)discover "drand", a distributed randomness open-source software that allows you to run your own, join an existing network or just query good quality public, verifiable, distributed randomness. We will briefly cover the existing League of Entropy behind the main existing drand network, what it's being used for and why public randomness should be treated as a public service.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d2f6fa55-caa0-4699-a988-d258efde8436/a9ad0852-8738-4cad-98eb-5b48f1ff2bb4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/s3WZ5ASrN9tx34zbEzXxq3</video:player_loc><video:duration>1694</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T08:51:54.154Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kjVdpPxcHHSdGhYCCqQAsm</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/c7a0dff8-d324-42c1-b720-80f18a44a31e.jpg</video:thumbnail_loc><video:title>Privacy-friendly QR codes for identity</video:title><video:description>Presenting personal information in the form of a QR code has become a daily reality for many during the Covid pandemic: in Quebec, people showed their immunization information using the government-issued VaxiCode, a SMART Health Card (SHC) credential that follows a medical standard adopted in Canada and in many other countries. The paradigm of presenting information about oneself can easily be generalized beyond this health scenario. In this presentation, I’ll first give an overview of the SHC framework, focusing on its security features and describing its deployment in Canada. I’ll then present a generic framework to issue QR codes that can encode attributes of any type. I’ll introduce a strong privacy feature allowing users to only disclose a subset of the encoded attributes, addressing one of the main privacy critiques of SHCs. Finally, I’ll give a demonstration and describe the open-source specification and reference implementation for this generic framework.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9c81d111-d7a2-4acd-ac7d-0759c5792d40/569ce170-8560-456e-82f2-97d223e36604-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kjVdpPxcHHSdGhYCCqQAsm</video:player_loc><video:duration>1819</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T09:13:55.809Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kX1RFSTBX6LUdr1x2Fqbsf</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/be69c9d3-f8cf-4186-b48c-30b7a3461975.jpg</video:thumbnail_loc><video:title>NSEC2022 - Q &amp; A Cryptography block</video:title><video:description>Hosted panel discussion and Q&amp;A.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a18c11e0-f280-4175-9aff-cb0ddd3ec2ea/0e3781a1-da72-4eff-b169-ae4580418cf0-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kX1RFSTBX6LUdr1x2Fqbsf</video:player_loc><video:duration>1467</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T09:39:58.626Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/qGoJyQmBH2FWpB4ZL38iRM</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/00e5ff46-a9e9-4a9c-937f-f32569fe4d64.jpg</video:thumbnail_loc><video:title>NSEC2022 - Yossi Weizman - From the cluster to the cloud and back to the cluster: Lat. mov. in K8s</video:title><video:description>In this session we will take a deep dive into Kubernetes lateral movements. We will elaborate about the different identity types used by Kubernetes and how attackers use those identities to escalate their privileges in the cluster and move laterally to external cloud resources. We will explain the various cluster-to-cloud authentication methods in the various cloud providers (AKS, EKS and GKE) and the risks that each one poses. We will show real-world examples of misconfigurations that led to cluster takeovers and explain how they could be prevented.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c7ff16c2-4d80-4d8a-9155-f957be65f023/262800ee-bf7e-4ca7-a3a3-645ab02ab467-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/qGoJyQmBH2FWpB4ZL38iRM</video:player_loc><video:duration>1631</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T09:39:18.304Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/dV1NSy2TqnsNf3ZjQSwDkZ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/23332b8e-152c-4665-8253-be2e79acc5de.jpg</video:thumbnail_loc><video:title>NSEC 2022- Vickie Li - I thought writing a technical book was supposed to be fun?!!</video:title><video:description>In this talk, I dive into my experience writing and publishing a security book. What goes into writing one of these 400-page technical textbooks? Let’s dive into the realities: from idea to book.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/689494ee-1b2d-4d09-b6e7-092ee47dc38b/f6d76a6e-d442-4643-9e1a-71d19b3dc518-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/dV1NSy2TqnsNf3ZjQSwDkZ</video:player_loc><video:duration>1853</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T10:02:30.898Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/rm62PcX9Ur29kbzTD93S72</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f34719e0-da72-4a5a-8674-b2e465737e07.jpg</video:thumbnail_loc><video:title>NSEC2022- Abhay Bhargav - Hook, Line and Sinker - Pillaging API Webhooks</video:title><video:description>Webhooks are an important part of modern web services. The techniques showcased here will highlight unique attack vectors that can be used to perform SSRF attacks that can lead to cloud compromise</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/cd427149-d040-4032-a81b-7d8e4a817895/127e6b4a-5668-4017-80bd-840dfce99e2d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/rm62PcX9Ur29kbzTD93S72</video:player_loc><video:duration>2047</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T10:13:38.835Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/4J7T2KYvYpqWbmKGEwPzcX</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/be89befb-a027-493d-88b8-061cb1496010.jpg</video:thumbnail_loc><video:title>NSEC2022 - Nate Warfield - I am become loadbalancer, owner of your network</video:title><video:description>In this talk, I will lean on a decade of experience working for one of the most prominent load balancing vendors and teach you the architecture, how the devices operate, how they're deployed, what their management plane looks like and the access it affords you post-breach. You will also learn how to avoid common mistakes which can interrupt traffic processing, trigger device failures and otherwise give away your presence on the system. While this talk will focus on a specific architecture, all vendors use essentially the same design concepts so the information is applicable across most platforms. Additionally, armed with an understanding of the designs you'll be able to use freely available vendor documentation to hone &amp; tune your post-exploitation shenanigans across other load balancing products.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/1e2ce4e8-2c63-4a95-8b46-887a9a73dcd1/c0a2d148-0e02-4d5a-99d8-b4b3520d9ebb-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/4J7T2KYvYpqWbmKGEwPzcX</video:player_loc><video:duration>1871</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T10:23:02.655Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/fguVpKaTvoddBSTduPJqE8</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b37ddd4f-139b-4dbd-a1be-cc472f443bc0.jpg</video:thumbnail_loc><video:title>NSEC2022 - Q&amp;A Blue Team block</video:title><video:description>Hosted panel discussion and Q&amp;A.
Émilio Gonzalez, Blue team @ Desjardins
Guillaume Ross, Head of Security @ Fleet Device Management
Maya Kaczorowski, Product Manager @ Tailscale
Eric Chiang, Security Engineer @ Google
Yuriy Arbitman, Data Scientist @ Imperva 
Caspian Kilkelly, Senior Consultant @ CrowdStrike</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7389ebbf-f5c0-4d08-8e71-c5052a062483/4e299b10-e2d8-4284-aed2-868a92888056-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/fguVpKaTvoddBSTduPJqE8</video:player_loc><video:duration>1709</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T10:36:54.262Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/gVyjDPr45upCgpXBNarc3e</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8d8fbb38-8fae-40ee-9149-1d0c4c61a477.jpg</video:thumbnail_loc><video:title>NSEC2022 - Alexis Dorais-Joncas - Jumping the air gap: 15 years of nation-state efforts</video:title><video:description>Learn from the best. Nation-state actors have been breaching air-gapped networks for over a decade and a half: discover how they are doing it, so you can better protect yours.



Air-gapping is used to protect the most sensitive of networks: ICSes running pipelines and power grids, voting systems, or SCADA systems operating nuclear centrifuges just to name a few. In the last 24 months, four malicious frameworks devised to breach air-gapped networks emerged, bringing the total to 17, by our count. This prompted us to step back and reanalyze all those frameworks from the vantage point of having discovered and analyzed three of these in the past six years. We put the frameworks in perspective to see what history could teach us in order to improve air-gapped network security and our abilities to detect and mitigate future attacks.


This exhaustive analysis allowed us to isolate several major similarities in all of them, even those 15 years apart. We pinpoint the specific areas of air-gapped networks that are consistently leveraged by malware in order to operate, and provide objective advice on how best to prioritize the deployment of resources to increase security.


Specifically, this presentation covers the similarities in execution vectors used on the connected and air-gapped sides of targeted networks, the air-gap-crossing mechanisms and communication protocols used to control the components running on the isolated networks, the information stealing techniques, and, finally, the propagation and lateral movement capabilities.


Our analysis shows how most frameworks differ only from an implementation perspective in so many aspects, mostly due to the severe constraints imposed in air-gapped environments. Armed with this information, we cover techniques that can be implemented to harden specific areas that have been repeatedly abused by air-gap-aware frameworks and strategies to detect their presence, such as how to prevent removable drive abuse and detect host- an...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/80f36b29-113d-4f4f-89cb-330eb4565885/e95cf2e5-710e-4ff4-b615-e98dfa5f9b8f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/gVyjDPr45upCgpXBNarc3e</video:player_loc><video:duration>1512</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T10:40:30.031Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jzWbTNa4kRVBekRhkZa7Bs</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/04eb65c9-bbcf-49f3-9d1f-d103d38dee49.jpg</video:thumbnail_loc><video:title>NSEC2022 - Caspian Kilkelly - 10 Things I wish I knew before my first incident</video:title><video:description>The first major incident response I was involved in was a nightmare. Why? Because I didn’t know what we didn’t know. Sixteen years and too many incidents to count later, I’ve come up with a list of 10 (or more) things that I wished I had known then. In this talk, we’ll cover what those 10 things are, some adjacent questions to those, and some war stories to show you why you should care.
This isn't your dad's IR plan....</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/96816f49-77c2-4f8f-a341-74092896b538/1421497d-516f-4357-aeb6-abf3f1ffb583-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jzWbTNa4kRVBekRhkZa7Bs</video:player_loc><video:duration>1330</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T10:54:15.449Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/rHejS6svgkiAQ52B17SExy</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0e9e980f-9763-409b-9e49-c4fed4f1ba4d.jpg</video:thumbnail_loc><video:title>NSEC 2022 - Asheer Malhotra - MuddyWater: From Canaries to Turkeys</video:title><video:description>In January 2022, US Cyber command attributed Muddywater to the Iranian Ministry of Information and Security, which caught some attention by the cyber security community. The reason being the fact that

Since late 2021 through 2022, Iranian based threat actor Muddywater has been conducting several operations using different methods of operation targeting victims in different geographies including Europe, the Middle East and Asia- culminating into the attribution by the U.S. Cyber Command of the group to Iran’s Ministry of Intelligence Services (MOIS) instead of the IRGC like it was previously believed.These campaigns show the flexibility and capability of this group when it comes to employing different methods of operation to achieve their goals. We will start by describing three very distinct MuddyWater campaigns which are linked together by methods of operation and tools. The campaigns consisted of highly targeted attacks on Turkish governmental organizations. This was the first campaign that we saw using Canarytokens to signal payload activation. Our analysis of this method led us to create different hypotheses for the usage of this novel method. * Bypass URL analyses - If the Canary token is not activated then the C2 would not deliver the payload. This thwarts an isolated analysis of the C2 payload url. * Determination of the C2 URL blocking. - Several requests to the token without any requests to the C2 indicate blocking of the C2 by a victim’s organization. * Anti-Analysis checks - Canary token requests followed immediately by a request for the payload within a reasonable timeframe may also be used to determine automated analysis such as a sandbox based analysis - This is essentially a timing check or sorts.

This campaign also had a mixed stage payload delivery - on one side it uses the common malicious VBA macros via Office documents; on the other it used double extension executables that seem to have been created with a builder. This builder was also used...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d0362c4c-3b8e-47bc-af6f-ce25320b6dee/6c99dd8b-8d70-4cb0-9648-42d6749d6cfd-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/rHejS6svgkiAQ52B17SExy</video:player_loc><video:duration>1612</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T10:59:40.484Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/oUypaU6BfFgWNgGcA5pPh6</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5ceeec9d-28ca-472f-b43c-dc47f09b67c7.jpg</video:thumbnail_loc><video:title>NSEC2022 - Maya Kaczorowski &amp; Eric Chiang - The road to BeyondCorp is paved with good intentions</video:title><video:description>BeyondCorp is Google’s initial implementation of a zero trust architecture, which grants application access based on the user, device, and application. Despite all the excitement about zero trust architecture, there’s little concrete guidance (and a lot of vendor noise) on how to successfully implement one. In this talk, Maya and Eric will provide insight into BeyondCorp fundamentals, common misconceptions, and a roadmap for your organization to get to a zero trust architecture.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/b97fb186-6d48-466e-ab30-0b5047e1be19/539a7d7b-eca0-4093-b9e4-895502ce37b0-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/oUypaU6BfFgWNgGcA5pPh6</video:player_loc><video:duration>1723</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T11:10:53.675Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/qmrRP8P6FxRJSqGbRm7VKe</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/d5261987-c5ff-4a39-88d1-3a4cb4a738e8.jpg</video:thumbnail_loc><video:title>NSEC2022- Yuriy Arbitman - Obfuscation classification via Machine Learning</video:title><video:description>In this work we build a machine learning classifier that distinguishes between cleartext and obfuscated code. Starting with JavaScript, we extend our techniques to Python and PHP.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c53623aa-2efb-439f-9c29-f35c1126168f/b23d75e4-ee37-42ee-9650-4166b13c593e-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/qmrRP8P6FxRJSqGbRm7VKe</video:player_loc><video:duration>1690</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T11:18:00.976Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/dc7oBBEYnizcboweYYTBGg</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/07bcfe46-e350-43ad-9675-41766219ae5c.jpg</video:thumbnail_loc><video:title>NSEC2022 - Q&amp;A Malware block</video:title><video:description>Hosted panel discussion and Q&amp;A:
Suweera De Souza, Senior Security Researcher @ CrowdStrike
Marc-Etienne M.Léveillé, Malware Researcher @ ESET
Asheer Malhotra
Léanne Dutil, Code Reverser @ Google 
Alexis Dorais-Joncas, Head of ESET's R&amp;D office in Montreal @ ESET</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/62bac886-9ded-4bfb-a88f-89c810f22bc3/3e0a219e-2da0-4214-acd8-a15b5788134b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/dc7oBBEYnizcboweYYTBGg</video:player_loc><video:duration>1538</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T11:32:31.216Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/gYzieCmPeT8HFyng5UGysX</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2a6be7b6-2936-42a7-a377-0a7f7e53bb6f.jpg</video:thumbnail_loc><video:title>NSEC2022 - Q &amp; A AppSec Block</video:title><video:description>Hosted panel discussion and Q&amp;A.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/815f4049-6a3b-4f1f-b274-25430ae41adb/8ab90ee4-0532-4eb8-82ce-235bd103ade5-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/gYzieCmPeT8HFyng5UGysX</video:player_loc><video:duration>1116</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T11:36:23.963Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/cXvXKLRyM6FGPV1xXkCCQV</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/facc72d6-a424-4c18-bf0a-692695d7836b.jpg</video:thumbnail_loc><video:title>NSEC2023 - Laurent Desaulniers - Deception for pentesters</video:title><video:description>Magicians are the most versed at lying and deceptions and pentesters can learn from these years of experience at lying, cheating and misdirection. Suggestion is the original exploit (CVE-000-0001) and, by the end of this talk, attendees should be more comfortable planning and engaging in social engineering.

This 30 minute talk will present key SE concepts, such as suggestion, exploiting cognitive biases, double talk, framing, creating trust and the anatomy of a lie (what works, what doesn't, why less is more), while focusing on practical tips for phishing, social phone engineering and physical intrusion.

--
Laurent Desaulniers is an amateur in most things, CTF challenge designer and speaker at a few conferences.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/60d4e59b-e089-44ef-81db-8ea6ab7c7415/4ab3ec52-ab9d-4a1f-8887-8937cc1e6e50-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/cXvXKLRyM6FGPV1xXkCCQV</video:player_loc><video:duration>1761</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T12:07:26.404Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/2CTmCvw1ouALYMpq9KhFk6</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5f56a0a6-d6b1-4fd4-8f15-d813cf5b0066.jpg</video:thumbnail_loc><video:title>NSEC2023 - Charles F. Hamilton - Evasion as a Red Teamer</video:title><video:description>This talk is going to cover some of the techniques used to successfully deploy your code or agent during a red team engagement without getting detected by EDR solutions. I will be presenting some of my techniques and tricks that successfully defeated the detection in place which include modern EDRs.

--
Charles Hamilton is a Red Teamer, with more than ten years of experience delivering offensive testing services for various government clients and commercial verticals. In recent years, Charles has focused on covert Red Team operations against complex and secured environments. These operations have allowed him to hone his craft at quietly navigating a client's network without detection. Since 2014, he is the founder and operator of the RingZer0 Team website, a platform focused on teaching hacking fundamentals. The RingZer0 community currently has more than 40,000 members worldwide. Charles is also a prolific toolsmith and speaker in the Infosec industry under the handle of Mr.Un1k0d3r.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/0d3f903d-c562-4338-8a09-a998917d4a7f/8ec95995-74c1-499a-b3d6-06084fb1f3fa-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/2CTmCvw1ouALYMpq9KhFk6</video:player_loc><video:duration>1704</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T11:53:37.905Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/iJMRqWzWDQ294WbQXjCpfR</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/5d17e292-80fa-4759-8e0b-8d200ed58cfc.jpg</video:thumbnail_loc><video:title>NSEC2023 - Burp Suite Pro tips and tricks, the sequel</video:title><video:description>Based on my in-depth knowledge of both Burp Suite and its extensions, this talk aims to provide bug hunters and pentesters with a set of useful strategies. The underlying goal is to increase the efficiency of the testing workflow (in terms of both capabilities and speed). I presented a similar talk in 2013, but the tool and its ecosystem changed significantly since then.

Among the topics to be covered: - Improved usage the Burp Suite GUI, from modifying default settings to increasing the speed of interaction (including hotkeys) - Automation of recurrent tasks, mainly the transparent management of sessions (via both cookies and headers like JWT) and CSRF tokens - Essential extensions like Hackvertor, Piper and Burp Bounty - Efficiently find authorization bugs, on both APIs and web apps - Niche knowledge about Collaborator (correlation) and Intruder (placeholders in wordlists) - Poor-man automation pipeline, from a list of domains to findings - Evergreen pieces of advice (on performances and live monitoring) - How to stay up to date (a list of relevant online resources)</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/8fa4da5e-b79e-49f7-97bc-c340cc37b0b9/b3a1f8db-33a3-49ec-aa20-86d4e7a489c2-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/iJMRqWzWDQ294WbQXjCpfR</video:player_loc><video:duration>1844</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T12:19:36.477Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7xxmWmuGdd1FbUvFY1AWdt</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a3b7164b-fa13-4278-888d-1a4e1550a0be.jpg</video:thumbnail_loc><video:title>Badge fabric 2024</video:title><video:description>Le badge est en route !! // The badge is on its way!! #badgelife</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/34fe3739-a96d-4bea-9155-4f4ff3c294fb/194f2e4b-33c8-4cb2-831f-e0eb6c169d6c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7xxmWmuGdd1FbUvFY1AWdt</video:player_loc><video:duration>17</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T12:29:17.428Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/2ZSWU39WV48v13QdhPGmRa</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0474c0fa-5e04-487c-b143-3213ea4c9605.jpg</video:thumbnail_loc><video:title>NSEC2023 - Willy Wonka and the Detection Factory: Detection Engineering without Alert Fatigue</video:title><video:description>"Surely we can make a detection for when the whoami command is executed, right? Nobody ever runs whoami but threat actors." - Someone with no experience in detection engineering

In this talk, we'll discuss how we addressed the dilemma between detection coverage and alert fatigue in a SOC by correlating minor or noisy detection logics. We'll go through our journey to build a custom platform that leverages the concept of indicators. We'll share the toolset and some implementation details and show how we use it to monitor tens of thousands of endpoints. It has become one of our main tools for threat hunting and is used by our SOC analysts to assist them in their investigations.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/102dee31-da62-495d-8fd9-9eb9f3f8c923/d76a962f-06af-45a4-aa89-1d656defa5b0-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/2ZSWU39WV48v13QdhPGmRa</video:player_loc><video:duration>1509</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T12:37:52.059Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/3XCjxwmPTWzVWZMKVwQn3B</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/983752bc-c740-4854-b679-53cc139696e5.jpg</video:thumbnail_loc><video:title>NSEC2023 - Q&amp;A Detection</video:title><video:description>Q&amp;A Panel for the detection block
Jared Atkinson
Mathieu Saulnier
Émilio Gonzalez 
Olaf Hartong
Rémi Langevi</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/17f69147-067f-4cb6-9cd1-03a70ec9744b/bab014fd-69d7-41a2-8a66-5d96f0368906-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/3XCjxwmPTWzVWZMKVwQn3B</video:player_loc><video:duration>1897</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T12:50:25.530Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/guD5KQntsDuD8z9oN3ciq8</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/89e6bf7f-8b4e-4fd4-845d-5267bd361c1c.jpg</video:thumbnail_loc><video:title>NSEC2023 - IaC,  Automation, and Testing: The Key to Unlocking the Power of Detection Engineering</video:title><video:description>Modern security teams have been engineering solid detections for a while now. All this great output also needs to be managed well. * How can we make sure that the detections we have spent a lot of time developing are deployed and are running in production in the same way as they were designed? * How can we assure our detection and prevention controls are still working and are detecting the attacks they have been designed to cover?

In this talk, we will discuss how security teams can reap the benefits of using detection-as-code, and how this can help achieving a single source of truth for their detection logic. We will explore how this approach enables teams to use automation and unit testing to manage and validate their detection controls across multiple environments. We will also discuss the importance of being in control of your detection systems, and how detection-as-code can help you maintain control, quality and ensure proper documentation. By adopting a detection-as-code approach, teams can improve the effectiveness, quality and efficiency of their detection systems and gain the confidence that comes from knowing that their detections and mitigations work as intended.

We will show how we have built a robust and flexible development and deployment process using Azure DevOps, Microsoft Sentinel, the Microsoft Defender suite, Azure Logic-Apps and Functions. This process allows us to quickly and easily implement new detection controls, test them across multiple environments, and deploy them in a controlled and consistent manner. We will also show how these tools integrate with each other to provide a single source of truth for our detection logic, and how they can be used to automate various aspects of the development and deployment process. Overall, our approach allows us to build and maintain a highly effective and scalable detection system that is well-suited to the needs of any enterprise or service provider.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7d78c20f-ad9f-46ae-a70c-808907eb39f3/d4fefb73-1ddc-40db-81c6-e9944e140183-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/guD5KQntsDuD8z9oN3ciq8</video:player_loc><video:duration>1951</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T12:54:59.916Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/2YM1yXHGu7zsCS9MvDEKvu</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/d9da8ba8-6af7-45e1-89e0-11ab4093c794.jpg</video:thumbnail_loc><video:title>NSEC2023 - Empowering Security with Generative AI: Fundamentals and Applications of GPT models</video:title><video:description>In this talk, I will provide a high-level overview of the fundamentals of large language models, with a focus on GPT models. My goal is to share insights from a security research perspective and inspire researchers to explore the potential of GPT models in their own labs. Specifically, I will cover topics such as semantic searching, few-shot learning, and code generation and provide basic examples and experiments to illustrate these concepts. Whether you're new to GPT models or have experience working with them, this talk aims to provide a fresh perspective on how they can be leveraged to empower security teams and spark new ideas for research.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/1006872e-852c-4c60-a18e-60d00d1a4b5a/bbb423ad-6b29-469a-8f1d-f855b61bd287-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/2YM1yXHGu7zsCS9MvDEKvu</video:player_loc><video:duration>2646</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T13:18:34.496Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/d3QX89yXXfiKWPH6Ws2x31</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/50e6722b-668b-4f17-be86-85c989da41f9.jpg</video:thumbnail_loc><video:title>NSEC2023 - gRPC security with less effort</video:title><video:description>gRPC/gRPC-web even as a newer protocol can offer a greater attack surface than regular HTTP1.1 REST through applicative services misconfigurations. During this talk, we will enumerate the new attack vectors through misconfigurations such as HTTP2 downgrade allowing request smuggling, disabling reflection. We want to present an entire code configuration for a secure generic gRPC service leveraging an automatically generated Kubernetes authentication service with an interceptor to an authorization engine to simplify complex delegation of access with open source Ory engines. Finally in-depth applicative problems with currency, math and conversions to watch out for.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/61935176-9c55-4fc8-9c64-105bbd070218/0362ac68-4f2f-4c7f-88fd-19503846214f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/d3QX89yXXfiKWPH6Ws2x31</video:player_loc><video:duration>1835</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T13:17:02.235Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/saxn2B7zDuwJidyme8sV3w</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/98717bb0-70fe-4a2a-a15c-17cc85a61bfd.jpg</video:thumbnail_loc><video:title>NSEC2023 - Q&amp;A Red Team</video:title><video:description>Q&amp;A Panel for the Red Team block.

-Charles F. Hamilton (Mr.Un1k0d3r) Director, KPMG Canada 
-Laurent Desaulniers Vice President, Breach, Detection and Response, GoSecure
-Martin Dubé 
-Guillaume Caillé Team Lead - Penetration Testing, OKIOK</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d3e2a07f-80cb-47d9-8ee7-449bb77640a6/45373eb2-3758-4a56-9840-34ff4602d3ff-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/saxn2B7zDuwJidyme8sV3w</video:player_loc><video:duration>1686</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T13:43:12.246Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ojewbJBdY2Um8BPGPfJa1r</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/c9c3424f-7c69-4517-ac80-bd48d7f613bf.jpg</video:thumbnail_loc><video:title>NSEC 2023 - Thwarting Malware Analysis Integrating Established and Novel Techniques</video:title><video:description>An important part of red teaming is developing custom payloads, since using anything public without in-depth customization will get your operation burned in a second. After spending countless hours crafting those precious master pieces, one of the main priorities of the red team and threat actors is to protect them from prying eyes (SOC analysts, forensic investigators or security researchers)

This talk will go over established techniques used to prevent analysis. In addition, three anti-copy techniques used by OKIOK’s red team in real engagement will be covered with proof-of-concept releases and detection opportunities. These techniques propose new ways of circumventing the weaknesses of the established ones.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/b4b4c548-cffb-4b23-be27-95929e3df0ad/8986a6e2-ee2e-492d-813e-dc166c6340ca-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ojewbJBdY2Um8BPGPfJa1r</video:player_loc><video:duration>1437</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T13:36:48.345Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/c9ju9Jy91WopVwB1UQPAHx</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/36fd7a1f-9064-4e95-aaad-0e73925c6142.jpg</video:thumbnail_loc><video:title>NSEC2023 - 10 years of NorthSec if you count from 0</video:title><video:description>Olivier Bilodeau is leading the Cybersecurity Research team at GoSecure. With more than 13 years of infosec experience, he enjoys luring malware operators into his traps, writing tools for malware research and vulnerability research. Olivier is a passionate communicator having spoken at several conferences including BlackHat, Defcon, Botconf, NorthSec, Derbycon, and HackFest. Invested in his community, he co-founded MontréHack, a monthly workshop focused on hands-on CTF problem solving, and NorthSec, a large non-profit conference and CTF based in Montreal which you may have heard of.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/5a3dde0f-8954-4bbf-85e5-e8d6586b0889/f708edef-f690-4205-87cd-2c552bef829d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/c9ju9Jy91WopVwB1UQPAHx</video:player_loc><video:duration>4345</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T14:26:06.263Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kP3cWvMFBMnXi22UrU7555</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a6f8ef69-ebcc-4302-b9e7-5db16affd367.jpg</video:thumbnail_loc><video:title>NSEC2023 - Checkmate: using game theory to study the evolution of ransomware</video:title><video:description>Ransomware has changed and adapted over time to survive. Unfortunately, this evolution has led to a grim reality. From a defender's perspective, the sheer number of new strains coming out regularly makes it impossible to defend their infrastructure against every new threat. For attackers, technological advancement created a playground filled with criminal opportunities waiting to be exploited. Game theory perspective is a way to analyze conflicting parties' behaviours to see how each will behave towards their endgames. Zero-sum games are when a player's win causes a direct loss to the other; ransomware is a good example. Traditional game theory research focuses on one attacker vs. one defender during a game. However, this is not the reality defenders face daily. Defenders must defend themselves against multiple attacks during multiple games simultaneously. This means it is far easier for attackers to win than defenders in a zero-sum game. So how can the odds be balanced out? The answer might be reducing the asymmetric information gap between the two parties. This research aims to find the recurring techniques and tactics used over time. Even though ransomware is constantly evolving, specific aspects should remain the same or at least this is what I will find out. I studied over eighty ransomwares over five years (2017-2022). This presentation will cover the evolution of the TTPs over the set period, the stable behaviours and present the observations from the findings.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a06ef37d-df58-4456-ab94-5e3dbe8f14cc/b29d1c7c-c7f7-402c-a23c-a3ca3297c534-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kP3cWvMFBMnXi22UrU7555</video:player_loc><video:duration>1779</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T14:06:50.281Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/mJKg1PwYMxXnQ8ivPogrr5</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2558ed6c-bafb-48c1-bbe9-a2d6dcffd24a.jpg</video:thumbnail_loc><video:title>NSEC2023 - Q&amp;A; Vulnerability Research</video:title><video:description>Q&amp;A panel for the Vulnerability Research block.

Ron Bowes Lead Security Researcher, Rapid7 
Dirk-jan Mollema Security Researcher, Outsider Security 
Philippe Pépos Petitclerc Ph.D. Candidate</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a7eeabb7-1124-4a35-bc58-cc083ffcb90a/c537cb95-642f-4223-81e4-7897b6b7a3a7-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/mJKg1PwYMxXnQ8ivPogrr5</video:player_loc><video:duration>1734</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T14:30:56.328Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/9dQcJMkHuEHi9q8ZCoLZ2D</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/fd084ac5-9c3c-4cba-9790-560ffd76ba20.jpg</video:thumbnail_loc><video:title>NSEC2023 -  the moon and back: How we found and exploited a series of critical vulns in an RPC srv</video:title><video:description>We're always seeing vulnerability reports in the news, but how much do you know about finding and reporting these bugs? In this talk, we're going to look at a series of critical security vulnerabilities in an RPC service developed for mainframes, ported to modern operating systems, and used by most large companies. We'll cover the full process:

    How we prepare the application for analysis
    How we reverse engineer implement the binary protocol
    How the RPC service authenticates users, processes messages, and starts other services
    How we can bypass user authentication
    How we found / exploited a variety of vulnerabilities in the services (including making Metasploit modules)
    How we reported all this to the vendor, and how we coordinated disclosure

Basically, this will be an end-to-end vulnerability research bonanza!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/4293bd83-7c10-4b76-aaec-fe974a8457e3/ef7f5c48-7f30-46be-becb-7dd405665291-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/9dQcJMkHuEHi9q8ZCoLZ2D</video:player_loc><video:duration>1706</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T14:52:14.526Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ja8FpXTNhjLPJgzK82Xs3r</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1d68fa15-df5b-4390-8fcf-79e86c8f7e3f.jpg</video:thumbnail_loc><video:title>NSEC2023 - From On-Premises to Cloud: A Comprehensive Analysis of SAP Security Issues</video:title><video:description>The SAP landscape is complex and highly customized, with numerous systems such as SAP HANA, SAP Solman, SAP Cloud Connector, and SAP ME. Many companies use cloud solutions provided by SAP, such as Cloud SAP HANA and SAP BTP. Those can exchange data with on-premise solutions. The vulnerabilities or misconfigurations in any of these systems can potentially lead to a compromisation of the entire landscape.

In this research, we will discuss the various combinations of security issues and misconfigurations that we discovered last year, which can be exploited by remote attackers or insider users to fully compromise the SAP landscape, both on-premises and in the cloud. We will examine how vulnerabilities and misconfigurations in areas such as password storage and access controls can be exploited to gain unauthorized access to systems and sensitive data. By understanding these vulnerabilities and misconfigurations, companies can take action to improve their security and protect against successful attacks on their SAP landscape.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/930aec28-7dea-4667-98c4-604c7bc92f7d/5598cd2d-a23d-41c4-981b-5a394cea9259-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ja8FpXTNhjLPJgzK82Xs3r</video:player_loc><video:duration>1197</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T15:04:24.529Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/tdZEos1YkNqGhywUZMbABB</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3560ce6b-f06d-4898-a82a-06899d628a7d.jpg</video:thumbnail_loc><video:title>NSEC2023 - Q&amp;A; Malware</video:title><video:description>Q&amp;A Panel for the malware block:

Matthieu Faou Senior Malware Researcher, ESET
Suweera De Souza Senior Security Researcher, CrowdStrike
Pierre-Marc Bureau</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/dc773455-d43a-4dbc-be2d-c8420d7188d9/13f057a0-f0ce-4a97-8d44-9e7194405cd3-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/tdZEos1YkNqGhywUZMbABB</video:player_loc><video:duration>1751</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T15:18:54.901Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/sYAYuoThV87w1k6NpwwmMh</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/9726f184-79b6-428b-b74b-6a0e3a993e2f.jpg</video:thumbnail_loc><video:title>NSEC2023 - Tracking Bumblebee’s Development</video:title><video:description>In March 2022, a new buzz called Bumblebee appeared in the eCrime scene. This loader is built to execute tasks from its command-and-control (C2), and deliver payloads such as CobaltStrike. But its development doesn’t stop there. In the span of less than a year, Bumblebee has been through several incremental updates, to such an extent, that this malware may be one of the most actively maintained malware families out there.

This presentation aims to get a sense of the operator’s development process behind Bumbleebee – how it changes and adapts in response to current endpoint defense efforts– and how its techniques compare to other botnet families.

This presentation will touch on the following areas of the malware: 1. A brief overview of Bumblebee's execution on a system - the importance of its loader, how it executes, communicates with the C2 and the role of the hook module. 2. A chronological view of the development cycle of the malware showing features introduced in response to public reporting, testing new code implementations and refactoring. 3. Comparing Bumblebee’s choice of techniques to that of other known botnet families - the overlaps seen and assessing each techniques’ pros and cons.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/da74cf4b-9620-4cab-b046-62f067c5da02/dade2f30-eaa7-43a4-b48f-51ba42e6b243-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/sYAYuoThV87w1k6NpwwmMh</video:player_loc><video:duration>1163</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T15:14:48.513Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jmoKP13JJUx8i6SXd43vau</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/29b1f938-3e96-4d0d-b726-89ecb49b3ec9.jpg</video:thumbnail_loc><video:title>NSEC 2023 - Vulnérabilités des réseaux overlays VxLan dans les datacenters.</video:title><video:description>Ce talk a pour but d’expliquer comment fonctionne la segmentation réseau chez les grands acteurs d’internet. Nous ferons un focus sur la technologie VxLan qui a remplacé les Vlan dans les datencenters qui hébergent nos données. Nous ferons le point sur les surfaces d'attaques de ces « réseaux overlay », les faiblesses intrinsèques aux protocoles, les vulnérabilités exploitées ou restant à exploiter. On pourra sans doute observer que, chose étonnante, les bonnes vieilles recettes marchent encore et que des 0Days utilisent des concepts simplistes ! Nous présenterons les architectures réseau overlay des grands opérateurs puis nous utiliserons la bibliothèque SCAPY afin de forger des trames réseaux en mettre à l'épreuve les infrastructures cible.Vulnérabilités des réseaux overlays VxLan dans les datacenters.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/949d650f-3247-4409-ac40-170a6e8915fa/1326d217-ec93-491d-94ca-b60debe86883-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jmoKP13JJUx8i6SXd43vau</video:player_loc><video:duration>1381</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T15:26:58.969Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/sWpdJPYKidugREXhX74Gqr</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0e9a90ea-b080-45f4-b365-336624e6216f.jpg</video:thumbnail_loc><video:title>NSEC2023 - Privacy through the lens of code</video:title><video:description>The bonus of data security and privacy till now has always been dumped on consumers - they have to navigate myriads of privacy policies and "Yes, I consent" clicks. Apps keep on leaking data, but hardly are the apps themselves questioned! Some laws (GDPR/CCPA) do outline what data can be collected and how it is supposed to be processed in the software - but this seldom creates actionable engineering directives that developers need to follow to build privacy respecting apps. We always see the privacy protection function from the lens of data collected and stored in DBs. What if we actually dug deeper and started looking not just at what data is collected, but at the exact lines of code responsible for collection and generation of data itself? Imagine a world where privacy is baked in the app itself and is not an afterthought. This talk explores how we can leverage static analysis techniques to find and fix privacy bug, early on in the game - before they ever manifest.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/da26140e-5433-4e35-8bbd-f6cd2174f6e1/236ee46e-93ce-45e5-bbdb-e33ec475e416-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/sWpdJPYKidugREXhX74Gqr</video:player_loc><video:duration>1918</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T15:37:31.622Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/soeT2qzdNnZydgfu8r3Exs</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/9ca87256-46d5-4df1-8ec0-dd0da7318f23.jpg</video:thumbnail_loc><video:title>NSEC 2023 - Asylum Ambuscade: Crimeware or cyberespionage?</video:title><video:description>Asylum Ambuscade is a threat group that came under research scrutiny after it targeted European government personnel in late February 2022, just after the beginning of the Russia-Ukraine war. During the intervening months, dozens of different threat actors have been caught by the security community attacking Ukrainian institutions and their allies. So what makes Asylum Ambuscade different from the others?

First, our investigation reveals that the group is engaged in both espionage and crimeware-related activities. Since March 2022, it has been spying on European diplomats, probably in order to steal confidential information related to the Russia-Ukraine war. At the same time, it has been compromising bank customers and cryptocurrency traders all around the world, including Canada and the United States. We noticed that the group is particularly interested in accessing cryptocurrency wallets stored on common coin exchanges.

Second, since the beginning of the war, not only did Asylum Ambuscade target Ukrainian institutions and their allies, but also individuals and local officials in Russia. Note that we believe that some members of the group are Russian speakers.

Third, the group goes after high-value espionage targets using a custom crimeware-like toolkit. This is very different from other groups operating in the same region such as the Dukes, Sandworm, or Turla, which run only cyberespionage campaigns.

In this presentation, we will describe the whole compromise chain, allowing us to link the group to past crimeware activities from 2020. We will also present an overview of the victimology and the TTPs of the group. Finally, we will discuss why a crimeware group could be engaged in espionage activities.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d5a88593-fe0f-4c74-9d15-8a30a3e0edb8/1a0c9739-f179-41dc-b985-1b534c200401-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/soeT2qzdNnZydgfu8r3Exs</video:player_loc><video:duration>1562</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T15:45:15.551Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/nPAEYfAL322jBTXjcj9z36</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/eecc73f9-2f04-4cdf-ada3-dea59e93ad1f.jpg</video:thumbnail_loc><video:title>NSEC2023 - Roses are red, violets are blue, S4U bamboozles me, U2U too</video:title><video:description>Kerberos, dans son intégration à Active Directory, propose quelques extensions telles que S4U et U2U qui embarquent des mécanismes à l'origine de quelques attaques (e.g. spn-less-rbcd, unpac-the-hash, sapphire ticket). L'objectif de ce talk est de comprendre, une bonne fois pour toutes, comment ces protocoles fonctionnent. Nous ferons le tour des particulirités de Service-for-User et User-to-User. Nous verrons leur implémentation technique, comment abuser de leur comportement, voire comment les combiner. Nous comprendrons alors le fonctionnement des attaques mentionnées plus haut, en particulier sapphire ticket, une variante très difficile à détecter du golden ticket.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/b0b53c82-54b4-4dbe-9c9e-5d6e56ec0f5d/751697bc-52b9-49af-8e3d-5510a2ddc693-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/nPAEYfAL322jBTXjcj9z36</video:player_loc><video:duration>1769</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T15:51:28.337Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/mh3n4AemM6kM2LeS2xyvDb</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f2d53529-237e-4dab-97bb-b8ab64c7006c.jpg</video:thumbnail_loc><video:title>NSEC2023 - Roll for Stealth: Evading AV/EDR Entropy Checks</video:title><video:description>Evading detection by modern AV &amp; EDR can seem daunting and near impossible to the uninitiated. If the idea of trying to get a payload past these defenses seems unattainable and too “l337,” then this talk is for you! I’ll discuss what entropy is and how AV &amp; EDR use entropy to detect payloads. I’ll cover some basic concepts and tools you can use to start evading detection and get your payloads running. Stick around to the end learn about a new tool for hiding shellcode and defeating entropy checks!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a434213e-201e-4a6c-9014-1e3b23f2f810/7b299196-27ec-46ed-9222-7db094d228d8-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/mh3n4AemM6kM2LeS2xyvDb</video:player_loc><video:duration>2048</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-01-25T16:04:32.090Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/mYuxbNhzrDJ9ovp2xAKFbr</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/21bc1950-afc7-4c87-a03c-f4ed6dd8a008.jpg</video:thumbnail_loc><video:title>NSEC2024 - Sergei Frankoff - Technical Analysis Past, Present, and Future</video:title><video:description>Technical Analysis Past, Present, and Future - Insights from a Reverse Engineering Perspective

A few helpful notes from over a decade of reverse engineering malware and documenting the process along the way! By the end of this, you will be able to unpack most malware with a single breakpoint... maybe?

Sergei is a co-founder of OpenAnalysis Inc, and part of the team behind UnpacMe. When he is not reverse engineering malware Sergei is focused on building automation tools for malware analysis, and producing tutorials for the OALABS YouTube channel. With over a decade in the security industry Sergei has extensive experience working at the intersection of incident response and threat intelligence.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a9da02e4-6899-4eca-b60f-c82e4bc492d1/2f17144d-83ba-4962-aa14-27345c1e42d0-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/mYuxbNhzrDJ9ovp2xAKFbr</video:player_loc><video:duration>1151</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T16:06:05.202Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ofnxHJvDVmNnoPpoocWtxW</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f361cd77-f07d-4032-873f-0005110b7806.jpg</video:thumbnail_loc><video:title>NSEC2024 - Corinne Pulgar - Redefining Digital Security: A New Approach for IPV Victims</video:title><video:description>This presentation, informed by a collaborative research project led by CDEACF, the Alliance des Maisons 2e Étape and the Lab-2038, addresses the critical need for specialized digital privacy strategies in support of Intimate Partner Violence (IPV) victims. Rather than looking at what advices security experts can give to IPV victims, we investigate how user experience, security settings and data governance pratices can directly impact their digital and physical safety. Our research highlights how generic, one-size-fits-all threat modelling and security policies by providers, including internet service providers, can inadvertently burden IPV victims. The talk emphasizes the importance of developing nuanced, victim-centred digital security approaches that acknowledge the unique challenges faced by IPV victims. It advocates for a collaborative effort among service providers, technologists, and social welfare experts to create more sensitive and effective digital privacy solutions tailored to the needs of IPV victims.

Corinne Pulgar brings a unique blend of technical expertise and social awareness to the field of digital security. With a Master's in Software Engineering from École de Technologie Supérieure (ETS) and a Bachelor's in Computer Science from Université du Québec à Montréal (UQAM), they possess a deep understanding of software development and security. They have shown a steadfast commitment to education through their contributions as a project manager and InfoSec at Lab2038 and a teaching assistant and lecturer at multiple institutions, including McGill University, ETS and UQAM. Her ability to translate complex technical concepts into accessible knowledge has made them a sought-after lecturer and mentor.

Corinne’s research, presented at conferences and published in journals, focuses on model-driven software engineering and DevOps, demonstrating their innovative approach to software development. Their work at the intersection of technology and inclusivity ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/b42abdf6-7056-4553-856e-9aeb3ce1a3e8/af2cd628-3148-4f9c-af08-377748dc96c5-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ofnxHJvDVmNnoPpoocWtxW</video:player_loc><video:duration>1813</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-01-25T16:32:03.665Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/pdD3PF8GzQDVTpNxMNnoqS</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/c2189954-ee00-465d-8337-d0ec8ddcb012.jpg</video:thumbnail_loc><video:title>Pourquoi choisir Mastodon comme alternative à Bluesky</video:title><video:description>Allô gang! Comme la plupart d'entre vous, je me questionne sur ma présence sur Meta. Suite aux changements de modération qui permettront du contenu transphobe et le virage à droite général de la plateforme, je cherche une alternative à celle-ci. J'aimerais vous jaser de Mastodon et plus précisément de l'instance que mon copain a créé: https://pataterie.ca

On s'entend que Bluesky c'est du pareil au même. Le propriétaire est l'ancien dirigeant de Twitter et ce n'est qu'une question de temps avant que cette nouvelle plateforme devienne bourrée de pub et d'algorithme rage bait. Heureusement, Mastodon et les autres applications du Fediverse existent depuis longtemps et le code est accessible à toustes. Vos données restent les vôtres et vous pouvez toujours déménager de serveur si vous n'aimez pas la vibe de celle sur laquelle vous vous êtes inscrit.e. Je vous laisse un vidéo où j'essaie de vous expliquer le principe. 

Vous pouvez en savoir plus ici: https://fr.wikipedia.org/wiki/Mastodon_(r%C3%A9seau_social) (Merci Wikipedia!)

SVP PARTAGEZ SI VOUS TROUVEZ ÇA PERTINENT! 💫❤️</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/bc05f24b-7f59-47c7-a7c4-f4d9694417c2/00e153de-e144-435e-beca-6e5acda4dc95-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/pdD3PF8GzQDVTpNxMNnoqS</video:player_loc><video:duration>329</video:duration><video:rating>5</video:rating><video:view_count>76</video:view_count><video:publication_date>2025-01-27T04:24:29.578Z</video:publication_date><video:tag>mastodon</video:tag><video:tag>fediverse</video:tag><video:tag>quebecois</video:tag><video:tag>français</video:tag><video:tag>bluesky</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/astardust_channel/videos">Main astardust channel</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/t58Sw5dPYYbM4zYPdpWpqK</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8855ac71-8ab6-4348-88de-208dcd6b816a.jpg</video:thumbnail_loc><video:title>Les unions qu'ossa donne?  | YVON DESCHAMPS</video:title><video:description>Redécouvrez la carrière d'un des plus grand humoristes québécois, Yvon Deschamps. Référence incontournable de l'humour social des années 1960, c'est une figure de proue dans le monde de la comédie au Québec. Ses sketches ont influencé un grand nombre de nos humoristes d'aujourd'hui, et le corps de son oeuvre a contribué au patrimoine culturel du Québec.  

Plongez dans ses meilleurs monologues et spectacles, accessibles maintenant sur sa chaine Youtube.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/db3a91d0-10c6-4e2c-88bd-4a1205882cf7/46351963-c1c5-4d36-91a1-74b7773d0881-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/t58Sw5dPYYbM4zYPdpWpqK</video:player_loc><video:duration>518</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-01-28T14:37:41.574Z</video:publication_date><video:tag>yvon deschamps</video:tag><video:tag>monologue</video:tag><video:tag>québec</video:tag><video:tag>humour</video:tag><video:tag>satire</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/iq5PAhcTr2dAx53Gemuj8h</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/855ffcad-bef4-407c-803f-c80c6e7e529d.jpg</video:thumbnail_loc><video:title>CIBL 101.5 FM : Trait d'Union - Vendredi 31 janvier 2025 - Roxanne Hallal</video:title><video:description>« Si on se parlait, la société se porterait mieux », c’est ce que croit LOUISE CURODEAU qui anime TRAIT D’UNION. Cette émission est une table ronde incontournable qui réunit celles et ceux qui se joignent à la seule émission de radio consacrée au dialogue entre les générations. Des boomers, des X, des Y, des Z y participent et retirent leurs filtres, leurs lunettes pour écouter et comprendre. Les discussions portent sur des sujets variés qui les interpellent et les distinguent. C’est fait dans la bonne humeur avec ouverture d'esprit, humour, passion et sincérité. La musique accompagne les sujets évoqués et des invité.es pertinents°tes et enthousiastes viennent alimenter les thèmes abordés. </video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/8d082daf-8de6-435e-85f5-eb6d7af3b9ee/bcb25c64-6344-4955-993e-1a82fb595ead-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/iq5PAhcTr2dAx53Gemuj8h</video:player_loc><video:duration>5432</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-02-04T00:00:08.151Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/dans_les_medias/videos">Dans les médias</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/evjXZhhkoaNBUNarkzXTW7</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/bd405b11-0e91-4859-80bf-9e65b9fe694f.jpg</video:thumbnail_loc><video:title>Radio-Canada Première - Tout un matin - Entrevue avec Roxanne Hallal : En quoi consiste le protox...</video:title><video:description>Radio-Canada Première - Tout un matin - Entrevue avec Roxanne Hallal : En quoi consiste le protoxyde d’azote??</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6d5f0f48-1076-46b7-8658-687424a3cfb6/c99bda88-647e-40a8-8d84-3f0d5354db13-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/evjXZhhkoaNBUNarkzXTW7</video:player_loc><video:duration>512</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-02-04T15:01:54.565Z</video:publication_date><video:tag>Entrevue</video:tag><video:tag>Drogues</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/dans_les_medias/videos">Dans les médias</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ceKhVjvWUbtvtNPaefCjTH</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/670a127f-86c3-454c-b054-e26a75b9cb6d.jpg</video:thumbnail_loc><video:title>DETGEP À Salut Bonjour! - Guilaume Ross</video:title><video:description>Le magnifique DETGEP GSD (Gas Saving Device) fait la manchette</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/5affdfad-1ebc-4e7d-877c-0616ffc7b39f/93969b94-875d-4c20-a979-6a6fe7377e84-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ceKhVjvWUbtvtNPaefCjTH</video:player_loc><video:duration>120</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-02-12T03:14:07.575Z</video:publication_date><video:tag>funny</video:tag><video:tag>joke</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/dans_les_medias/videos">Dans les médias</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7qBwruYTLsqhnTLKYpsZ49</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/96b52653-1649-46a0-a154-fd8a0cf942a5.jpg</video:thumbnail_loc><video:title>Groupe Tazor le nouveau Facebook</video:title><video:description>Groupe Tazor le nouveau Facebook</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3406934c-b2d7-4250-999b-406ad5334cfa/bd7708be-ebce-4249-9403-968a0bfcd09e-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7qBwruYTLsqhnTLKYpsZ49</video:player_loc><video:duration>88</video:duration><video:rating>0</video:rating><video:view_count>4</video:view_count><video:publication_date>2025-02-12T03:26:27.313Z</video:publication_date><video:tag>Groupe Tazor</video:tag><video:tag>Facebook</video:tag><video:tag>réseau social</video:tag><video:tag>Québec</video:tag><video:tag>Pied de géant</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/sktcLaayJh6tsstRFPAw3A</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/7ebf6873-2b15-4b71-86c2-a7567745f977.jpg</video:thumbnail_loc><video:title>Pourquoi Elon Musk veut-il s'offrir OpenAI, un géant de l'intelligence artificielle? | 24•60</video:title><video:description>Rabroué par OpenAI, pourquoi Elon Musk veut-il s'offrir le géant de l'intelligence artificielle? 

Geneviève Garon reçoit Jean-Philippe Décarie-Mathieu, analyste et spécialiste en risques technologiques.

Pour plus d'informations, lisez nos articles : 

- Les États-Unis s’opposent à un « dialogue mondial » au sommet de Paris sur l’IA
https://ici.radio-canada.ca/nouvelle/2139493/sommet-intelligence-artificielle?utm_source=youtube&amp;utm_medium=description&amp;utm_campaign=rcinfo

- Trudeau et Macron plaident pour un meilleur encadrement de l’intelligence artificielle
https://ici.radio-canada.ca/nouvelle/2139182/ethique-encadrement-ia-trudeau-macron?utm_source=youtube&amp;utm_medium=description&amp;utm_campaign=rcinfo

- Elon Musk et des investisseurs cherchent à prendre le contrôle d’OpenAI
https://ici.radio-canada.ca/nouvelle/2139457/musk-investisseurs-controle-achat-openai?utm_source=youtube&amp;utm_medium=description&amp;utm_campaign=rcinfo

#ICIRDI
--
Abonnez-vous à notre chaine : https://www.youtube.com/radiocanadainfo?sub_confirmation=1

Accédez aux nouvelles essentielles en téléchargeant l'application Radio-Canada Info : https://ici.radio-canada.ca/appli-info/?utm_source=google-youtube&amp;utm_campaign=nat.pn.applircinfo&amp;utm_medium=interne&amp;utm_term=info-appli&amp;utm_content=fiche-cus 

Retrouvez-nous aussi sur :
X : https://twitter.com/RadioCanadaInfo
TikTok : https://www.tiktok.com/@radio.canada.info</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d5458048-1125-47fb-9632-1f62016e952e/db770de1-3a8b-4790-b3a1-01f2636e4316-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/sktcLaayJh6tsstRFPAw3A</video:player_loc><video:duration>543</video:duration><video:rating>0</video:rating><video:view_count>3</video:view_count><video:publication_date>2025-02-13T17:21:54.887Z</video:publication_date><video:tag>rcinfo</video:tag><video:tag>radcan</video:tag><video:tag>radiocan</video:tag><video:tag>radio canada</video:tag><video:tag>2460</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/dans_les_medias/videos">Dans les médias</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/hJhffpjjZ2setd1J46zu5C</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/91b79a37-2715-405d-8c6d-28cedf51f3f7.jpg</video:thumbnail_loc><video:title>Oracle Unconfirmed Data Breach - Rose87168 claims this video was downloaded from Oracle's servers</video:title><video:description>Source - https://x.com/rose87168/status/1904197798943195277
Uploaded by Hudson Rock - https://www.hudsonrock.com</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/877977f9-0af2-4016-a247-d32d35c4f6d4/89f426e7-161a-483f-b456-f3e7690468d6-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/hJhffpjjZ2setd1J46zu5C</video:player_loc><video:duration>5122</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-03-31T18:12:18.165Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kUK4vCDtQYEP7dz76UXK9i</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/cb255dbb-8f33-44f6-b255-7ed59ef7486d.jpg</video:thumbnail_loc><video:title>Legally Blonde The Musical (Pro-shot MTV)</video:title><video:description>Legally Blonde: The Musical tells the story of Delta Nu Sorority Sister Elle Woods, and her amazing trip in pursuit of sexy man Warner Huntington III. Along the way she meets friends Emmett, Paulette, and all her Delta Nus see her through.

Starring:

Laura Bell Bundy as Elle Woods
Christian Borle as Emmett Forrest
Orfeh as Paulette Bonafonté
Michael Rupert as Professor Callahan
Kate Shindle as Vivienne Kensington
Richard H. Blake as Warner Huntington III
Nikki Snelson as Brooke Wyndham</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a13ad8fa-bc13-44d8-a511-daddaffa3ce5/6478ba52-1a3d-4a8a-84cb-f9c4379027c9-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kUK4vCDtQYEP7dz76UXK9i</video:player_loc><video:duration>7404</video:duration><video:rating>0</video:rating><video:view_count>5</video:view_count><video:publication_date>2025-04-02T04:07:13.890Z</video:publication_date><video:tag>legally</video:tag><video:tag>blonde</video:tag><video:tag>musical</video:tag><video:tag>mtv</video:tag><video:tag>pro</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/slime/videos">Slime tutorials</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jm49jP5WNZfpaw4HnoKG6j</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/27c084a7-5d6e-4af3-9832-a291132a0f7d.jpg</video:thumbnail_loc><video:title>DIY HRT: Everything I Can Legally Tell You</video:title><video:description>Get Nebula using my link for 40% off an annual subscription: https://go.nebula.tv/lilyalexandre
Watch my exclusive video on Advent, the artwork featured in this video: https://nebula.tv/videos/lilyalexandre-the-worlds-burning-lets-look-at-some-cool-art

––––
As trans healthcare bans spread across the globe, many people are taking matters into their own hands by using unprescribed hormones bought in secret. Here's what you need to know.

––––
Donate to Trans Harm Reduction: https://transharmreduction.org/
Support the channel on Patreon: https://patreon.com/lily_lxndr
For feedback or corrections, please fill out this Google form: https://forms.gle/fhyoSERyM9aBnazv9

––––
RESOURCES
Blood test guide (Gender Construction Kit) https://genderkit.org.uk/resources/blood-testing
Blood test guide (Trans Harm Reduction) https://transharmreduction.org/blood-tests
Safer Hormone Injection Guide https://fenwayhealth.org/wp-content/uploads/Hormone-Injection-Guide_final_web.pdf
Comprehensive guide to feminizing HRT https://www.rainbowhealthontario.ca/TransHealthGuide/gp-femht.html
Comprehensive guide to masculinizing HRT https://www.rainbowhealthontario.ca/TransHealthGuide/gp-mascht.html
Ongoing study on progesterone in the Netherlands: https://pmc.ncbi.nlm.nih.gov/articles/PMC10734173/pdf/40360_2023_Article_724.pdf
––––
The full source list is too long to fit in this description. View it here: https://docs.google.com/document/d/1xEax1kBGvZOVOnS-fK1xubD4naFyW2CkBw2vMcSBHTM/edit?usp=sharing

––––
CORRECTIONS + NOTES
✶ 36:48 Whether or not bicalutamide prevents hair loss is disputed. My impression is that it can prevent it somewhat, but not as well as other anti-androgens unless taken with finasteride.
✶ 41:20 Rectal administration of progesterone IS more effective. More info here: https://transfemscience.org/articles/oral-p4-low-levels/
✶ 42:38 Testosterone gel is applied to the skin once a day, not injected every 5-30 days. Forgot to change the text from ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/94914efc-ca28-4110-92a9-9a39719d5ccc/dbe4e9e7-4499-4092-9027-05402bcb72b5-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jm49jP5WNZfpaw4HnoKG6j</video:player_loc><video:duration>3464</video:duration><video:rating>0</video:rating><video:view_count>10</video:view_count><video:publication_date>2025-05-07T19:08:01.379Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ob5fbca94kFc8MikakdpEy</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/e2169c84-cfa9-4eae-91fe-4d2925097658.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Workshop Vieux-Montreal - Day 1</video:title><video:description>NorthSec 2025</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/b3911a9b-254e-47bb-bbbc-da336e3a2be8/11f31768-d7ff-478f-913c-9de904a0dda7-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ob5fbca94kFc8MikakdpEy</video:player_loc><video:duration>10613</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-05-15T22:00:44.470Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/uHeb8Fu3ujfBJyG8gZz7K1</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8e759bb7-1af5-40f6-926f-e644eed3c6e1.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Workshop Salle de la Commune - Jour 1</video:title><video:description>Workshops are starting in the Community Room!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e8817f09-ecfd-4bfa-a740-2e876e2ad46e/ffb455b0-fb57-4b7d-9257-f98ff3ab6189-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/uHeb8Fu3ujfBJyG8gZz7K1</video:player_loc><video:duration>11040</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-05-15T22:01:04.426Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/tx1gDV4S5E3EzPudgHUXn9</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0955d39e-d5b7-4a7b-b9ce-a93b2b71ed1f.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Salle de Bal - Day 1</video:title><video:description>NorthSec 2025 opens another stage!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/defaf78e-604c-4391-ac71-07dcf843c596/9c471735-65e3-43a4-b90a-902abca7754b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/tx1gDV4S5E3EzPudgHUXn9</video:player_loc><video:duration>19192</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-05-16T05:13:24.417Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/mDKyz2UM28BjyAnbpLkoMS</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0c211bc0-92f6-4fd3-b622-a5c0f71aad69.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Salle Ville-Marie - Day 1</video:title><video:description>NorthSec 2025 begins!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a73c2371-2042-494b-84d5-0c9c9f66b994/1d77674d-915b-4b0a-bbf2-e585e2b87ce8-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/mDKyz2UM28BjyAnbpLkoMS</video:player_loc><video:duration>29966</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-05-16T05:15:01.463Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/co3jbAkvo2yiDVTqG7nX9i</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/17f47ba2-c9f0-476c-9a46-9e3fc60fc727.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Workshop Salle de la Commune - Jour 1</video:title><video:description>Workshops are starting in the Community Room!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/5c28505e-6df7-46ed-9060-360d1908c1c5/378a01f6-aa5d-4ffb-beef-f3c175a778bb-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/co3jbAkvo2yiDVTqG7nX9i</video:player_loc><video:duration>7188</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-05-16T05:50:45.231Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/vE2G9EvLGX2sJoKUcKkftM</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/da176d5d-a602-40b8-a621-9b7409a5e636.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Workshop Vieux-Montreal - Day 1</video:title><video:description>NorthSec 2025</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f02853c8-38cd-4d3a-afe0-527008a0b14b/7b392519-c5a5-4597-997d-96ecd68c82d0-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/vE2G9EvLGX2sJoKUcKkftM</video:player_loc><video:duration>6989</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-05-16T05:50:57.470Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/xrdtxrsnBbDe9DPqf6KUaA</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3d2cc82d-0952-4d56-91cf-2f02915d680a.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Workshop Vieux-Montreal - Day 2</video:title><video:description>NorthSec 2025 workshops resume in Vieux-Montreal!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/fe9094a3-5266-4c78-802f-17c52179d6c4/660e98bc-d603-4d7f-b701-b956e7be369d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/xrdtxrsnBbDe9DPqf6KUaA</video:player_loc><video:duration>7560</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-05-16T18:52:08.560Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ua4WyzYfEmr2Ha6irhpref</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/789d3aa0-6cf1-4aa0-88c1-8994db2ba8c2.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Salle de Bal - Day 2</video:title><video:description>NorthSec 2025 resumes in Salle de Bal!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e4040145-68ac-4747-bdc8-66f71c91f07c/6d1c2026-c41d-41bd-a030-e295abf2e340-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ua4WyzYfEmr2Ha6irhpref</video:player_loc><video:duration>7525</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-05-16T18:52:44.118Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/fHUbuLkqip3pibQtfzhVK1</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/54bf7de5-3639-43af-9c44-a31a05132983.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Workshop Vieux-Montreal - Day 2</video:title><video:description>NorthSec 2025</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/773997ed-c3f8-404d-89b8-0b31054fa342/7a8b0304-2ca5-42c8-bbfd-16c7352dba95-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/fHUbuLkqip3pibQtfzhVK1</video:player_loc><video:duration>5276</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-05-16T19:50:54.974Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/6QewW4PjrYRqi2sHcSU9dr</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/6c1d0d0d-abfa-4582-81a0-c5e238a2f709.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Salle Ville-Marie - Day 2</video:title><video:description>NorthSec 2025 resumes!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/2f39bc05-9b84-470a-83bc-e8c7f2efab51/dd8cb3dd-0b4c-4ca5-98fa-6dd5779a4aeb-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/6QewW4PjrYRqi2sHcSU9dr</video:player_loc><video:duration>28790</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-05-17T01:18:01.005Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/1GmmCJFgksfDsGoBfgcCAD</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a5576550-34ce-4adc-a3e3-951e76a22808.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Hacker Jeopardy</video:title><video:description>NorthSec famous jeopardy streamed live!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/05a24ba4-457e-455a-b98e-744d8d47c511/3f0611d6-df3a-4a8c-8f72-1cc35962ee0b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/1GmmCJFgksfDsGoBfgcCAD</video:player_loc><video:duration>10571</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-05-18T06:17:53.508Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wMxunjH1Zh3kHLdHU2NKbu</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/e82cea70-34dd-45eb-b357-340089f69827.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Closing Ceremony</video:title><video:description>NorthSec is already over, come see who won!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f94e0909-1bd9-441a-872d-276e4e99ac6c/ee3a05f9-f27e-479a-a4f2-a473c1cebfa4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wMxunjH1Zh3kHLdHU2NKbu</video:player_loc><video:duration>4372</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-05-18T21:51:12.735Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/tNpDyyfYZtvRmE5Wyj5dbC</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a52ce7d3-dab5-40d2-9d8d-efa6d07d01a1.jpg</video:thumbnail_loc><video:title>Vulnerability Management  Spotting BS and Securing Systems</video:title><video:description>Vulnerability Management  Spotting BS and Securing Systems</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e12187d5-2b5b-4679-b769-66b3e419cd58/e5c6bc9c-46df-4db1-9900-d3e26e412c33-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/tNpDyyfYZtvRmE5Wyj5dbC</video:player_loc><video:duration>40</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-05T21:04:09.557Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jy8jtho6sidHjWbrhV2cSJ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/73adfa85-11c6-4cc1-9069-d1a29f82618e.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - HD Moore - A Pirate's Guide to Snake Oil and Security</video:title><video:description>Welcome aboard the CVSS Bonsecours! Our first stop is the island of Vulnerability Management; a wild place first settled by hackers, now congested with warring tribes, each selling magick ointments that they claim will protect your ship from ghosts, whirlpools, termites, and giant squids alike. We'll visit these tribes, compare their warez, identify the useful products, and highlight those that just leave you greasy and poor.

--</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9640ce82-7180-473c-8309-c33d200b67c2/b31b90d0-8a89-439f-969c-b55cbe5566df-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jy8jtho6sidHjWbrhV2cSJ</video:player_loc><video:duration>2283</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-05T22:11:12.542Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/qxXqGNMvntsm2KWrCZdKZy</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/6f73848b-6e55-48ed-bd04-7427cbac394c.jpg</video:thumbnail_loc><video:title>Cybersecurity Goldmine  How Hackers Get Infected!</video:title><video:description>Cybersecurity Goldmine  How Hackers Get Infected!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c6d18aca-4241-4f21-bc86-a2d2ce12b746/a5d55094-18a8-463f-b187-ab256c9e8c96-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/qxXqGNMvntsm2KWrCZdKZy</video:player_loc><video:duration>36</video:duration><video:rating>0</video:rating><video:view_count>3</video:view_count><video:publication_date>2025-10-06T15:03:59.758Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/u1fBP5yhFJsDcMZY6sEba6</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/34ce8aa7-39a5-4c9b-b699-40e28f779528.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Estelle Ruellan - UNO Reverse Card: Exposing C2 Operators Through Their Own Logs</video:title><video:description>Infostealers are malware that collect sensitive data from infected devices and transmit it to Command-and-Control (C2) servers operated by cybercriminals. The resulting stealer logs, containing credentials and system information, fuel a lucrative underground market. But what if C2 operators also fell victim to their own skim : the biters bit. Our research reveals that C2 operators themselves sometimes become unwitting victims, exposing valuable intelligence about their operations. In this presentation, we will be turning the tables on the very actors behind infostealers. Through analysis of stealer logs, we uncover diverse profiles within the infostealer ecosystem. Most notably "NoObSec" - amateur operators with critically poor security practices who can be de-anonymized through their own logs, and "Skip Tracers' Nightmares" - sophisticated actors operating from dedicated virtual machines who maintain strict operational security. These contrasting profiles demonstrate the wide spectrum of expertise in the infostealer landscape, from those who inadvertently expose their identities to those who masterfully conceal their tracks while orchestrating complex campaigns. This presentation presents case studies including a malware distributor using cracked software for infection and a threat actor operating multiple malware families to create a complex cybercriminal ecosystem. These examples demonstrate how stealer logs serve as powerful investigative tools for understanding both cybercrime infrastructure and techniques shaping the infostealer landscape. Join us as we pull back the curtain on the cybercriminal backstage.

Estelle is a Threat Intelligence Researcher at Flare. With a background in Mathematics and Criminology, Estelle lost her way into cybercrime and is now playing with lines of codes to help computers make sense of the cyber threat landscape. Estelle presented at conferences like ShmooCon 2025, Hack.lu 2024, eCrime APWG 2024 in Boston and the 23rd Annual Eu...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e2c8e40b-6880-4b4f-a246-ee64bd03eaa7/fa9f2e28-0575-4901-ad0f-f80cb4e757b5-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/u1fBP5yhFJsDcMZY6sEba6</video:player_loc><video:duration>1292</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-06T15:07:47.688Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/186ja6zQuAxiNUFiFUpTyM</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/58a402cc-6338-4225-8965-6b7fd85254ed.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Francois Proulx - Living Off the Pipeline</video:title><video:description>NorthSec 2025 - Francois Proulx - Living Off the Pipeline</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/00fd7b0d-5d57-497d-b549-3ce531977191/361c83c2-53df-4c52-9ce6-1b8a23ed2cf2-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/186ja6zQuAxiNUFiFUpTyM</video:player_loc><video:duration>1653</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-07T11:11:33.013Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/9rtkUX4kvUrnwqyT9BWknP</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2a15f53a-5e7f-42ec-bbef-94a47c7d0ea7.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Francois Proulx - Living Off the Pipeline</video:title><video:description>The next wave of Supply Chain attacks is brewing in our Build Pipelines (CI/CD), where 0-days and novel attack paths are still waiting to be discovered. In 2024, the XZ compression library compromise was used as a trojan horse to backdoor OpenSSH, thankfully, this was caught early on, but the next time it might go unnoticed for much longer. This talk picks up where we left off last year, and we tell the story of how we went from finding 0-day vulnerabilities in the Build Pipelines of critical Open Source packages to predicting TTPs for the next XZ-like attacks. This time we've adapted MITRE's ATT&amp;CK framework for CI/CD environments. We'll go in depth on how Threat Actors can "Live Off the Pipeline" by abusing legitimate build tools to do their bidding proving why this has become Red Teamer's favorite new soft spot.

The session introduces practical methods for predicting and identifying threats before they materialize by mapping build pipeline tactics to our adapted ATT&amp;CK model. Real-world case studies, based on our forensics of the recent Kong Kubernetes Ingress Controller and Ultralytics YOLOv5 ML library compromises, will demonstrate how adversaries exploit build pipelines, escalate privileges, and can remain undetected long enough to have significant impact.

This session empowers attendees to proactively identify and defend against advanced supply chain attacks, effectively countering adversaries that seek to "Live Off the Pipeline" as demonstrated in the XZ compromise.

--
François is VP of Security Research at BoostSecurity, where he leads the Supply Chain research team. With over 10 years of experience in building AppSec programs for large corporations (such as Intel) and small startups he has been in the heat of the action as the DevSecOps movement took shape. François is one of founders of NorthSec and was a challenge designer for the NorthSec CTF.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/44578df0-a850-4138-97e5-550dfe5267fd/cae5b90c-358b-4b39-8732-e3fd5994454b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/9rtkUX4kvUrnwqyT9BWknP</video:player_loc><video:duration>1653</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-07T13:11:31.377Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/bhikFkmoT3FXxrFdHzaCdo</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/4a0abdab-133a-4d90-a855-4861e344f4a3.jpg</video:thumbnail_loc><video:title>Radar2 for Malware Reverse Engineering  20 Years Strong!</video:title><video:description>Radar2 for Malware Reverse Engineering  20 Years Strong!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/5341f8fe-48e4-4602-a4c9-c91e3a0fa476/31a1fd23-188f-447a-806a-57a8771b16f6-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/bhikFkmoT3FXxrFdHzaCdo</video:player_loc><video:duration>40</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-08T16:06:59.307Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7mUUDzaxfYGECLyWfMfQxL</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/590d876f-26b3-4f35-a242-dcc8471f0c28.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Axelle Apvrille - Linux and IoT malware analysis with r2ai</video:title><video:description>A full malware analysis is quite long to perform. Depending on its complexity and the desired level of details, it takes between half a day and 10 days. Can we speed up the process with assistance from Artificial Intelligence (AI)? Will the quality of the analysis be good enough?

I started the research open minded, not knowing whether the outcome would be positive or not. For my tests, I collected recent Linux and IoT malware that I had never worked on before, and analyzed the binaries with r2ai. The r2ai project handles the communication between r2 - the Radare2 open source disassembler - and a LLM. The results were astonishingly good. The main functions of the malware were often decompiled in a very correct and understandable manner. We can even get the AI to defeat obfuscation mechanisms. Personally, I hadn't expected the AI to be that good, but - as with everything? - there were many caveats:

You cannot expect the best results in a single go. Using an AI is comparable to team work with a smart intern. You need to discuss and guide the AI towards what you are interested in.
The AI is very convincing, but you should not trust it blindly (never!). You need to check everything it claims. Hallucinations are the best known issues, but we also need to take care of omissions (very frequent) and exaggerations.
Costs are usually controlled and very low, but in some cases, they can grow a bit too quickly if you do not pay attention to the amount of data you send to the AI.
In this presentation, I will show how to use r2ai over recent versions of Linux/Ladvix (aka Rhomba, Ebola) and a Linux shellcode of March 2025. We will tackle the 3 issues we mentioned previously, and see how to get the best results, spot hallucinations etc while keeping costs below 10 dollars.

Expect several demos.

--

Axelle Apvrille is a Principal Security Researcher at Fortinet, Fortiguard Labs. Her research interests are mobile and IoT malware that she reverses every day. In addition, she is ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3382501a-4ae8-4650-abb3-ff1fcdbfd432/e57b66eb-9244-445a-bfe2-7112c0acd54d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7mUUDzaxfYGECLyWfMfQxL</video:player_loc><video:duration>1706</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-08T16:13:15.653Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/6RQL8aC7HvojEcKTYKUGp9</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0ca10edb-821a-45dc-9cb8-eba74af0b0e1.jpg</video:thumbnail_loc><video:title>Security  Unlock Humility and Know Your Limits!</video:title><video:description>Security  Unlock Humility and Know Your Limits!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/2f73301a-e485-4630-894a-e91d787fe0ee/c78618e6-09a3-4737-b30c-284986b1143f-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/6RQL8aC7HvojEcKTYKUGp9</video:player_loc><video:duration>79</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-09T15:08:24.489Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kixVguPGuUbTCt717f53Do</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2a134cfa-d950-44a4-937d-fa0c32f7a64f.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Jeremy Miller - From Security to Safety</video:title><video:description>This talk explores the intersection of philosophy, ethics, security, and AI. As AI systems like LLMs become increasingly ubiquitous in our lives, security practitioners are shifting from testing security to testing for safety - a fundamentally normative issue. A transition to this new paradigm can be an uneasy one for professionals accustomed to the comfort of (relatively) objective processes. I argue that despite some initial discomfort, penetration testers &amp; red teamers - with our rich history of social awareness and ethically motivated action - are well-positioned to tackle AI safety and responsibility challenges. We can do this by reframing what we already know how to do so well in other contexts: balance technical rigour on a robust foundation of humility, curiosity, compassion and epistemological self-awareness.

--
Jeremy has spent the last decade helping individuals and organizations improve their cybersecurity skills, mindset, and understanding. Prior to jumping into penetration testing, Jeremy was a martial arts instructor and a philosophy student. Both disciplines continue to deeply influence his unique perspective on teaching and learning cybersecurity. Jeremy currently serves as Sr. Manager of Content Strategy and Development at OffSec (formerly Offensive Security).</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9c50f2f4-743f-4d34-8803-adabfd046200/9a964093-7fa8-4e52-bc39-d6922193fe97-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kixVguPGuUbTCt717f53Do</video:player_loc><video:duration>1632</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-09T16:13:57.108Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/9K2h4WEqF5fym4dLuu1ZRn</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/551a16ea-7b19-47a4-9690-c4b3dd0c0647.jpg</video:thumbnail_loc><video:title>Salesforce Security  EXPOSED! How I found Customer Data</video:title><video:description>Salesforce Security  EXPOSED! How I found Customer Data</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/46cae0de-2c33-4960-8275-0decfb110f73/d2f7ab5d-5692-4532-afd8-0d77f78d9b55-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/9K2h4WEqF5fym4dLuu1ZRn</video:player_loc><video:duration>103</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-10T13:09:36.627Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/qgbNAeuJEEQ38n6doX63qT</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3b61611c-7be9-4568-8fbc-0055fbc4bbdd.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Jessa Riley Gegax - Salesforce Snafus</video:title><video:description>This talk explores how to leverage the nooks and crannies of Salesforce to find and abuse misconfigurations that chain together and create serious vulnerabilities that leak sensitive data to adversaries. It highlights that security concerns still exist on applications built on a well-known CRM tool with declarative or "point-and-click" development, where to discover them, and how they can be remediated. It provides a real-world scenario of using various Salesforce widgets to find security vulnerabilities like Insecure Direct Object References (IDORs) and Broken Authorization as a means of stealing sensitive client information. It offers solutions for detection and prevention for these elevated attacks that relate to common security best practices. At the end of this discussion, you will walk away with better awareness of the vulnerabilities existing in Salesforce, how they can be discovered, remediated, then prevented. You may even learn a new trick or two on how to think like a hacker when building your company's next communication tool!

--
Jessa Gegax is an Information Security Testing Analyst at Surescripts LLC in Minneapolis, MN. Jessa holds an undergraduate degree in Computer Science and minor in Environment and Natural Resources with research interests in offensive cloud security, IoT devices, and web application/API penetration testing. In their free time, Jessa likes to go backpacking, practice yoga, and spend time with their dog (in no particular order).</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c47a2463-c50f-4fcc-a3b4-4aa719f4df63/6532fe8a-7d17-4994-bc1d-4bd5071c9299-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/qgbNAeuJEEQ38n6doX63qT</video:player_loc><video:duration>1124</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-10T13:09:41.317Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/gD1fy7K2z1XtzQjH9rLTiH</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/f2f55818-6a8f-464a-9bab-645beeffde5a.jpg</video:thumbnail_loc><video:title>Bypassing EDR  Red Teaming Techniques Explained</video:title><video:description>Bypassing EDR  Red Teaming Techniques Explained</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7ea3c108-062d-4cd1-a4ef-8802a27b7fdf/71b95083-d477-4bb2-83a2-d9aa5e57e921-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/gD1fy7K2z1XtzQjH9rLTiH</video:player_loc><video:duration>84</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-12T17:04:31.602Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/1cKkyuN7ELLs84cULsAkqu</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/675ca482-af51-4f58-85ef-f91de265eddc.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Jake Mayhew - Red Team Road Rage: Weaponizing Vulnerable Drivers to Blind EDR</video:title><video:description>Endpoint Detection &amp; Response (EDR) tools are becoming more and more sophisticated, requiring attackers (both good &amp; evil) to work ever harder to subvert them. This talk will address the architecture of EDR solutions (with a focus on kernel-mode components), the various sources of telemetry, and how an attacker can leverage 3rd-party vulnerable drivers to blind an EDR agent. The audience should walk away with a deeper understanding of the inner workings, capabilities, and limitations of market-leading EDR tools.

--
Jake Mayhew is an experienced information security professional who currently serves as the technical lead for the offensive security team at UPMC. Before serving on an internal red team, he spent several years in consulting delivering security tests for clients in finance, healthcare, retail, critical infrastructure/nuclear energy, and law. He holds the OSCE3 (OSED, OSWE, OSEP), OSCP, CRTO, and OSDA certifications and loves to assist others in their cybersecurity learning path. Jake is one of the founding members of Applied Technology Academy's Asymmetric Training Group (ATG), and has a passion for sharing real-world knowledge and cutting-edge solutions with his students. Jake has led &amp; co-led offensive security trainings including the PEN-200 OSCP training at BlackHat USA.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/01a3e395-4ddd-4d53-a262-0d5ab76ddd28/7a5328f6-326b-46eb-bd3d-fe5c81a75f2e-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/1cKkyuN7ELLs84cULsAkqu</video:player_loc><video:duration>1790</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-12T18:09:44.899Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/eYGnnR1kZWuDswPvAQwzaS</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8ed2c5db-93ad-4438-b7e7-ad707c17bda3.jpg</video:thumbnail_loc><video:title>Hidden Alexa  Unbelievable Story From Behind The Wall!</video:title><video:description>Hidden Alexa  Unbelievable Story From Behind The Wall!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/713154ea-fb7e-44f7-8fd1-d36ac6744f90/85b85e7b-3ad4-4f5e-a2b8-8c6442e33e3a-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/eYGnnR1kZWuDswPvAQwzaS</video:player_loc><video:duration>72</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-13T13:07:13.424Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/9fMTsS9rnHXXatfC1XKqVJ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/6288c283-c687-42b3-9787-1d5911091d10.jpg</video:thumbnail_loc><video:title>AI Safety  Understanding Your Adversary's Mindset</video:title><video:description>AI Safety  Understanding Your Adversary's Mindset</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/42d9cd15-9c3d-4598-bab5-27446cb437b4/1e4e8a59-13a4-4c9c-b970-5aaeca73f908-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/9fMTsS9rnHXXatfC1XKqVJ</video:player_loc><video:duration>54</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-13T13:12:11.215Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/vf3ARbRRyU8SLgdhbRKhTf</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3e3235e0-f891-4b0c-b439-1fd68e1a6c27.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Catherine DG - When the threat actor lives under your roof</video:title><video:description>Spied on, followed, tormented: 70% of victims of domestic violence report experiencing technological abuse. As the technological environment around victims becomes more complex, how can we work to improve digital literacy among vulnerable populations and implement support tools?

--
Co-founder at cybercitoyen.org - an organization dedicated to making cybersecurity accessible to everyone to promote digital literacy and contribute to shaping cyber citizens who are alert, engaged, and proactive in protecting their personal information. Teacher at Polytechnique Montréal.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/eccf0967-9c61-4bb2-be2f-559f044903e4/4c6dce7a-ef57-404d-8fcb-2998d3cf7ae8-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/vf3ARbRRyU8SLgdhbRKhTf</video:player_loc><video:duration>1622</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-13T13:12:17.299Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/hmLf1QMJsdUc8P45YjcFjK</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1352cc91-927f-4ae5-a359-11aa6c91fe24.jpg</video:thumbnail_loc><video:title>Phishing Emails  Why People Click on Monday Mornings</video:title><video:description>Phishing Emails  Why People Click on Monday Mornings</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/84785bdc-7504-4af3-859a-10055d165413/6ac54e68-98fe-44aa-80e2-3a32884848e1-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/hmLf1QMJsdUc8P45YjcFjK</video:player_loc><video:duration>67</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-14T20:15:12.052Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/jMjZzv3qjKDw57ZTTqExgY</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/9a118494-b95e-472f-a50f-e36231c3eb78.jpg</video:thumbnail_loc><video:title>NorthSec2025 - Michael Joyce - Why preventing phishing is so difficult, and what we can do about it</video:title><video:description>We still haven’t solved phishing. Why does phishing still happen and why do security professionals struggle to understand user behavior? This presentation demystifies the challenge of phishing and presents key findings from one of the largest independent studies of phishing behavior in Canada.

Drawing from five years of research, this talk challenges assumptions about human decision-making and security training. By integrating insights from a range of scientific perspectives, we explore why phishing remains effective despite increasing awareness. This research will also present results of a large scale, Canada-wide study of phishing behaviours, offering an unparalleled view into real-world phishing trends. Key questions addressed include: - When are phishing emails most dangerous? We show the time and day of the week that is the riskiest, and evidence as to why. - How often should cybersecurity training be conducted? We Investigate the decay rate of training effectiveness to balance reinforcement with security fatigue. - Does Cybersecurity Awareness Month actually change behavior? We evaluate the real-world impact of this national event. - Can strong technical security measures increase phishing risk? We look into the potential negative impact that confidence in technology can have. By the end of this session, you will gain a deeper understanding of phishing psychology and training, helping you design more effective security programs that account for human behavior. Attendees will learn why traditional training can fails, the why of phishing simulations, and how to better interpret user behavior. This talk will debunk common misconceptions and provide practical, data-driven approaches to phishing mitigation.

This presentation is based on PhD research conducted at the University of Montreal in collaboration with Beauceron Security. These findings are being presented publicly for the first time, offering a unique opportunity to engage with groundbreaking research...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9818ab92-baa3-479f-95d9-bb9142d8d88a/f452f6c6-2aea-4173-804c-31070f8b8f69-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/jMjZzv3qjKDw57ZTTqExgY</video:player_loc><video:duration>1884</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-14T20:15:18.402Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/mBNVRq3HrzmFMMPsceWuAV</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/92035fcf-1219-4ec1-8cc2-41e2b9c4e92f.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Dorota Kozlowska - Social Engineering for Physical Pentesting Assignments</video:title><video:description>This presentation will explore the strategic use of social engineering in penetration testing, focusing on gaining covert access to a client's server room. I will outline how to perform reconnaissance, gather intelligence on company structure, employee behavior, and security vulnerabilities. Attendees will learn effective social engineering tactics such as pretexting, tailgating, baiting, and phishing, all designed to manipulate human behavior and bypass physical security.

I will cover the importance of crafting a believable pretext, from creating fake work orders to using props like ID badges and uniforms, and demonstrate techniques for gaining access to restricted areas like server rooms, and later on how to navigate the target environment, avoid detection, and plant a symbolic flag.

Finally, the session will discuss post-engagement reporting, vulnerabilities identified, and recommendations for strengthening defenses against social engineering attacks. This talk emphasizes the ethical considerations and the need for careful planning, confidence, and adaptability throughout the operation.

--
Experienced cybersecurity professional with experience in Penetration Testing across Web, API, Network, and Mobile platforms, coupled with 7 years as a versatile Test Engineer &amp; QA. Known for independently identifying and exploiting vulnerabilities to fortify organizational security, and backed by 8 years of Project Management expertise.

Skilled in simulating real-world attacks, conducting comprehensive security assessments, and providing actionable insights to enhance defenses. Certified in Covert Access, Physical Audit, and Elicitation Toolbox from the Covert Access Team, with demonstrated proficiency in physical penetration testing and security audits. Actively pursuing advanced Red Teaming training, dedicating personal time to mastering adversarial tactics, techniques, and procedures (TTPs). Eager to combine my Penetration Testing knowledge, physical security capabil...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/a6f6b9d1-9b4b-40ca-ac19-02c9fc734ef9/797cefcc-a40d-40fd-b89a-76e1ab4be942-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/mBNVRq3HrzmFMMPsceWuAV</video:player_loc><video:duration>1930</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-15T16:14:49.589Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/41NmmgNPo8DL8RSzMNq4tT</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/26516217-7dc1-45a5-9a40-082cb25a1dc3.jpg</video:thumbnail_loc><video:title>Red Dress  Understanding Danger &amp; Attraction</video:title><video:description>Red Dress  Understanding Danger &amp; Attraction</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/1867fb0f-b831-4af8-8242-6b97b9cd71bd/c325fb2a-9848-4dd4-b865-5a6590d48c75-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/41NmmgNPo8DL8RSzMNq4tT</video:player_loc><video:duration>73</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2025-10-15T17:08:28.672Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/v1XUzhNJDcrNNYmrSbNU7K</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a6c04f28-3c34-4764-87b7-9bb792e3b6c3.jpg</video:thumbnail_loc><video:title>DMA Attacks  Exploiting Encryption Vulnerabilities in 2025</video:title><video:description>DMA Attacks  Exploiting Encryption Vulnerabilities in 2025</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/eafb7986-bcda-4700-ab49-2a66bdb2be27/e52ef0f3-2291-4e24-9745-492f00da561c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/v1XUzhNJDcrNNYmrSbNU7K</video:player_loc><video:duration>112</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-16T18:05:48.045Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wNST6f6Z96yJAui8DZBpgU</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/bdf5cf23-5699-4bb2-98e9-4b03513f44ad.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Pierre Nicolas Allard Coutu - Stolen Laptops</video:title><video:description>Laptops have become ubiquitous in modern times. An all but guaranteed organizational asset that quite literally holds keys to the kingdom, in every employee's hands. For an attacker, what's not to love? From large government organizations to fortune 500 companies, these assets are constantly on the move and often poorly secured against advanced threat actors seeking to extract their secrets. Encryption at rest is NOT enough in 2025! And I can show you why.

This talk will showcase methodologies used by our offensive security team to penetrate well-hardened, modern laptops during engagements we call “stolen laptop scenarios”. No power? No credentials? No problem! We push the envelope to the limit of what can be realistically expected of next-generation adversaries. We begin by exploring the potential impact that a compromised laptop can have on an organization, briefly discussing potential lateral movement through extracted domain credentials, tickets, certificates, cookies, and sensitive data. After exposing the audience to the value obtained through physical compromise, we will discuss real attack vectors, with examples and video demos.

We will explore together direct-memory access attacks, the physical and logical implementations of these techniques, defenses, bypasses, and more. On the menu is an overview of PCI Express technology, DMA hardware including FPGA boards and what we do with them, practical demonstrations of attacks against modern laptops, countermeasures introduced by hardware vendors to protect against these attacks, and ways that attackers circumvent these protection mechanisms. Naturally, we will discuss BIOS/UEFI security, how it relates to DMA, and how we exploit pre-boot environments to gain access to a stolen computer. This includes showcasing physical attacks against BIOS EEPROM chips using a universal programmer.

Finally, we will talk about encryption at rest, specifically BitLocker, TPM implementation, and the potential implications of ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f97dbacb-9b0c-4642-a1a1-9b1a77b9d43e/162c64db-188f-4f6e-a933-8d7beeda7d37-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wNST6f6Z96yJAui8DZBpgU</video:player_loc><video:duration>2472</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-16T19:13:48.750Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/sZvGmvJZsJw2PetVdwu1AF</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/0018e3f1-33f4-467e-bd44-b04174c6b486.jpg</video:thumbnail_loc><video:title>Haruspicy, CVSS, EPSS &amp; SSVC  A Deep Dive</video:title><video:description>Haruspicy, CVSS, EPSS &amp; SSVC  A Deep Dive</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/da954cfb-2d93-4a1b-8bdf-a93fe1821d5b/0aad11d3-51a7-4461-9efa-bc9ecdbdc1ad-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/sZvGmvJZsJw2PetVdwu1AF</video:player_loc><video:duration>59</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-18T13:04:07.701Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/vr1t5to4DqCLvkpbG8f9XD</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/64cfeea9-3445-4f5d-94f2-3f06bf23bd9e.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Tod Beardsley - Vulnerability Haruspicy: Using Woo To Confirm Your Biases</video:title><video:description>Vulnerability scoring is supposed to bring order to the chaos of risk management, but in practice, it can feels more like reading tarot cards or poking at entrails than applying science. CVSS performs monkey math to force fractal bell curves, EPSS tries to predict exploitation with statistical black magicks, and SSVC ditches math entirely in favor of structured gut feelings.

Meanwhile, defenders mix and match shortcuts — KEV lists, vendor advisories, and lived experience — to separate the truly urgent from the merely annoying. But are we actually making better risk decisions, or just using these frameworks to justify what we were going to do anyway?

This talk will dig into the strengths, weaknesses, and absurdities of CVSS, EPSS, and SSVC, comparing them to the reality of how security teams actually handle vulnerabilities. Tod will explore where these models help, where they mislead, and whether any of them are meaningfully better than rolling a D20 saving throw vs exploitation. Expect debate, disagreements, and plenty of astrology jokes.

--
Tod Beardsley is VP of Security Research at runZero, where he "kicks assets and fakes frames." Prior to 2025, he was the Section Chief for the Vulnerability Response section for CSD/VM/VRC at CISA, the Cybersecurity and Infrastructure Security Agency, part of the US government. He's also a founder and CNA point of contact for AHA!. He spends much of his time involved in vulnerability research and coordinated vulnerability disclosure (CVD). He has over 30 years of hands-on security experience, stretching from in-band telephony switching to modern ICS/OT implementations. He has held IT ops, security, software engineering, and management positions in large organizations such as the Rapid7, 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Tod is a CVE Board member, has authored several research papers, and hosted Rapid7's Security Nation podcast with Jen Ellis. He is also a Travis County Election ...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/ee56e731-2d81-4e40-b74a-4694e1d0055b/2bd8f28e-5313-48aa-b2f0-7cfcb695f305-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/vr1t5to4DqCLvkpbG8f9XD</video:player_loc><video:duration>1973</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-18T13:11:01.272Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/6BW8L4qJuKSRSc6Ym2z5y7</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/ea329595-fc06-4984-9430-6389732de572.jpg</video:thumbnail_loc><video:title>Cybersecurity Threats  Ransomware Tactics and Threats Exposed</video:title><video:description>Cybersecurity Threats  Ransomware Tactics and Threats Exposed</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/2d82161d-183d-47a1-a14f-37dabb0eae0e/d348d384-bfa8-4b3e-ba82-1c5b2baa6cf0-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/6BW8L4qJuKSRSc6Ym2z5y7</video:player_loc><video:duration>102</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-23T22:12:06.376Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/s6asF7B4a71QSWsBxvAriV</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8c9ef83c-d391-4825-a255-c0f42028a436.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - David Décary-Hétu - Nice to meet you! That will be 20 million please</video:title><video:description>A ransomware attack isn’t just a technical compromise of a company; it’s also a game of negotiation and perhaps even chess. In this talk, I plunge into 133 recorded conversations and more than 7,000 messages exchanged between ransomware gangs and their victims, unraveling the narrative of cyber extortion. This is an insider’s look at how these dark operators blend intimidation, persuasive rhetoric, and even a twisted sense of humor to secure their demands. I dive deep into the qualitative nuances of these dialogues, decoding the linguistic tricks, psychological maneuvers, and power dynamics that define the art of ransomware negotiation. Each conversation is a case study in negotiation that flows between capitulation and defiance, where subtle cues and strategic language can be the difference between a quick surrender and a prolonged standoff. Furthermore, I integrate comprehensive data detailing who paid their ransom, how much, and under what circumstances to construct a predictive model that exposes the critical factors influencing ransom decisions. This model not only sheds light on the financial and behavioral patterns of cybercriminal interactions but also unearths trends that could forecast future threats. By examining variables such as company size, industry type, and security stance, I reveal a multifaceted picture of vulnerability and response. Beyond the numbers and narratives, the talk will present real conversations to clearly show how these conversations unfold. With this data-driven roadmap, my aim is to better prepare companies and individuals facing the all too common ransomware attack, and to empower defenders, incident responders, and policymakers with actionable strategies designed to disrupt these criminal networks and mitigate future threats.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d3462764-d177-4dc2-a722-25861a35f4d3/670087e2-670f-405b-8b75-1b85913c8f3a-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/s6asF7B4a71QSWsBxvAriV</video:player_loc><video:duration>1659</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-24T00:16:45.623Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/uJ4kz1Zo81jUGzbkajuwfo</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/34262f0e-8801-481e-a6ec-79838d1195d6.jpg</video:thumbnail_loc><video:title>Hacking Servers With Certificates  Find Hidden Hosts!</video:title><video:description>Hacking Servers With Certificates  Find Hidden Hosts!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e89f2d74-f9ac-4360-b028-cbe78c16c85a/46fa40a0-18e3-4420-93dd-bc85b9306245-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/uJ4kz1Zo81jUGzbkajuwfo</video:player_loc><video:duration>79</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-24T11:18:43.141Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/ow58w87U5zmppz2fGb4XHf</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/857cc142-0e65-43bf-9911-ab3c9dded41f.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Amaury-Jacques Garçon - One certificate to rule them all</video:title><video:description>Let's dive into the domain of edge devices and botnets through our discovery of a vast cluster of ~70,000 compromised hosts. This story stemmed from a simple error - the repeated use of a self-signed certificate across multiple hosts. In this talk, we will demonstrate how this small SecOps oversight allowed us to unveil a whole network of Operational Relay Boxes and a multi-layered cyber attack infrastructure involving the GobRAT malware and a previously undocumented backdoor, which we named Bulbature. A unique attribute of this infrastructure is the fact that a majority of the C2s possess open directories. Altogether, over 5,000 varied types of files have been analysed, enabling us to effectively place ourselves in the operators’ shoes. This infrastructure is touching corners around the globe and hints at ties to China.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/b65be89a-3ac5-4dd6-ae00-60b3ea60d32c/8b5c6d2f-5c0c-45af-a67e-6dc1b34935ea-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/ow58w87U5zmppz2fGb4XHf</video:player_loc><video:duration>1410</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-24T11:18:48.687Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7JK8NsCQ4Y6KteadVLK8qT</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/db0d1df8-d6ec-4052-9dc3-9f0e18800668.jpg</video:thumbnail_loc><video:title>Bypass 2FA  Application Passwords &amp; Security Risks Explained</video:title><video:description>Bypass 2FA  Application Passwords &amp; Security Risks Explained</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/368ea723-295e-4162-ae2f-053f9657c7b7/b2a6f563-3f32-4a1b-88f6-d34b4b795294-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7JK8NsCQ4Y6KteadVLK8qT</video:player_loc><video:duration>57</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-25T12:17:52.344Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/4nz9pBa6LSxeEPbyWzv7rC</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/e9f1d04b-7e09-4b38-9aee-7db875613a0f.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Matthieu Faou - Cyberespionage tactics in webmail exploitation</video:title><video:description>Cross-site scripting (XSS) vulnerabilities allow attackers to inject malicious script code into legitimate web pages. Identifying XSS vulnerabilities is a typical pentesting exercise, as they are commonly found in web applications that use user-provided, including attacker-controlled, data as output. The theory is well understood, but what do real-world attacks look like?

Our research team at ESET has spent the last two years investigating the exploitation of XSS vulnerabilities in webmail portals. These portals are particularly vulnerable: their main purpose is to display untrusted HTML content, in the form of email messages, in the context of their web applications, which run in their users’ web browsers. During our research, we discovered two zero-day vulnerabilities, one each in Roundcube and MDaemon, and identified the use of multiple N-day vulnerabilities in Roundcube, Zimbra, and Horde.

Our presentation showcases the webmail vulnerabilities we uncovered, and provides a detailed analysis of the exploits and JavaScript payloads used by three cyberespionage groups: Russia-aligned Sednit and GreenCube, and Belarus-aligned Winter Vivern. We demonstrate how these groups leveraged XSS vulnerabilities to steal email messages from government officials and other high-value targets.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/1b4e7621-9873-4b42-a8db-5b371dbbf1fe/6c971bb9-001c-4fb8-8843-149737ea9d6d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/4nz9pBa6LSxeEPbyWzv7rC</video:player_loc><video:duration>1791</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-25T12:17:58.890Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/niXvvSNjmiUqoB7BHrcMdr</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/140e19b6-ada0-4f11-9553-604f3450f583.jpg</video:thumbnail_loc><video:title>MSIX by NTT Japan</video:title><video:description>MSIX by NTT Japan</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/ac91c3b7-228c-412c-85ee-872aaea8d7cd/4d8e2898-ea50-49fa-9e94-a0b3e52e554a-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/niXvvSNjmiUqoB7BHrcMdr</video:player_loc><video:duration>69</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-26T15:17:44.559Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/21Z2P1kFwWHeU3Vh5MJia7</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/abf60ccf-90c3-4a7d-834c-6563978ab119.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Teruki Yoshikawa &amp; Syogo Hayashi - Exploring MSIX Threat Landscape​</video:title><video:description>BlueTeam analyzes new attack methods that attackers consider and comes up with detection and defense methods. This is an eternal cat and mouse game. However, the attackers are always ahead of us. The attack using the MSIX file is a prime example. To overcome this situation, we have researched new attack techniques that attackers would use in the future. This gives us an advantage over attackers.​

This presentation will briefly describe existing attack techniques, followed by an introduction to new MSIX abuse techniques that we have discovered. In MSIX abuse techniques, a feature named the Virtual File System (VFS), used to maintain compatibility, is particularly utilized. We will share how the VFS mechanism is abused to perform DLL Hijacking and AppDomainManager Injection. This allows the audience to understand how VFS can be abused. And we’ll also introduce attack techniques that abuse other features of MSIX. These attack techniques has not yet been observed to date.

Finally, we will explore defensive strategies against these attack methods. The talk will include detailed detection logic and effective countermeasures.​</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/083c490f-a18f-4b11-9d44-ebbc293904d4/17634600-cdd4-4baf-b66f-eeea15a6a3af-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/21Z2P1kFwWHeU3Vh5MJia7</video:player_loc><video:duration>1588</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-26T15:17:50.851Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kfaso6A87BrYN5HwD3AQKi</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/16d17d96-a93e-4200-87b0-e21d32a3ebd3.jpg</video:thumbnail_loc><video:title>AI in Security  Separating Fact from Fiction You Won't Believe!</video:title><video:description>AI in Security  Separating Fact from Fiction You Won't Believe!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9bd7dfc3-5b19-4795-bb1c-91b95fa1861f/b05800d5-4af5-4fd1-947e-fc39520a5fff-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kfaso6A87BrYN5HwD3AQKi</video:player_loc><video:duration>49</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-27T14:20:41.799Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/sYomDJF4wQwnycxnuHbSjD</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/9f62087e-455d-48ab-9586-a3ae0d177f20.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Aditi Bhatnagar - Uplevel your security program with AI</video:title><video:description>In this session, we’ll explore how LLMs can be leveraged to uplevel your product security program. Discover practical strategies for integrating LLMs into your workflows, including dynamic risk assessment.

Learn how to harness their natural language understanding capabilities to streamline communication between engineering, security, and business teams—bridging gaps and enhancing collaboration.

Through real-world examples and actionable takeaways, we’ll show how LLMs are not just tools for efficiency but catalysts for innovation in securing your products and protecting your users. Whether you're building out your first security program or looking to amplify an established one, this talk will leave you inspired to embrace the power of AI and redefine what’s possible in product security.

Join us to learn how AI can be your ultimate ally in staying ahead of the curve and ensuring your product security program is future-ready.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/da6d089f-62aa-46f1-8120-a7e9a05f07a1/ae837cbd-0d3a-4e7d-9e94-b52786c694db-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/sYomDJF4wQwnycxnuHbSjD</video:player_loc><video:duration>2052</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-27T14:27:54.403Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/rKGM2tVaRxucWcUG7uAcmz</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/7afdd3a4-9dcf-48a5-a3d8-0e8b57949969.jpg</video:thumbnail_loc><video:title>Tickets for Techno Party Night Adventures!</video:title><video:description>Tickets for Techno Party Night Adventures!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d08e93f1-2f70-4012-a273-0a9acb87fd05/bdea800a-bd9d-4aff-a5bf-c21ad526b81b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/rKGM2tVaRxucWcUG7uAcmz</video:player_loc><video:duration>56</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-28T12:17:49.623Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/t1ED8kJXExA9E8MJ9VK1K8</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/fa857f6e-51ee-4d5a-83cd-fce904ebd85b.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Ignacio Navarro - Oops, I Hacked It Again: Tales and disclosures</video:title><video:description>Breaking into supermarket systems, ticketing platforms, and more. I’ll share some of my latest hacking stories, showing how I found the vulnerabilities, reported them, and collaborated with the companies. We’ll dive into tools, the challenges of disclosure, the importance of being “ethical”, lessons learned and how these experiences help improve security and build trust between hackers and organizations.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/dabe8e7f-a989-4949-9484-7ed4b07d31cd/86af566d-a376-4d48-be9d-f8d48ece1342-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/t1ED8kJXExA9E8MJ9VK1K8</video:player_loc><video:duration>1490</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-28T12:17:55.351Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/o6dbmE2yZeT6N8WopViZQT</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/39bbeadc-23cf-481d-be7b-f469edaf4c8f.jpg</video:thumbnail_loc><video:title>Nonce Reuse Explained  Security Risks and Prevention</video:title><video:description>Nonce Reuse Explained  Security Risks and Prevention</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/b2e34650-cb72-44de-967b-878221fee9ef/22dc54a2-a2dc-40ee-920c-ee469660bc79-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/o6dbmE2yZeT6N8WopViZQT</video:player_loc><video:duration>70</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-28T13:19:19.803Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/j3YbYRqJ7Vug2JAVASB7TR</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2fc23ffc-1142-42a9-acc0-a400a8b02b72.jpg</video:thumbnail_loc><video:title>NorthSec 2026 - Félix Charette - Exploiting the not so misuse-resistant AES-GCM API of OpenSSL</video:title><video:description>AES-GCM is robust when used properly, but in practice, some APIs make it easy to introduce vulnerabilities giving the possibility to alter the content of encrypted ciphertexts. One of these APIs lacking misuse resistance is implemented by OpenSSL; a library providing cryptography functions to products such as browsers and even to some programming languages (eg: Ruby and PHP).

In this talk, we go through AES-GCM, why it's robust and what is needed to affect its integrity property. We'll go briefly over specifications only to introduce the required concepts. Then, we'll continue with a few examples where misuse resistance was never considered when implementing cryptography APIs. We'll see how to detect these misuses and how to exploit them in real-life scenarios. The abuse cases vary depending on how AES-GCM is used, but we'll see what techniques can be used to leverage this vulnerability.

Theory is one thing, but implementation choices can be questionable and lead to real issues which results in the popular saying: "It works on my paper..."</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/922e9c7f-21ed-4fc0-a344-8e6a5da17aaf/0a6d651d-77ae-4870-b074-faf48a9c19e4-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/j3YbYRqJ7Vug2JAVASB7TR</video:player_loc><video:duration>1869</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-28T13:19:26.259Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/gbcppte97g9vqj9x9HeHFd</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/003a9df2-c9ae-41cd-854b-78b5e6545488.jpg</video:thumbnail_loc><video:title>JSON Files Expose Secrets  How Hackers Hijack Your Accounts!</video:title><video:description>JSON Files Expose Secrets  How Hackers Hijack Your Accounts!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7ae58b97-11d4-4826-baff-64941772f7fe/8661837b-0000-4233-820f-2d970ac6fbd7-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/gbcppte97g9vqj9x9HeHFd</video:player_loc><video:duration>56</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-29T12:20:38.430Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/sUNsa9VyGWyqgRkZMhDLAj</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/bd172c70-db1d-4832-84d3-ffd576b5b1be.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - White Knight Labs - Exploring Azure Logic Apps</video:title><video:description>Azure Logic Apps, a powerful tool for automating workflows and system integration, plays a pivotal role in modern cloud operations. However, these capabilities come with hidden risks numerous potential security vulnerabilities and attack vectors that can be exploited due to unnoticed misconfigurations. This session will examine the complex attack surface of Azure Logic Apps, revealing how attackers can manipulate its features to compromise cloud environments.

We will cover critical topics such as the exposure of sensitive data due to improperly secured Logic Apps, the execution of inline C# code to perform malicious actions, privilege escalation within storage accounts, hijacking API connections, and techniques for facilitating cloud-to-on-premises lateral movement. Additionally, we will address the often-overlooked risks associated with custom authorization logic, showcasing real-world examples of how weak authentication mechanisms can be bypassed, resulting in unauthorized access and data breaches.

Furthermore, we will explore the broader implications of misconfigured Logic Apps, such as overly permissive role-based access control (RBAC), insecure service principals, and unprotected connections to external systems. These misconfigurations can open the door to privilege escalation, unauthorized access, and even cloud-to-cloud or cloud-to-on-premises lateral movement.

By examining these threats and their countermeasures, organizations can strengthen the security of their Logic App implementations and ensure resilient cloud operations. Real-world scenarios and exploitation techniques will be dissected to highlight critical vulnerabilities in these workflows.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/d9ece85b-56b4-472b-93a3-589ae3e0129e/9f4d569d-25ae-4e90-8e62-991fa7843db9-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/sUNsa9VyGWyqgRkZMhDLAj</video:player_loc><video:duration>1835</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-29T12:20:44.450Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wsgZntLyTSutqe87VoW7Mv</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/af29e14c-b19a-41d8-9dd8-867654bd2674.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Joey Dubé - Noise Pollution is Damaging Your SOC</video:title><video:description>Noise pollution is linked to high blood pressure, headaches, fatigue, stress, and impaired focus, leading to decreased performance over time. This analogy accurately describes the impact of excessive obscure alerts and unlabelled data on SOC analysts. Awareness of noise pollution is crucial for both mitigating (blue team) and exploiting (red team) its effects.

This talk will explore the sources of noise and propose methods to reduce or transform it into music. The ultimate goals are to enhance how CTI analysts operationalize indicators of compromise (IoCs), prevent alert fatigue, and avoid the aforementioned health issues.

Attendees will step into the shoes of a SOC analyst navigating a high-severity alert on a Friday at 4 p.m. (as is tradition). The high-confidence IoC is linked to known malicious infrastructure, threatening to ruin weekend plans if confirmed malicious.

Spoiler Alert: The false positive turns out to be the Windows Delivery Optimization (DO) service functioning as intended on port 7680.

We will dig into this feature, revealing that Windows devices have participated in a peer-to-peer (P2P) network by default since Windows 10 to speed up updates delivery. A deep understanding of the DO ecosystem is necessary to interpret telemetry from XDRs and contextualize the noise.

Noise reduction strategies will be proposed at various stages of the telemetry lifecycle, applicable to other services, protocols, features, and XDR artifacts.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f69d59fa-8eed-4245-8efd-dbee2faaef17/843b06bf-aff0-4436-8fb0-b3feeb17b88a-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wsgZntLyTSutqe87VoW7Mv</video:player_loc><video:duration>1542</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-29T15:18:43.961Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/3wwEkBDLi3wasUTH9ysLGQ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/fa150447-85d5-46eb-b0aa-260725ef8835.jpg</video:thumbnail_loc><video:title>Jeux mobiles pour enfants : vers une nouvelle génération de joueurs compulsifs? | La facture</video:title><video:description>Quand nos jeunes jouent à des jeux gratuits sur leur tablette ou leur téléphone, ils partagent sans le savoir une foule de renseignements insoupçonnés sur eux. Bienvenue dans le monde opaque du jeu mobile, où tous les coups sont permis pour rendre les jeunes captifs et faire des profits.

Journaliste : Stéphanie Dupuis
Réalisateur : Jean-Luc Bouchard

Pour plus d’information, lisez les articles de notre journaliste Stéphanie Dupuis sur la plateforme Info de Radio-Canada : 

- Des jeux mobiles pour enfants truffés de simulations de loterie
https://ici.radio-canada.ca/info/long-format/2201464/jeux-mobiles-enfants-loterie?utm_source=youtube&amp;utm_medium=description&amp;utm_campaign=rcinfo

- De nombreux jeux mobiles siphonnent les données de vos enfants
https://ici.radio-canada.ca/info/long-format/2202471/jeux-mobiles-enfants-donnees-personnelles?utm_source=youtube&amp;utm_medium=description&amp;utm_campaign=rcinfo 

#techno #jeuxvidéo #enfants 
--
Abonnez-vous à notre chaine Radio-Canada Information pour suivre l'actualité en direct au Canada et à l'international : https://www.youtube.com/radiocanadainfo?sub_confirmation=1

Accédez aux nouvelles essentielles en téléchargeant l'application Radio-Canada Info : https://ici.radio-canada.ca/appli-info/?utm_source=google-youtube&amp;utm_campaign=nat.pn.applircinfo&amp;utm_medium=interne&amp;utm_term=info-appli&amp;utm_content=fiche-cus 

Retrouvez-nous aussi sur :
X : https://twitter.com/RadioCanadaInfo
TikTok : https://www.tiktok.com/@radio.canada.info
Bluesky : https://bsky.app/profile/info.radio-canada.ca</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/14757c66-34e1-4f0c-a96c-e382f89be640/210a555b-553d-4751-99d8-539064049f27-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/3wwEkBDLi3wasUTH9ysLGQ</video:player_loc><video:duration>1043</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-29T20:37:12.222Z</video:publication_date><video:tag>radiocan</video:tag><video:tag>radcan</video:tag><video:tag>rcinfo</video:tag><video:tag>radio canada</video:tag><video:tag>actualités</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/dans_les_medias/videos">Dans les médias</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/64i3Y8aZDKvJv3mNdHDMdg</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a6ac78ee-c834-4e6c-8a77-bf8b73186c5e.jpg</video:thumbnail_loc><video:title>Anubis Group  Advanced Data Extortion Tactics Explained</video:title><video:description>Anubis Group  Advanced Data Extortion Tactics Explained</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/28f36ec9-a8db-4483-aa5f-6b7fc073fa73/c748d6f9-5362-4a29-9afd-f69d2a88f5d1-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/64i3Y8aZDKvJv3mNdHDMdg</video:player_loc><video:duration>44</video:duration><video:rating>0</video:rating><video:view_count>5</video:view_count><video:publication_date>2025-10-30T18:26:36.765Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/nzVeipAAXMvUKXi4CXvmjA</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/3078635d-8bde-45dd-b1a4-88d604e29e5e.jpg</video:thumbnail_loc><video:title>NorthSec 2026 - Tammy Harper - Persōna Theory: Infiltration and Deception of Emerging Threat Groups</video:title><video:description>Our personas are fabrications and constructions of our inner self that we project outwards. We do this through various means and influences such as race, gender, sex, ability, age, culture, religion, norms, class, and status. For the “real world” aka “irl” we do all this by expression in our clothing, makeup, hairstyling, our hobbies, our network of friends, colleagues, and acquaintances. We leverage all of these facets and we create masks, personas, that we think will best interact with the world around us. The same concepts apply when creating personas for infiltrating online communities. ​ Online communities are built on trust, reputation, and currency which can take various forms such as data, crypto, intel and notoriety. This talk is an exploration of techniques; linguistics, OPSEC, OSINT, and SOCENG. Tactical operations and concepts like hours of online operation, timezone shifting, and using low ranking accounts as canon fodder for probing, and psychological models used in the infiltration of emerging threat actor groups.

Persona Theory applies the understanding of threat actors, how they think, how they operate, their language, their motivations, fears, methods, the "game" and reflects it back at them like an obsidian mirror. The talk features case studies showcasing active infiltration chat logs and we present this first hand showing how established ransomware threat actors communicate during their ARP (Active Recruitment Phase). Recruitment for RaaS (Ransomware-as-a-Service) functions very similarly to a job interview. You need to show you got the goods such as the ability to provide your initial access into organizational infrastructure, pentesting, and overall business acumen. The case studies go from initial contact, to obtaining the ransomware builder and affiliate panel access. We also explore the use of transliteration (preserving pronunciation) vs translation (preserving meaning) and how machine translation engines like DeepL and Google Translat...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/aecc428f-4c5c-44e8-938f-cf054cb97cbe/a6eacdf5-bea7-4c59-af4e-79dc9744472a-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/nzVeipAAXMvUKXi4CXvmjA</video:player_loc><video:duration>1862</video:duration><video:rating>0</video:rating><video:view_count>4</video:view_count><video:publication_date>2025-10-30T18:32:37.311Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/6AJHQc4Ryf7Pxep1zthRCR</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/20bab7f5-0666-46d2-ac71-6b8acec4daa8.jpg</video:thumbnail_loc><video:title>NorthSec 2026 - Christian Paquin - Enhancing Identity Credential Privacy with Zero-Knowledge Proofs</video:title><video:description>Digital identity credentials are coming of our mobile wallets. In North America, several states have begun deploying mobile Driver's Licenses (mDL), with others, including the Canadian provinces, are preparing to follow suit. In Europe, plans are underway for a unified digital identity wallet. Similarly, corporate identities, like those provided by Microsoft Entra, are enabling various online authentication scenarios, such as employment verification. Together, these innovations are building the long-missing identity layer of the internet.

However, the internet’s foundational business model, rooted in tracking user activities to serve targeted ads, has created persistent privacy challenges. Modern identity frameworks like Selective-Disclosure JSON Web Tokens (SD-JWT) and mDLs address some concerns by enabling selective disclosure, thereby minimizing data oversharing. While this is an important step forward, one critical gap remains: breaking the cryptographic link between the issuance and presentation of credentials. Without this, issuers and verifiers can still track users’ activities, eroding user privacy.

Several cryptographic schemes, such as blind or group signatures, have been proposed to address this issue. However, these solutions require significant overhauls to existing identity systems, making widespread adoption difficult. An interesting alternative is to leverage zero-knowledge proof mechanisms to present unmodified existing identity credentials while achieving any desired levels of privacy. This approach allows users to prove specific claims — such as "I reside in QC" (without revealing the full address) or "I am an adult" (without disclosing the date of birth) — without unnecessary data disclosure.

In this talk, I'll present our recently released Crescent open-source framework implementing such a zero-knowledge scheme, and demonstrate how it can be used to 1. prove you are currently employed by a specific company to access employer-provided sensi...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/2d574f32-c532-4ed6-b046-25bdb474498d/8d898095-6386-4410-bd18-3b20d5fb2069-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/6AJHQc4Ryf7Pxep1zthRCR</video:player_loc><video:duration>1808</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-10-31T13:15:49.955Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/5gruMYjS3DpCxbmDmvnGu1</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a4074a74-e8b4-4867-8e5c-896e99cbc80f.jpg</video:thumbnail_loc><video:title>Unlinkable Digital Life  Crypto's Privacy Solutions</video:title><video:description>Unlinkable Digital Life  Crypto's Privacy Solutions</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/228c6c85-ffe8-4b59-b6ca-3f57999a05d0/340d5ada-d172-473c-90fb-8731b3c212f3-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/5gruMYjS3DpCxbmDmvnGu1</video:player_loc><video:duration>150</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-10-31T14:10:46.120Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/dY3FdMhbwE8PAkwzH5qohN</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b292f449-4052-41f7-9cfa-ec0fa50352ef.jpg</video:thumbnail_loc><video:title>Predicting Vulnerabilities  Machine Learning's Impact in 2024</video:title><video:description>Predicting Vulnerabilities  Machine Learning's Impact in 2024</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6900f6dd-54cd-41af-bca5-5ee02761c7c6/36242b3c-7f6d-4131-8eea-24f8e10164ca-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/dY3FdMhbwE8PAkwzH5qohN</video:player_loc><video:duration>51</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-11-02T15:12:22.990Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/4xJyUzNW7S4ePDnA96iEkz</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/20aa53ab-437f-4eac-ae68-3110bb6b3a47.jpg</video:thumbnail_loc><video:title>Nonce Reuse Explained  Security Risks and Prevention</video:title><video:description>Nonce Reuse Explained  Security Risks and Prevention</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/1cb9b4b6-d32c-41a3-b988-106cc9fd8abf/70997cac-e1cb-4236-b97b-58166be171f1-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/4xJyUzNW7S4ePDnA96iEkz</video:player_loc><video:duration>70</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-11-02T15:17:11.068Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/pRJsWhPFKrTuSjdMPzHLg1</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/93fb0cd0-8e5d-432c-a4d1-21bcae0e2120.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - François Labrèche - How not to do ML</video:title><video:description>Machine learning has been used extensively for the prediction of cyber security threats for a number of years. More specifically, building predictive models for the exploitation of security vulnerabilities and the publication of vulnerability exploits is essential in anticipating threats in the cyber security landscape.

Many published approaches train ML models using publicly available data, be it online discussions or vulnerability details available through the publication of CVEs. Unfortunately, many challenges arise when encoding this data to predict exploitation. More importantly, many of these do not impact the model's performance on historical data, but instead result in a poor performance when used as a live model in a real environment.

In this talk, we will demonstrate our implementation and deployment of several of these methods. We show that performance of these models in a live environment underperforms in comparison with its historical evaluation. Vulnerability and threat information evolve over time, and are often not available on the day of a vulnerability's publication. We identify four incorrect ways to encode and evaluate features for the prediction of exploits, that causes the model to incorrectly predict exploits when used in a day-to-day live system.

Ultimately, we show how a model that has a lower performance on its historical data evaluation can better predict the publication of exploits in a live setting, by encoding the features correctly.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c133cdb4-7741-4af7-b3a0-fafc1333f2ae/56c52999-b8b3-4bb2-9262-4557e700033e-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/pRJsWhPFKrTuSjdMPzHLg1</video:player_loc><video:duration>1548</video:duration><video:rating>0</video:rating><video:view_count>4</video:view_count><video:publication_date>2025-11-02T15:17:16.393Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/g8A8M4hc1Dgkkhu1kfmYUb</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/49d0ebfd-57e8-4451-b257-2f2f3deb0d5f.jpg</video:thumbnail_loc><video:title>NorthSec 2025 - Wendy Nather - Keynote: A Tabletop As Big As the World</video:title><video:description>Most tabletop exercises for cybersecurity focus on the known issues and challenges in a particular organization: the architecture, the known vulnerabilities, the dynamics of incident response among different departments, and the current processes. When you're designing something bigger, for a multinational corporation, or for a competition that involves students in law, policy, international relations, and cybersecurity, the stakes get a lot bigger (and more fun to plan out). In this session, we'll talk about what we can learn from building a "bad day in cyber" exercise that involves geopolitical intrigue as well as an array of threat actors.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/7a885279-7b09-41ce-9a65-ba47dfce4092/f556304a-6b6a-45e3-baec-43e98940ea6b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/g8A8M4hc1Dgkkhu1kfmYUb</video:player_loc><video:duration>2040</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-11-16T18:16:09.224Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/doVHcqSiGMNwdRHKdww8Xp</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/04ed1113-ac02-4aee-ba2d-7d972f0bcc82.jpg</video:thumbnail_loc><video:title>Threat Intel  Secure Data Transmission &amp; Tabletop Fun!</video:title><video:description>Threat Intel  Secure Data Transmission &amp; Tabletop Fun!</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/64612083-5f04-47f2-8bec-50e1f75140d9/81cee77e-9c41-4eb2-9faf-1e6a66487495-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/doVHcqSiGMNwdRHKdww8Xp</video:player_loc><video:duration>46</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-11-16T19:08:39.599Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/vDaq6R3GUHoe8NgFUU796g</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a58f3a14-55a0-4f38-b28c-3f515a1be3c8.jpg</video:thumbnail_loc><video:title>How to mitigate the effects of tear gas on stuff. Not for use on skin...</video:title><video:description>How to mitigate the effects of tear gas on stuff. Not for use on skin or mucous membranes. Be safe out there #safety #chemistry </video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f00957d9-1e33-423d-b5bb-d625e78f3c41/1ebd50c0-53d7-4a5e-9f77-333fee66b5d3-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/vDaq6R3GUHoe8NgFUU796g</video:player_loc><video:duration>364</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2025-11-26T18:28:49.815Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/eM4B5g9FTxasVUVjcM6C5v</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/06debb32-40a2-4349-ab62-325d8e768fb0.jpg</video:thumbnail_loc><video:title>How to make eye wash</video:title><video:description>How to make eye wash </video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6f917e64-10f9-4700-9ad7-97dd90d6098d/b3c5728b-1789-4607-b40f-89e383224ab2-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/eM4B5g9FTxasVUVjcM6C5v</video:player_loc><video:duration>324</video:duration><video:rating>0</video:rating><video:view_count>0</video:view_count><video:publication_date>2025-11-26T18:28:55.930Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/qBx3fY2msVMDE57xZiWgU8</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/bedc5748-e684-45f4-81b5-829f5c4aafb2.jpg</video:thumbnail_loc><video:title>Super easy today, this is for cleaning your naked body. #chemistry #s...</video:title><video:description>Super easy today, this is for cleaning your naked body. #chemistry #safety #cleanup #teargas </video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/c7517cfb-6518-4656-a2ef-bb84685010cb/33416458-b75e-4ff5-91f6-04e20491075b-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/qBx3fY2msVMDE57xZiWgU8</video:player_loc><video:duration>153</video:duration><video:rating>0</video:rating><video:view_count>5</video:view_count><video:publication_date>2025-11-26T18:58:10.497Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/9EZSE4iRsri5BTqkq5Tfn5</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/a70a0cee-5729-40f9-b1bb-466143dee739.webp</video:thumbnail_loc><video:title>Space Oddity</video:title><video:description>Chris's personal rendition of David Bowie's classic Space Oddity</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/463b09cc-a380-4682-afe1-76dbf8c6a9b6/6ef00028-fed8-4a7b-a23e-d508c15433ff-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/9EZSE4iRsri5BTqkq5Tfn5</video:player_loc><video:duration>330</video:duration><video:rating>0</video:rating><video:view_count>6</video:view_count><video:publication_date>2026-01-02T15:48:19.920Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/emnN28HjMDhuq3NoQZn7XB</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/1e480418-e06e-4d2c-adc4-1ec02decbf6d.jpg</video:thumbnail_loc><video:title>'The Game is Rigged': Richard Wolff</video:title><video:description>ACLU SoCal, L.A. Progressive and Occidental College hosted Richard Wolff for a discussion on economic rights and reform, on February 10, 2015 at Occidental College.</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6c1f1bd1-7192-4c36-8d70-8c350258f5c9/8d2d4e3f-c956-4d0b-86a8-5293d3ccc136-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/emnN28HjMDhuq3NoQZn7XB</video:player_loc><video:duration>6507</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2026-01-08T00:16:50.962Z</video:publication_date><video:tag>Richard Wolff</video:tag><video:tag>Capitalism</video:tag><video:tag>Economics</video:tag><video:tag>FDR</video:tag><video:tag>Greek crisis</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kpPzgeBjsZaejwBV5uJFa4</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/907ed218-ce30-4741-a43e-e3659f4fce13.jpg</video:thumbnail_loc><video:title>Pourquoi l’internet est brisé, et comment le réparer? Avec Cory Doctorow | Décrypteurs</video:title><video:description>Très apprécié par l’équipe des Décrypteurs, Cory Doctorow a accepté de nous rendre visite en studio pour une longue discussion à propos de sa vision du web. Observateur aguerri des réalités numériques depuis les débuts d’Internet, c’est à ce penseur canadien qu’est attribuée la paternité du concept de « merdification ». Après le visionnement de cet épisode hors-série de notre balado, il se peut que vous ne voyiez plus le web de la même façon.

Veuillez noter que l'épisode est majoritairement en langue anglaise. Un sous-titrage en français est cependant disponible.

Commentaires, questions, suggestions? Écrivez-nous!
Notre courriel : decrypteurs@radio-canada.ca

Chapitres : 
00:00 - Introduction
02:44 - Pourquoi les gens devraient se préoccuper de la « merdification » de l'internet?
19:03 - A-t-on encore des leviers de négociation vis-à-vis des géants de la tech?
25:01 - La « merdification » d'Amazon serait-elle la seule avenue pour freiner sa domination?
32:03 - L'internet est-il réellement brisé?
41:35 - OpenAI est-il en train de prendre le monopole de l'IA?
47:25 - Y a-t-il encore de l'espoir à travers toute cette « merdification »?

Réalisation : Guillaume Comtois et Louis-Charles Dionne
Technicien radio : Dominic Beaudoin

Le blogue de Cory Doctorow: https://pluralistic.net

Pour vous abonner à notre infolettre c'est ici : https://ici.radio-canada.ca/infolettres/decrypteurs/
Notre site web : https://ici.radio-canada.ca/decrypteurs
Notre page Facebook :  https://www.facebook.com/groups/decrypteurs/
Décrypteurs : le balado - tous les épisodes sont aussi disponibles sur OHdio : https://ici.radio-canada.ca/ohdio/balados/11099/decrypteurs
Émission TV : https://ici.tou.tv/decrypteurs/s06

Comptes Bluesky de l'équipe :
Alexis: https://bsky.app/profile/alexisdelancer.bsky.social
Jeff: https://bsky.app/profile/jeffyates.bsky.social
Nicholas: https://bsky.app/profile/nicholasderosa.bsky.social

Comptes X de l'équipe :
Alexis : https://x...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9d310f38-9833-4a77-a8f7-ae77384b0a19/3b7c6308-2845-46f8-b8c3-0d911d591946-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kpPzgeBjsZaejwBV5uJFa4</video:player_loc><video:duration>3172</video:duration><video:rating>0</video:rating><video:view_count>3</video:view_count><video:publication_date>2026-01-09T17:08:33.517Z</video:publication_date><video:tag>radiocan</video:tag><video:tag>radcan</video:tag><video:tag>rcinfo</video:tag><video:tag>radio canada</video:tag><video:tag>nouvelle</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/7XtHhVD6ZaQgBMWA6JAEDR</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/44807300-b06f-4011-91b6-2bc7741873cc.jpg</video:thumbnail_loc><video:title>CBC Power and Politics - 2026-01-15 Iran Protests (Mona Ghassemi)</video:title><video:description>CBC Power and Politics - 2026-01-15 Iran Protests (Mona Ghassemi)</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3855d140-9d0b-4aa4-827a-b7da0486b87b/14947dad-eb37-4761-b466-8c2e819e0c4d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/7XtHhVD6ZaQgBMWA6JAEDR</video:player_loc><video:duration>611</video:duration><video:rating>0</video:rating><video:view_count>6</video:view_count><video:publication_date>2026-01-20T23:19:21.714Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/dans_les_medias/videos">Dans les médias</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/cW7sdRs9dToADnAZqkcXxt</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/cfd9b03b-7d87-41ab-9cca-82638961cebc.jpg</video:thumbnail_loc><video:title>𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲 𝗙𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻𝘀/𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴𝘀: "Offensive Active Directory Operations Certification"</video:title><video:description>📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
🖥️ Mode: Hybrid (on-site &amp; remote)

Description: "𝘛𝘩𝘦 𝘖𝘧𝘧𝘦𝘯𝘴𝘪𝘷𝘦 𝘈𝘤𝘵𝘪𝘷𝘦 𝘋𝘪𝘳𝘦𝘤𝘵𝘰𝘳𝘺 𝘖𝘱𝘦𝘳𝘢𝘵𝘪𝘰𝘯𝘴 𝘊𝘦𝘳𝘵𝘪𝘧𝘪𝘤𝘢𝘵𝘪𝘰𝘯 (𝘖𝘈𝘋𝘖𝘊) 𝘦𝘲𝘶𝘪𝘱𝘴 𝘴𝘵𝘶𝘥𝘦𝘯𝘵𝘴 𝘸𝘪𝘵𝘩 𝘢 𝘤𝘰𝘮𝘱𝘳𝘦𝘩𝘦𝘯𝘴𝘪𝘷𝘦, 𝘩𝘢𝘯𝘥𝘴-𝘰𝘯 𝘶𝘯𝘥𝘦𝘳𝘴𝘵𝘢𝘯𝘥𝘪𝘯𝘨 𝘰𝘧 𝘩𝘰𝘸 𝘵𝘰 𝘪𝘥𝘦𝘯𝘵𝘪𝘧𝘺 𝘢𝘯𝘥 𝘦𝘹𝘱𝘭𝘰𝘪𝘵 𝘮𝘰𝘥𝘦𝘳𝘯 𝘈𝘤𝘵𝘪𝘷𝘦 𝘋𝘪𝘳𝘦𝘤𝘵𝘰𝘳𝘺 𝘮𝘪𝘴𝘤𝘰𝘯𝘧𝘪𝘨𝘶𝘳𝘢𝘵𝘪𝘰𝘯𝘴 𝘢𝘤𝘳𝘰𝘴𝘴 𝘣𝘰𝘵𝘩 𝘞𝘪𝘯𝘥𝘰𝘸𝘴 𝘢𝘯𝘥 𝘓𝘪𝘯𝘶𝘹 𝘦𝘯𝘷𝘪𝘳𝘰𝘯𝘮𝘦𝘯𝘵𝘴. 𝘋𝘦𝘴𝘪𝘨𝘯𝘦𝘥 𝘧𝘰𝘳 𝘵𝘰𝘥𝘢𝘺’𝘴 𝘮𝘪𝘹𝘦𝘥 𝘢𝘯𝘥 𝘦𝘷𝘰𝘭𝘷𝘪𝘯𝘨 𝘦𝘯𝘵𝘦𝘳𝘱𝘳𝘪𝘴𝘦 𝘦𝘤𝘰𝘴𝘺𝘴𝘵𝘦𝘮𝘴, 𝘵𝘩𝘦 𝘤𝘰𝘶𝘳𝘴𝘦 𝘤𝘰𝘷𝘦𝘳𝘴 𝘧𝘰𝘳𝘦𝘴𝘵 𝘧𝘶𝘯𝘤𝘵𝘪𝘰𝘯𝘢𝘭 𝘭𝘦𝘷𝘦𝘭𝘴 𝘧𝘳𝘰𝘮 𝘞𝘪𝘯𝘥𝘰𝘸𝘴 𝘚𝘦𝘳𝘷𝘦𝘳 2016 𝘵𝘩𝘳𝘰𝘶𝘨𝘩 𝘚𝘦𝘳𝘷𝘦𝘳 2025, 𝘦𝘯𝘴𝘶𝘳𝘪𝘯𝘨 𝘦𝘷𝘦𝘳𝘺 𝘵𝘦𝘤𝘩𝘯𝘪𝘲𝘶𝘦 𝘺𝘰𝘶 𝘭𝘦𝘢𝘳𝘯 𝘪𝘴 𝘳𝘦𝘭𝘦𝘷𝘢𝘯𝘵, 𝘤𝘶𝘳𝘳𝘦𝘯𝘵, 𝘢𝘯𝘥 𝘢𝘱𝘱𝘭𝘪𝘤𝘢𝘣𝘭𝘦 𝘢𝘤𝘳𝘰𝘴𝘴 𝘳𝘦𝘢𝘭-𝘸𝘰𝘳𝘭𝘥 𝘪𝘯𝘧𝘳𝘢𝘴𝘵𝘳𝘶𝘤𝘵𝘶𝘳𝘦𝘴. 𝘠𝘰𝘶’𝘭𝘭 𝘥𝘦𝘷𝘦𝘭𝘰𝘱 𝘵𝘩𝘦 𝘢𝘣𝘪𝘭𝘪𝘵𝘺 𝘵𝘰 𝘦𝘹𝘦𝘤𝘶𝘵𝘦 𝘮𝘶𝘭𝘵𝘪-𝘱𝘭𝘢𝘵𝘧𝘰𝘳𝘮 𝘢𝘵𝘵𝘢𝘤𝘬𝘴, 𝘭𝘦𝘷𝘦𝘳𝘢𝘨𝘦 𝘤𝘶𝘵𝘵𝘪𝘯𝘨-𝘦𝘥𝘨𝘦 𝘈𝘋 𝘢𝘣𝘶𝘴𝘦 𝘴𝘵𝘳𝘢𝘵𝘦𝘨𝘪𝘦𝘴, 𝘢𝘯𝘥 𝘤𝘶𝘴𝘵𝘰𝘮𝘪𝘻𝘦 𝘮𝘰𝘥𝘦𝘳𝘯, 𝘴𝘪𝘨𝘯𝘦𝘥, 𝘢𝘯𝘥 𝘴𝘵𝘦𝘢𝘭𝘵𝘩𝘺 𝘵𝘰𝘰𝘭𝘪𝘯𝘨 𝘧𝘰𝘳 𝘦𝘯𝘶𝘮𝘦𝘳𝘢𝘵𝘪𝘰𝘯 𝘢𝘯𝘥 𝘦𝘹𝘱𝘭𝘰𝘪𝘵𝘢𝘵𝘪𝘰𝘯."

About the trainer:
Evan Hosinski is an Offensive Security Professional and senior penetration tester who builds, breaks, and improves systems at scale. His work combines hands-on engineering with real-world attacker tradecraft, driving him to design tools and methodologies that hold up in live environments.

🔗 Training details: https://nsec.io/training/2026-offensive-active-directory-operations-certification-oadoc/

#NorthSec #cybersecurity #infosec #redteam #offensivesecurity</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/60a2aa43-0cfd-49e2-ad23-2833ece06105/cbb7f9b6-1cb4-410b-9eb8-ac28c7c7b520-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/cW7sdRs9dToADnAZqkcXxt</video:player_loc><video:duration>15</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2026-02-06T14:56:35.079Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/eGNwpEMoZ613jtug5TVe6V</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/8941d81a-cc9e-4102-a36a-b939a4e4ebd2.jpg</video:thumbnail_loc><video:title>𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝗙𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻𝘀/𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴𝘀: "Beyond Whiteboard Hacking: Master AI-Enhanced Threat Modeling"</video:title><video:description>📅 Dates: May 11 and 12, 2026 (2 days)
📊 Difficulty: Medium
🖥️ Mode: On-Site

Description: "𝘛𝘩𝘪𝘴 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨 𝘵𝘢𝘬𝘦𝘴 𝘺𝘰𝘶 𝘥𝘦𝘦𝘱 𝘪𝘯𝘵𝘰 𝘵𝘩𝘦 𝘱𝘳𝘢𝘤𝘵𝘪𝘤𝘢𝘭 𝘸𝘰𝘳𝘭𝘥 𝘰𝘧 𝘵𝘩𝘳𝘦𝘢𝘵 𝘮𝘰𝘥𝘦𝘭𝘪𝘯𝘨, 𝘤𝘰𝘮𝘣𝘪𝘯𝘪𝘯𝘨 𝘩𝘢𝘯𝘥𝘴-𝘰𝘯 𝘦𝘹𝘦𝘳𝘤𝘪𝘴𝘦𝘴 𝘢𝘯𝘥 𝘳𝘦𝘢𝘭-𝘸𝘰𝘳𝘭𝘥 𝘴𝘤𝘦𝘯𝘢𝘳𝘪𝘰𝘴. 𝘛𝘩𝘪𝘴 𝘩𝘢𝘯𝘥𝘴-𝘰𝘯 𝘵𝘩𝘳𝘦𝘢𝘵 𝘮𝘰𝘥𝘦𝘭𝘪𝘯𝘨 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨 𝘰𝘧𝘧𝘦𝘳𝘴 𝘢𝘯 𝘪𝘮𝘮𝘦𝘳𝘴𝘪𝘷𝘦 𝘦𝘹𝘱𝘦𝘳𝘪𝘦𝘯𝘤𝘦, 𝘨𝘳𝘰𝘶𝘯𝘥𝘦𝘥 𝘪𝘯 25 𝘺𝘦𝘢𝘳𝘴 𝘰𝘧 𝘱𝘳𝘢𝘤𝘵𝘪𝘤𝘢𝘭 𝘦𝘹𝘱𝘦𝘳𝘵𝘪𝘴𝘦, 𝘢𝘯𝘥 𝘳𝘦𝘧𝘪𝘯𝘦𝘥 𝘧𝘰𝘳 𝘰𝘷𝘦𝘳 𝘢 𝘥𝘦𝘤𝘢𝘥𝘦 𝘰𝘧 𝘥𝘦𝘭𝘪𝘷𝘦𝘳𝘺 𝘢𝘵 𝘉𝘭𝘢𝘤𝘬 𝘏𝘢𝘵, 𝘢𝘷𝘰𝘪𝘥𝘪𝘯𝘨 𝘢 𝘭𝘦𝘤𝘵𝘶𝘳𝘦-𝘩𝘦𝘢𝘷𝘺 𝘢𝘱𝘱𝘳𝘰𝘢𝘤𝘩 (70% 𝘰𝘧 𝘵𝘩𝘦 𝘤𝘰𝘶𝘳𝘴𝘦 𝘪𝘴 𝘧𝘰𝘤𝘶𝘴𝘦𝘥 𝘰𝘯 𝘦𝘹𝘦𝘳𝘤𝘪𝘴𝘦𝘴 𝘵𝘰 𝘳𝘦𝘪𝘯𝘧𝘰𝘳𝘤𝘦 𝘭𝘦𝘢𝘳𝘯𝘪𝘯𝘨). 𝘉𝘺 𝘵𝘩𝘦 𝘦𝘯𝘥 𝘰𝘧 𝘵𝘩𝘪𝘴 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨, 𝘺𝘰𝘶 𝘸𝘪𝘭𝘭 𝘸𝘢𝘭𝘬 𝘢𝘸𝘢𝘺 𝘯𝘰𝘵 𝘫𝘶𝘴𝘵 𝘸𝘪𝘵𝘩 𝘬𝘯𝘰𝘸𝘭𝘦𝘥𝘨𝘦, 𝘣𝘶𝘵 𝘵𝘩𝘦 𝘢𝘣𝘪𝘭𝘪𝘵𝘺 𝘵𝘰 𝘱𝘳𝘢𝘤𝘵𝘪𝘤𝘦 𝘵𝘩𝘳𝘦𝘢𝘵 𝘮𝘰𝘥𝘦𝘭𝘪𝘯𝘨 𝘦𝘧𝘧𝘦𝘤𝘵𝘪𝘷𝘦𝘭𝘺 𝘪𝘯 𝘺𝘰𝘶𝘳 𝘰𝘳𝘨𝘢𝘯𝘪𝘻𝘢𝘵𝘪𝘰𝘯. "
🔗 Full Training Details: https://lnkd.in/dsG6aMM

👨‍🏫 About the trainer:
Steven Wierckx (Toreon) is a seasoned software and security tester with 15 years of experience in programming, security testing, source code review, test automation, functional and technical analysis, development, and database design. Steven shares his web application security passion by writing about and through training on testing software for security problems, secure coding, security awareness, security testing, and threat modeling. He’s the OWASP Threat Modeling Project Lead and organises the BruCON student CTF. Last year, he spoke at Hack in the Box Amsterdam, hosted a workshop at BruCON, and provided threat modeling training at OWASP AppSec USA and O’Reilly Security New York.

#NorthSec #cybersecurity #threatmodeling #AIsecurity #LLM #DevOps #securitybydesign</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/6ef93998-945a-48ed-9bbe-4e87b9fd71e3/39e0adc5-240d-441d-9c6a-b8c216729046-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/eGNwpEMoZ613jtug5TVe6V</video:player_loc><video:duration>15</video:duration><video:rating>0</video:rating><video:view_count>6</video:view_count><video:publication_date>2026-02-07T12:19:18.719Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/3DgEi5kExJmRZ1zHrArCrn</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/ba10b8cc-0679-4cd8-a8b3-a1eb176fbacd.jpg</video:thumbnail_loc><video:title>𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝗙𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻𝘀/𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴𝘀 : "Red Team Training" 𝗽𝗮𝗿/𝗯𝘆 Charles F. Hamilton</video:title><video:description>📅 Dates: May 12 and 13 2025 (2 days)
🎯 Level: Medium

Description: "𝘛𝘩𝘦 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨 𝘪𝘴 𝘥𝘪𝘷𝘪𝘥𝘦𝘥 𝘪𝘯𝘵𝘰 𝘧𝘪𝘷𝘦 𝘴𝘦𝘤𝘵𝘪𝘰𝘯𝘴: 𝘐𝘯𝘪𝘵𝘪𝘢𝘭 𝘍𝘰𝘰𝘵𝘩𝘰𝘭𝘥, 𝘎𝘢𝘪𝘯𝘪𝘯𝘨 𝘈𝘤𝘤𝘦𝘴𝘴, 𝘖𝘧𝘧𝘦𝘯𝘴𝘪𝘷𝘦 𝘊𝘰𝘥𝘪𝘯𝘨, 𝘐𝘯𝘵𝘦𝘳𝘯𝘢𝘭 𝘙𝘦𝘤𝘰𝘯𝘯𝘢𝘪𝘴𝘴𝘢𝘯𝘤𝘦, 𝘢𝘯𝘥 𝘓𝘢𝘵𝘦𝘳𝘢𝘭 𝘔𝘰𝘷𝘦𝘮𝘦𝘯𝘵. 𝘌𝘢𝘤𝘩 𝘴𝘦𝘤𝘵𝘪𝘰𝘯 𝘸𝘪𝘭𝘭 𝘣𝘦 𝘤𝘰𝘷𝘦𝘳𝘦𝘥 𝘪𝘯 𝘥𝘦𝘱𝘵𝘩, 𝘱𝘳𝘰𝘷𝘪𝘥𝘪𝘯𝘨 𝘵𝘦𝘤𝘩𝘯𝘪𝘤𝘢𝘭 𝘦𝘷𝘪𝘥𝘦𝘯𝘤𝘦 𝘰𝘧 𝘩𝘰𝘸 𝘦𝘢𝘤𝘩 𝘵𝘦𝘤𝘩𝘯𝘪𝘲𝘶𝘦 𝘸𝘰𝘳𝘬𝘴 𝘣𝘦𝘩𝘪𝘯𝘥 𝘵𝘩𝘦 𝘴𝘤𝘦𝘯𝘦𝘴. 𝘙𝘦𝘥 𝘵𝘦𝘢𝘮 𝘦𝘹𝘦𝘳𝘤𝘪𝘴𝘦𝘴 𝘸𝘪𝘭𝘭 𝘣𝘦 𝘱𝘦𝘳𝘧𝘰𝘳𝘮𝘦𝘥 𝘵𝘰 𝘢𝘴𝘴𝘦𝘴𝘴 𝘳𝘦𝘴𝘱𝘰𝘯𝘴𝘪𝘷𝘦𝘯𝘦𝘴𝘴 𝘢𝘯𝘥 𝘥𝘦𝘵𝘦𝘤𝘵𝘪𝘰𝘯 𝘤𝘢𝘱𝘢𝘣𝘪𝘭𝘪𝘵𝘪𝘦𝘴. 𝘈𝘴 𝘢 𝘳𝘦𝘥 𝘵𝘦𝘢𝘮𝘦𝘳, 𝘪𝘵 𝘪𝘴 𝘪𝘮𝘱𝘰𝘳𝘵𝘢𝘯𝘵 𝘵𝘰 𝘶𝘯𝘥𝘦𝘳𝘴𝘵𝘢𝘯𝘥 𝘸𝘩𝘢𝘵 𝘦𝘢𝘤𝘩 𝘵𝘰𝘰𝘭 𝘢𝘯𝘥 𝘤𝘰𝘮𝘮𝘢𝘯𝘥 𝘺𝘰𝘶 𝘶𝘴𝘦 𝘪𝘴 𝘥𝘰𝘪𝘯𝘨 𝘣𝘦𝘩𝘪𝘯𝘥 𝘵𝘩𝘦 𝘴𝘤𝘦𝘯𝘦𝘴 𝘵𝘰 𝘱𝘳𝘰𝘷𝘪𝘥𝘦 𝘱𝘳𝘰𝘱𝘦𝘳 𝘨𝘶𝘪𝘥𝘢𝘯𝘤𝘦. 𝘌𝘹𝘱𝘦𝘤𝘵 𝘵𝘰 𝘱𝘦𝘳𝘧𝘰𝘳𝘮 𝘤𝘰𝘥𝘦 𝘳𝘦𝘷𝘪𝘦𝘸𝘴, 𝘯𝘦𝘵𝘸𝘰𝘳𝘬 𝘢𝘯𝘢𝘭𝘺𝘴𝘪𝘴, 𝘤𝘰𝘥𝘦 𝘣𝘦𝘩𝘢𝘷𝘪𝘰𝘳 𝘢𝘯𝘢𝘭𝘺𝘴𝘪𝘴, 𝘢𝘯𝘥 𝘸𝘳𝘪𝘵𝘦 𝘤𝘰𝘥𝘦 𝘵𝘰 𝘦𝘯𝘩𝘢𝘯𝘤𝘦 𝘺𝘰𝘶𝘳 𝘳𝘦𝘥 𝘵𝘦𝘢𝘮 𝘤𝘢𝘱𝘢𝘣𝘪𝘭𝘪𝘵𝘪𝘦𝘴."

About the trainer:
Charles F. Hamilton (Mr.Un1k0d3r) - Red Teamer with 10+ years experience delivering offensive testing services. Founder of RingZer0 Team website with 50,000+ members worldwide teaching hacking fundamentals. Prolific toolsmith and trainer who has delivered this training 20+ times. Specializes in covert Red Team operations in highly secured environments.

🔗 Get your ticket now to benefit from this world-class training: https://nsec.io/training-sessions/

#NorthSec #cybersecurity #infosec #redteam #activedirectory #EDR</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/156672a1-c34c-40c8-9082-78972a6c4e37/487514ef-710a-48b2-b4ad-350d1556ec50-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/3DgEi5kExJmRZ1zHrArCrn</video:player_loc><video:duration>15</video:duration><video:rating>0</video:rating><video:view_count>4</video:view_count><video:publication_date>2026-02-07T12:19:22.944Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/wiWSFJX7mAuzJPYscUVLRY</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/17efa92d-4403-411e-85c6-f8cc75a86d51.jpg</video:thumbnail_loc><video:title>𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝗙𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻𝘀/𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴𝘀: "AI SecureOps: Attacking &amp; Defending GenAI Applications and Services"</video:title><video:description>📅 Dates: May 12 and 13, 2026 (2 days)
🎯 Level: Medium

Description: "𝘊𝘢𝘯 𝘱𝘳𝘰𝘮𝘱𝘵 𝘪𝘯𝘫𝘦𝘤𝘵𝘪𝘰𝘯𝘴 𝘭𝘦𝘢𝘥 𝘵𝘰 𝘤𝘰𝘮𝘱𝘭𝘦𝘵𝘦 𝘪𝘯𝘧𝘳𝘢𝘴𝘵𝘳𝘶𝘤𝘵𝘶𝘳𝘦 𝘵𝘢𝘬𝘦𝘰𝘷𝘦𝘳𝘴? 𝘊𝘰𝘶𝘭𝘥 𝘈𝘐 𝘢𝘨𝘦𝘯𝘵𝘴 𝘣𝘦 𝘦𝘹𝘱𝘭𝘰𝘪𝘵𝘦𝘥 𝘵𝘰 𝘤𝘰𝘮𝘱𝘳𝘰𝘮𝘪𝘴𝘦 𝘣𝘢𝘤𝘬𝘦𝘯𝘥 𝘴𝘦𝘳𝘷𝘪𝘤𝘦𝘴? 𝘊𝘢𝘯 𝘫𝘢𝘪𝘭𝘣𝘳𝘦𝘢𝘬𝘴 𝘤𝘳𝘦𝘢𝘵𝘦 𝘧𝘢𝘭𝘴𝘦 𝘤𝘳𝘪𝘴𝘪𝘴 𝘢𝘭𝘦𝘳𝘵𝘴 𝘪𝘯 𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘴𝘺𝘴𝘵𝘦𝘮𝘴? 𝘐𝘯 𝘮𝘶𝘭𝘵𝘪-𝘢𝘨𝘦𝘯𝘵 𝘴𝘺𝘴𝘵𝘦𝘮𝘴, 𝘸𝘩𝘢𝘵 𝘪𝘧 𝘢𝘯 𝘢𝘵𝘵𝘢𝘤𝘬𝘦𝘳 𝘵𝘢𝘬𝘦𝘴 𝘰𝘷𝘦𝘳 𝘢𝘯 𝘢𝘨𝘦𝘯𝘵’𝘴 𝘨𝘰𝘢𝘭𝘴, 𝘵𝘶𝘳𝘯𝘪𝘯𝘨 𝘰𝘵𝘩𝘦𝘳 𝘢𝘨𝘦𝘯𝘵𝘴 𝘪𝘯𝘵𝘰 𝘤𝘰𝘰𝘳𝘥𝘪𝘯𝘢𝘵𝘦𝘥 𝘵𝘩𝘳𝘦𝘢𝘵𝘴? 𝘛𝘩𝘪𝘴 𝘪𝘮𝘮𝘦𝘳𝘴𝘪𝘷𝘦, 𝘊𝘛𝘍-𝘴𝘵𝘺𝘭𝘦𝘥 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨 𝘪𝘯 𝘈𝘐 𝘢𝘯𝘥 𝘓𝘓𝘔 𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘥𝘪𝘷𝘦𝘴 𝘪𝘯𝘵𝘰 𝘵𝘩𝘦𝘴𝘦 𝘱𝘳𝘦𝘴𝘴𝘪𝘯𝘨 𝘲𝘶𝘦𝘴𝘵𝘪𝘰𝘯𝘴. 𝘌𝘯𝘨𝘢𝘨𝘦 𝘪𝘯 𝘳𝘦𝘢𝘭𝘪𝘴𝘵𝘪𝘤 𝘢𝘵𝘵𝘢𝘤𝘬 𝘢𝘯𝘥 𝘥𝘦𝘧𝘦𝘯𝘴𝘦 𝘴𝘤𝘦𝘯𝘢𝘳𝘪𝘰𝘴 𝘧𝘰𝘤𝘶𝘴𝘦𝘥 𝘰𝘯 𝘳𝘦𝘢𝘭-𝘸𝘰𝘳𝘭𝘥 𝘵𝘩𝘳𝘦𝘢𝘵𝘴, 𝘧𝘳𝘰𝘮 𝘱𝘳𝘰𝘮𝘱𝘵 𝘪𝘯𝘫𝘦𝘤𝘵𝘪𝘰𝘯 𝘢𝘯𝘥 𝘳𝘦𝘮𝘰𝘵𝘦 𝘤𝘰𝘥𝘦 𝘦𝘹𝘦𝘤𝘶𝘵𝘪𝘰𝘯 𝘵𝘰 𝘣𝘢𝘤𝘬𝘦𝘯𝘥 𝘤𝘰𝘮𝘱𝘳𝘰𝘮𝘪𝘴𝘦. 𝘛𝘢𝘤𝘬𝘭𝘦 𝘩𝘢𝘯𝘥𝘴-𝘰𝘯 𝘤𝘩𝘢𝘭𝘭𝘦𝘯𝘨𝘦𝘴 𝘸𝘪𝘵𝘩 𝘢𝘤𝘵𝘶𝘢𝘭 𝘈𝘐 𝘢𝘱𝘱𝘭𝘪𝘤𝘢𝘵𝘪𝘰𝘯𝘴 &amp; 𝘢𝘨𝘦𝘯𝘵𝘪𝘤 𝘴𝘺𝘴𝘵𝘦𝘮𝘴 𝘵𝘰 𝘶𝘯𝘥𝘦𝘳𝘴𝘵𝘢𝘯𝘥 𝘷𝘶𝘭𝘯𝘦𝘳𝘢𝘣𝘪𝘭𝘪𝘵𝘪𝘦𝘴 𝘢𝘯𝘥 𝘥𝘦𝘷𝘦𝘭𝘰𝘱 𝘳𝘰𝘣𝘶𝘴𝘵 𝘥𝘦𝘧𝘦𝘯𝘴𝘦𝘴. [...]"

About the trainer:
Abhinav Singh is a seasoned cybersecurity leader, researcher, and author with over 15 years of experience across global technology companies, startups, and financial institutions. A frequent speaker and trainer at international conferences including Black Hat, RSAC, and DEFCON, Abhinav is known for his ability to translate complex security concepts into practical, real-world strategies. His expertise spans AI, cloud, data, and enterprise security, with a strong focus on how emerging technologies are redefining both attack and defense.

🔗 Save Your Spot Now:
https://nsec.io/training/2026-ai-secureops-attacking--defending-ai-applications--agents/</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/f5739f01-cdc7-4559-8171-58280723726a/26f9567c-4855-4a1e-9786-f909f5f0dd3c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/wiWSFJX7mAuzJPYscUVLRY</video:player_loc><video:duration>15</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2026-02-07T23:18:59.980Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/uotTuj38Reb5yvv1KdAAET</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b59d727a-2c33-489c-a334-637796db0e8c.jpg</video:thumbnail_loc><video:title>🏋️ 𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲 𝗙𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻𝘀/𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴𝘀: "Deconstructing Rust Binaries" 𝗽𝗮𝗿/𝗯𝘆 Decoder Loop</video:title><video:description>📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
🖥️ Mode: Hybrid (on-site &amp; remote)

Description:
"𝘙𝘶𝘴𝘵-𝘣𝘢𝘴𝘦𝘥 𝘮𝘢𝘭𝘸𝘢𝘳𝘦 𝘪𝘴 𝘢 𝘨𝘳𝘰𝘸𝘪𝘯𝘨 𝘵𝘩𝘳𝘦𝘢𝘵. 𝘋𝘦𝘤𝘰𝘯𝘴𝘵𝘳𝘶𝘤𝘵𝘪𝘯𝘨 𝘙𝘶𝘴𝘵 𝘉𝘪𝘯𝘢𝘳𝘪𝘦𝘴 𝘦𝘲𝘶𝘪𝘱𝘴 𝘳𝘦𝘷𝘦𝘳𝘴𝘦 𝘦𝘯𝘨𝘪𝘯𝘦𝘦𝘳𝘴 𝘢𝘯𝘥 𝘮𝘢𝘭𝘸𝘢𝘳𝘦 𝘢𝘯𝘢𝘭𝘺𝘴𝘵𝘴 𝘸𝘪𝘵𝘩 𝘦𝘴𝘴𝘦𝘯𝘵𝘪𝘢𝘭 𝘴𝘬𝘪𝘭𝘭𝘴 𝘧𝘰𝘳 𝘵𝘢𝘤𝘬𝘭𝘪𝘯𝘨 𝘢 𝘯𝘦𝘸 𝘤𝘩𝘢𝘭𝘭𝘦𝘯𝘨𝘦. 𝘋𝘺𝘯𝘢𝘮𝘪𝘤 𝘣𝘪𝘯𝘢𝘳𝘪𝘦𝘴 𝘢𝘳𝘦 𝘪𝘯𝘤𝘳𝘦𝘢𝘴𝘪𝘯𝘨𝘭𝘺 𝘮𝘰𝘷𝘪𝘯𝘨 𝘵𝘰𝘸𝘢𝘳𝘥𝘴 𝘙𝘶𝘴𝘵, 𝘺𝘦𝘵 𝘳𝘦𝘷𝘦𝘳𝘴𝘦 𝘦𝘯𝘨𝘪𝘯𝘦𝘦𝘳𝘴 𝘭𝘢𝘤𝘬 𝘵𝘩𝘦 𝘴𝘱𝘦𝘤𝘪𝘢𝘭𝘪𝘻𝘦𝘥 𝘬𝘯𝘰𝘸𝘭𝘦𝘥𝘨𝘦 𝘵𝘰 𝘥𝘦𝘤𝘰𝘥𝘦 𝘵𝘩𝘦𝘮. 𝘛𝘩𝘪𝘴 𝘧𝘪𝘳𝘴𝘵-𝘰𝘧-𝘪𝘵𝘴-𝘬𝘪𝘯𝘥 𝘤𝘰𝘶𝘳𝘴𝘦 𝘣𝘳𝘪𝘥𝘨𝘦𝘴 𝘵𝘩𝘢𝘵 𝘤𝘳𝘪𝘵𝘪𝘤𝘢𝘭 𝘨𝘢𝘱. 𝘛𝘩𝘳𝘰𝘶𝘨𝘩 𝘢 𝘭𝘢𝘯𝘨𝘶𝘢𝘨𝘦-𝘤𝘦𝘯𝘵𝘳𝘪𝘤 𝘢𝘱𝘱𝘳𝘰𝘢𝘤𝘩, 𝘺𝘰𝘶'𝘭𝘭 𝘭𝘦𝘢𝘳𝘯 𝘙𝘶𝘴𝘵 𝘧𝘶𝘯𝘥𝘢𝘮𝘦𝘯𝘵𝘢𝘭𝘴, 𝘶𝘯𝘥𝘦𝘳𝘴𝘵𝘢𝘯𝘥 𝘩𝘰𝘸 𝘙𝘶𝘴𝘵 𝘤𝘰𝘯𝘴𝘵𝘳𝘶𝘤𝘵𝘴 𝘵𝘳𝘢𝘯𝘴𝘭𝘢𝘵𝘦 𝘵𝘰 𝘢𝘴𝘴𝘦𝘮𝘣𝘭𝘺, 𝘢𝘯𝘥 𝘮𝘢𝘴𝘵𝘦𝘳 𝘱𝘳𝘢𝘤𝘵𝘪𝘤𝘢𝘭 𝘵𝘳𝘪𝘢𝘨𝘦 𝘵𝘦𝘤𝘩𝘯𝘪𝘲𝘶𝘦𝘴. 𝘠𝘰𝘶'𝘭𝘭 𝘵𝘳𝘢𝘤𝘦 𝘥𝘢𝘵𝘢 𝘧𝘭𝘰𝘸𝘴, 𝘪𝘥𝘦𝘯𝘵𝘪𝘧𝘺 𝘧𝘶𝘯𝘤𝘵𝘪𝘰𝘯𝘢𝘭𝘪𝘵𝘺, 𝘢𝘯𝘥 𝘥𝘦𝘤𝘰𝘯𝘴𝘵𝘳𝘶𝘤𝘵 𝘳𝘦𝘢𝘭 𝘙𝘶𝘴𝘵 𝘮𝘢𝘭𝘸𝘢𝘳𝘦 𝘴𝘢𝘮𝘱𝘭𝘦𝘴 𝘪𝘯 𝘢 𝘴𝘵𝘳𝘶𝘤𝘵𝘶𝘳𝘦𝘥, 𝘦𝘧𝘧𝘪𝘤𝘪𝘦𝘯𝘵 𝘸𝘢𝘺. 𝘞𝘩𝘦𝘵𝘩𝘦𝘳 𝘺𝘰𝘶'𝘳𝘦 𝘢𝘯𝘢𝘭𝘺𝘻𝘪𝘯𝘨 𝘳𝘢𝘯𝘴𝘰𝘮𝘸𝘢𝘳𝘦 𝘰𝘳 𝘢𝘯𝘢𝘭𝘺𝘻𝘪𝘯𝘨 𝘭𝘦𝘨𝘪𝘵𝘪𝘮𝘢𝘵𝘦 𝘙𝘶𝘴𝘵-𝘣𝘢𝘴𝘦𝘥 𝘴𝘺𝘴𝘵𝘦𝘮𝘴, 𝘺𝘰𝘶'𝘭𝘭 𝘥𝘦𝘷𝘦𝘭𝘰𝘱 𝘵𝘩𝘦 𝘵𝘳𝘢𝘥𝘦𝘤𝘳𝘢𝘧𝘵 𝘯𝘦𝘦𝘥𝘦𝘥 𝘵𝘰 𝘲𝘶𝘪𝘤𝘬𝘭𝘺 𝘶𝘯𝘥𝘦𝘳𝘴𝘵𝘢𝘯𝘥 𝘢𝘯𝘥 𝘣𝘳𝘦𝘢𝘬 𝘥𝘰𝘸𝘯 𝘙𝘶𝘴𝘵 𝘣𝘪𝘯𝘢𝘳𝘪𝘦𝘴 𝘸𝘪𝘵𝘩 𝘤𝘰𝘯𝘧𝘪𝘥𝘦𝘯𝘤𝘦."

About the trainer:
Cindy Xiao is an experienced malware reverse engineer with specialized expertise in analyzing Rust binaries. She brings real-world knowledge of emerging Rust-based threats and combines technical depth with practical, hands-on instruction to help security professionals rapidly upskill in this critical domain.

🔗 Training details: https://nsec.io/training/2026-deconstructing-rust-binaries/

#NorthSec #cybersecurity #infosec #malwareanalysis #reverseengineering</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/e5e36e8d-2c18-4485-8842-df85648c3d07/f7049dfb-a096-48d9-a7d4-9880517c2043-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/uotTuj38Reb5yvv1KdAAET</video:player_loc><video:duration>15</video:duration><video:rating>0</video:rating><video:view_count>5</video:view_count><video:publication_date>2026-02-09T18:09:24.007Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/1wFHsNxmUf5QNM3hEsvBqv</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/ccfde9e5-899a-46ae-a076-2b4896205a60.jpg</video:thumbnail_loc><video:title>𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲 Trainings: "Reverse, Bypass, Exploit: Mobile Hacking Workshop" 𝗽𝗮𝗿/𝗯𝘆 Corellium</video:title><video:description>📅 Date: May 11, 2026 (1 day)
📊 Difficulty: Medium
🖥️ Mode: On-Site

Description: Master mobile app security techniques covering iOS and Android platforms. Learn real-time network traffic analysis, reverse engineering, SSL pinning bypass, and security control bypasses including biometrics and jailbreak detection. Manipulate runtime behavior with Frida and tackle real-world mobile security challenges. Perfect for penetration testers and security professionals. Bonus: One week Corellium Viper trial and mobile CTF access.

About the trainers:
David Backer is a systems engineer focused on mobile application security testing. He works across various of layers of the Corellium tech stack to help customers adopt the platform's many features. Before Corellium, he fabricated cutting edge microprocessors in high-volume factories as well as designed, modeled, and fabricated novel silicon research devices. David also has experience with distributed systems, cryptography, data visualization, and business management.

Steven Smiley is a Senior Product Manager at MAST Solutions with over a decade of experience in mobile penetration testing and mobile application security. He holds a degree in Computer Security and Investigations from Fleming College and maintains two SANS certifications in mobile security and forensics (GMOB, GASF). Prior to joining the Corellium team, Steven worked as an independent consultant, leading mobile security assessments and penetration testing engagements for a wide range of organizations.

🔗 Training details: https://nsec.io/training/2026-reverse-bypass-exploit-mobile-hacking-workshop/

#NorthSec #cybersecurity #mobileappsecurity  #penetrationtesting</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/0448c9cb-0cae-408c-8a39-8a7bae4ae361/7e7497b7-2940-4f69-bddb-76343d049032-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/1wFHsNxmUf5QNM3hEsvBqv</video:player_loc><video:duration>20</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2026-02-11T14:59:27.246Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/56pueP9AR89pKqyAtz4dbQ</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/7f0a5dff-2e8a-45c0-a1a6-1a868f3eecc8.jpg</video:thumbnail_loc><video:title>𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲 𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴: "Offensive Development Practitioner Certification" 𝗽𝗮𝗿/𝗯𝘆 White Knight Labs</video:title><video:description>📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
🖥️ Mode: Hybrid (on-site &amp; remote)

Description: "𝘛𝘩𝘦 𝘖𝘧𝘧𝘦𝘯𝘴𝘪𝘷𝘦 𝘋𝘦𝘷𝘦𝘭𝘰𝘱𝘮𝘦𝘯𝘵 𝘗𝘳𝘢𝘤𝘵𝘪𝘵𝘪𝘰𝘯𝘦𝘳 𝘊𝘦𝘳𝘵𝘪𝘧𝘪𝘤𝘢𝘵𝘪𝘰𝘯 (𝘖𝘋𝘗𝘊) 𝘪𝘴 𝘥𝘦𝘴𝘪𝘨𝘯𝘦𝘥 𝘵𝘰 𝘵𝘢𝘬𝘦 𝘺𝘰𝘶 𝘥𝘦𝘦𝘱 𝘪𝘯𝘵𝘰 𝘵𝘩𝘦 𝘳𝘦𝘢𝘭𝘪𝘵𝘪𝘦𝘴 𝘰𝘧 𝘮𝘰𝘥𝘦𝘳𝘯 𝘥𝘦𝘧𝘦𝘯𝘴𝘦 𝘦𝘷𝘢𝘴𝘪𝘰𝘯 𝘢𝘯𝘥 𝘰𝘧𝘧𝘦𝘯𝘴𝘪𝘷𝘦 𝘵𝘰𝘰𝘭𝘪𝘯𝘨, 𝘱𝘳𝘰𝘷𝘪𝘥𝘪𝘯𝘨 𝘵𝘩𝘦 𝘩𝘢𝘯𝘥𝘴-𝘰𝘯 𝘦𝘹𝘱𝘦𝘳𝘪𝘦𝘯𝘤𝘦 𝘯𝘦𝘦𝘥𝘦𝘥 𝘵𝘰 𝘰𝘱𝘦𝘳𝘢𝘵𝘦 𝘢𝘵 𝘢𝘯 𝘢𝘥𝘷𝘢𝘯𝘤𝘦𝘥 𝘭𝘦𝘷𝘦𝘭. 𝘛𝘩𝘳𝘰𝘶𝘨𝘩 𝘭𝘪𝘷𝘦, 𝘪𝘯𝘴𝘵𝘳𝘶𝘤𝘵𝘰𝘳-𝘴𝘶𝘱𝘱𝘰𝘳𝘵𝘦𝘥 𝘭𝘢𝘣𝘴, 𝘺𝘰𝘶’𝘭𝘭 𝘭𝘦𝘢𝘳𝘯 𝘩𝘰𝘸 𝘵𝘰 𝘰𝘷𝘦𝘳𝘤𝘰𝘮𝘦 𝘳𝘦𝘢𝘭-𝘸𝘰𝘳𝘭𝘥 𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘮𝘦𝘤𝘩𝘢𝘯𝘪𝘴𝘮𝘴 𝘣𝘺 𝘸𝘰𝘳𝘬𝘪𝘯𝘨 𝘥𝘪𝘳𝘦𝘤𝘵𝘭𝘺 𝘸𝘪𝘵𝘩 𝘛𝘦𝘳𝘳𝘢𝘧𝘰𝘳𝘮-𝘥𝘦𝘱𝘭𝘰𝘺𝘦𝘥 𝘦𝘯𝘷𝘪𝘳𝘰𝘯𝘮𝘦𝘯𝘵𝘴, 𝘱𝘦𝘳𝘧𝘰𝘳𝘮𝘪𝘯𝘨 𝘗𝘌 𝘧𝘪𝘭𝘦 𝘤𝘰𝘯𝘷𝘦𝘳𝘴𝘪𝘰𝘯𝘴, 𝘢𝘯𝘥 𝘦𝘹𝘦𝘤𝘶𝘵𝘪𝘯𝘨 𝘢𝘥𝘷𝘢𝘯𝘤𝘦𝘥 𝘱𝘳𝘰𝘤𝘦𝘴𝘴-𝘪𝘯𝘫𝘦𝘤𝘵𝘪𝘰𝘯 𝘴𝘵𝘳𝘢𝘵𝘦𝘨𝘪𝘦𝘴. 

𝘛𝘩𝘦 𝘤𝘰𝘶𝘳𝘴𝘦 𝘵𝘩𝘦𝘯 𝘦𝘹𝘱𝘢𝘯𝘥𝘴 𝘪𝘯𝘵𝘰 𝘦𝘹𝘱𝘦𝘳𝘵-𝘭𝘦𝘷𝘦𝘭 𝘰𝘧𝘧𝘦𝘯𝘴𝘪𝘷𝘦 𝘥𝘦𝘷𝘦𝘭𝘰𝘱𝘮𝘦𝘯𝘵, 𝘪𝘯𝘤𝘭𝘶𝘥𝘪𝘯𝘨 𝘪𝘯-𝘥𝘦𝘱𝘵𝘩 𝘦𝘹𝘱𝘭𝘰𝘳𝘢𝘵𝘪𝘰𝘯 𝘰𝘧 𝘊𝘰𝘣𝘢𝘭𝘵 𝘚𝘵𝘳𝘪𝘬𝘦 𝘤𝘰𝘮𝘮𝘢𝘯𝘥-𝘢𝘯𝘥-𝘤𝘰𝘯𝘵𝘳𝘰𝘭 𝘧𝘳𝘢𝘮𝘦𝘸𝘰𝘳𝘬𝘴, 𝘴𝘢𝘯𝘥𝘣𝘰𝘹 𝘥𝘦𝘵𝘦𝘤𝘵𝘪𝘰𝘯 𝘦𝘷𝘢𝘴𝘪𝘰𝘯, 𝘢𝘯𝘥 𝘴𝘰𝘱𝘩𝘪𝘴𝘵𝘪𝘤𝘢𝘵𝘦𝘥 𝘌𝘋𝘙 𝘣𝘺𝘱𝘢𝘴𝘴 𝘵𝘦𝘤𝘩𝘯𝘪𝘲𝘶𝘦𝘴. 𝘠𝘰𝘶’𝘭𝘭 𝘢𝘭𝘴𝘰 𝘥𝘦𝘷𝘦𝘭𝘰𝘱 𝘵𝘩𝘦 𝘢𝘣𝘪𝘭𝘪𝘵𝘺 𝘵𝘰 𝘥𝘦𝘴𝘪𝘨𝘯 𝘢𝘯𝘥 𝘥𝘦𝘱𝘭𝘰𝘺 𝘤𝘶𝘴𝘵𝘰𝘮 𝘱𝘢𝘺𝘭𝘰𝘢𝘥𝘴, 𝘣𝘶𝘪𝘭𝘥𝘪𝘯𝘨 𝘳𝘦𝘧𝘭𝘦𝘤𝘵𝘪𝘷𝘦 𝘋𝘓𝘓 𝘭𝘰𝘢𝘥𝘦𝘳𝘴, 𝘦𝘯𝘨𝘪𝘯𝘦𝘦𝘳𝘪𝘯𝘨 𝘈𝘔𝘚𝘐 𝘢𝘯𝘥 𝘌𝘛𝘞 𝘣𝘺𝘱𝘢𝘴𝘴𝘦𝘴, 𝘢𝘯𝘥 𝘤𝘳𝘢𝘧𝘵𝘪𝘯𝘨 𝘵𝘢𝘪𝘭𝘰𝘳𝘦𝘥 𝘰𝘧𝘧𝘦𝘯𝘴𝘪𝘷𝘦 𝘵𝘰𝘰𝘭𝘪𝘯𝘨 𝘧𝘳𝘰𝘮 𝘵𝘩𝘦 𝘨𝘳𝘰𝘶𝘯𝘥 𝘶𝘱. 𝘉𝘺 𝘣𝘭𝘦𝘯𝘥𝘪𝘯𝘨 𝘥𝘦𝘦𝘱 𝘵𝘦𝘤𝘩𝘯𝘪𝘤𝘢𝘭 𝘪𝘯𝘴𝘵𝘳𝘶𝘤𝘵𝘪𝘰𝘯 𝘸𝘪𝘵𝘩 𝘱𝘳𝘢𝘤𝘵𝘪𝘤𝘢𝘭, 𝘪𝘯𝘵𝘦𝘳𝘢𝘤𝘵𝘪𝘷𝘦 𝘭𝘢𝘣𝘴, 𝘖𝘋𝘗𝘊 𝘨𝘪𝘷𝘦𝘴 𝘺𝘰𝘶 𝘵𝘩𝘦 𝘬𝘯𝘰𝘸𝘭𝘦𝘥𝘨𝘦, 𝘴𝘬𝘪𝘭𝘭𝘴, 𝘢𝘯𝘥 𝘤𝘰𝘯𝘧𝘪𝘥𝘦𝘯𝘤𝘦 𝘵𝘰 𝘶𝘯𝘥𝘦𝘳𝘴𝘵𝘢𝘯𝘥—𝘢𝘯𝘥 𝘰𝘶𝘵𝘮𝘢𝘯𝘦𝘶𝘷𝘦𝘳—𝘮𝘰𝘥𝘦𝘳𝘯 𝘥𝘦𝘧𝘦𝘯𝘴𝘪𝘷𝘦 𝘵𝘦𝘤𝘩𝘯𝘰𝘭𝘰𝘨𝘪𝘦𝘴."

About the trainer:
Munaf Shariff is an offensive development specialist with deep expertise in bypassing modern security mechanisms and building custom offensive tooling that operates effectively in real-world environments.

🔗 Training details: https://nsec.io/training/2026-offensive-development-practitioner-certification-odpc/#bio

#NorthSec #cybersecurity #offensivesecurity #malware #evasion</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/2125bf6e-d00e-406c-a12d-0c5c45880c0c/e2e9fa51-957e-4738-aa5d-8a16a280f853-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/56pueP9AR89pKqyAtz4dbQ</video:player_loc><video:duration>10</video:duration><video:rating>0</video:rating><video:view_count>1</video:view_count><video:publication_date>2026-02-11T14:59:30.327Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/kuhM88iV9BMSXMU5mL9h5r</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/803d57ca-8889-4acc-8476-25f49d0a4836.jpg</video:thumbnail_loc><video:title>𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲 Trainings: "Attacking &amp; Securing CI/CD Pipeline Certification" 𝗯𝘆 White Knight Labs</video:title><video:description>📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
🖥️ Mode: Hybrid (on-site &amp; remote)

Description: Master CI/CD security through practical offense and defense. Explore GitHub Actions context injection, CircleCI misconfigurations, AWS CodeBuild exploitation, Docker registry attacks, Kubernetes risks, and Azure DevOps abuse. Learn to identify and exploit real vulnerabilities while gaining hands-on defensive engineering techniques. Work directly with modern tools including GitHub Actions, CircleCI, Docker, Kubernetes, and AWS CodeBuild.

About the trainers:
Raunak Parmar and Bobby Schwass are DevSecOps specialists with extensive experience securing CI/CD pipelines and understanding the threat landscape across modern development infrastructure.

🔗 Training details: https://nsec.io/training/2026-attacking--securing-cicd-pipeline-certification-ascpc/

#NorthSec #cybersecurity #devsecops #cicd #cloudsecurity</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/9dd0ccc6-1683-4a5a-9034-34f273ad51c1/ba2334a1-10cb-4b0b-9ecf-2d99d6b6ef69-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/kuhM88iV9BMSXMU5mL9h5r</video:player_loc><video:duration>15</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2026-02-12T14:16:35.631Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/3xqYRM2k5Q18G96RooJnmL</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/c421adf3-b539-4645-a77d-3d77edc850aa.jpg</video:thumbnail_loc><video:title>FalconForce    Training Post 2026</video:title><video:description>🏋️ 𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲 𝗙𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻𝘀/𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴𝘀 (9/12): "Advanced Detection Engineering in the Enterprise" 𝗽𝗮𝗿/𝗯𝘆 ⛄️ Olaf Hartong &amp; Rogier Boon (FalconForce)

📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
🖥️ Mode: On-Site

Description: "𝘍𝘢𝘭𝘤𝘰𝘯𝘍𝘰𝘳𝘤𝘦 𝘥𝘦𝘷𝘦𝘭𝘰𝘱𝘦𝘥 𝘢 𝘴𝘱𝘦𝘤𝘪𝘢𝘭𝘪𝘴𝘵 𝘸𝘰𝘳𝘬𝘴𝘩𝘰𝘱 𝘧𝘰𝘳 𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘱𝘳𝘰𝘧𝘦𝘴𝘴𝘪𝘰𝘯𝘢𝘭𝘴 𝘵𝘰 𝘩𝘦𝘭𝘱 𝘵𝘢𝘬𝘪𝘯𝘨 𝘵𝘩𝘦𝘪𝘳 𝘥𝘦𝘵𝘦𝘤𝘵𝘪𝘰𝘯 𝘦𝘯𝘨𝘪𝘯𝘦𝘦𝘳𝘪𝘯𝘨 𝘤𝘢𝘱𝘢𝘣𝘪𝘭𝘪𝘵𝘪𝘦𝘴 𝘵𝘰 𝘵𝘩𝘦 𝘯𝘦𝘹𝘵 𝘭𝘦𝘷𝘦𝘭. 𝘈𝘯 𝘶𝘭𝘵𝘪𝘮𝘢𝘵𝘦 𝘥𝘦𝘵𝘦𝘤𝘵𝘪𝘰𝘯 𝘦𝘯𝘨𝘪𝘯𝘦𝘦𝘳𝘪𝘯𝘨 𝘭𝘦𝘢𝘳𝘯𝘪𝘯𝘨 𝘦𝘹𝘱𝘦𝘳𝘪𝘦𝘯𝘤𝘦 𝘸𝘪𝘵𝘩 𝘵𝘩𝘦 𝘰𝘱𝘱𝘰𝘳𝘵𝘶𝘯𝘪𝘵𝘺 𝘵𝘰 𝘨𝘰 𝘢𝘭𝘭-𝘪𝘯 𝘸𝘪𝘵𝘩 𝘳𝘦𝘢𝘭-𝘭𝘪𝘧𝘦, 𝘩𝘢𝘯𝘥𝘴-𝘰𝘯 𝘭𝘢𝘣 𝘦𝘹𝘦𝘳𝘤𝘪𝘴𝘦𝘴. 𝘛𝘩𝘦 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨 𝘤𝘰𝘷𝘦𝘳𝘴 𝘢 𝘧𝘶𝘭𝘭, 𝘳𝘦𝘢𝘭𝘪𝘴𝘵𝘪𝘤 𝘢𝘵𝘵𝘢𝘤𝘬𝘦𝘳 𝘴𝘤𝘦𝘯𝘢𝘳𝘪𝘰 𝘪𝘯 𝘢𝘯 𝘦𝘯𝘵𝘦𝘳𝘱𝘳𝘪𝘴𝘦 𝘦𝘯𝘷𝘪𝘳𝘰𝘯𝘮𝘦𝘯𝘵: 𝘧𝘳𝘰𝘮 𝘵𝘩𝘦 𝘦𝘯𝘥𝘱𝘰𝘪𝘯𝘵, 𝘵𝘩𝘳𝘰𝘶𝘨𝘩 𝘵𝘩𝘦 𝘈𝘤𝘵𝘪𝘷𝘦 𝘋𝘪𝘳𝘦𝘤𝘵𝘰𝘳𝘺 𝘢𝘯𝘥 𝘪𝘯𝘵𝘰 𝘵𝘩𝘦 𝘤𝘭𝘰𝘶𝘥 𝘦𝘯𝘷𝘪𝘳𝘰𝘯𝘮𝘦𝘯𝘵.

𝘛𝘩𝘪𝘴 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨 𝘪𝘴 𝘭𝘦𝘥 𝘣𝘺 𝘦𝘹𝘱𝘦𝘳𝘪𝘦𝘯𝘤𝘦𝘥 𝘪𝘯𝘴𝘵𝘳𝘶𝘤𝘵𝘰𝘳𝘴 𝘵𝘩𝘢𝘵 𝘵𝘦𝘢𝘤𝘩 𝘴𝘵𝘶𝘥𝘦𝘯𝘵𝘴 𝘵𝘰:
𝘜𝘯𝘥𝘦𝘳𝘴𝘵𝘢𝘯𝘥 𝘩𝘰𝘸 𝘵𝘰 𝘳𝘦𝘴𝘦𝘢𝘳𝘤𝘩 𝘢𝘯 𝘢𝘵𝘵𝘢𝘤𝘬𝘦𝘳 𝘵𝘦𝘤𝘩𝘯𝘪𝘲𝘶𝘦 𝘶𝘴𝘦𝘥 𝘪𝘯 𝘤𝘰𝘳𝘱𝘰𝘳𝘢𝘵𝘦 𝘦𝘯𝘷𝘪𝘳𝘰𝘯𝘮𝘦𝘯𝘵𝘴.
𝘉𝘶𝘪𝘭𝘥 𝘳𝘦𝘴𝘪𝘭𝘪𝘦𝘯𝘵 𝘥𝘦𝘵𝘦𝘤𝘵𝘪𝘰𝘯𝘴 𝘵𝘩𝘢𝘵 𝘢𝘳𝘦 𝘩𝘢𝘳𝘥𝘦𝘳 𝘵𝘰 𝘦𝘷𝘢𝘥𝘦 𝘣𝘺 𝘢𝘯 𝘢𝘵𝘵𝘢𝘤𝘬𝘦𝘳.
𝘝𝘢𝘭𝘪𝘥𝘢𝘵𝘦 𝘵𝘩𝘦𝘪𝘳 𝘥𝘦𝘵𝘦𝘤𝘵𝘪𝘰𝘯𝘴 𝘵𝘰 𝘮𝘢𝘬𝘦 𝘴𝘶𝘳𝘦 𝘵𝘩𝘦𝘺 𝘬𝘦𝘦𝘱 𝘧𝘶𝘯𝘤𝘵𝘪𝘰𝘯𝘪𝘯𝘨 𝘢𝘴 𝘪𝘯𝘵𝘦𝘯𝘥𝘦𝘥.
𝘛𝘩𝘦 𝘵𝘳𝘢𝘪𝘯𝘪𝘯𝘨 𝘧𝘰𝘤𝘶𝘴𝘦𝘴 𝘰𝘯 𝘔𝘪𝘤𝘳𝘰𝘴𝘰𝘧𝘵 𝘚𝘦𝘯𝘵𝘪𝘯𝘦𝘭 𝘢𝘯𝘥 𝘋𝘦𝘧𝘦𝘯𝘥𝘦𝘳 𝘟𝘋𝘙, 𝘣𝘶𝘵 𝘤𝘰𝘯𝘤𝘦𝘱𝘵𝘴 𝘤𝘢𝘯 𝘣𝘦 𝘢𝘱𝘱𝘭𝘪𝘦𝘥 𝘵𝘰 𝘰𝘵𝘩𝘦𝘳 𝘴𝘵𝘢𝘤𝘬𝘴 𝘢𝘴 𝘸𝘦𝘭𝘭."

About the trainers:
Olaf Hartong has a vast experience in digital security, specialized in security operations, detection engineering and threat hunting. Olaf has extensive knowledge of different monitoring platforms, in particular the Microsoft Defender XDR and Sentinel stack. He presents on well-known security conferences, such as BlackHat, Defcon, WWHF, BRUcon, SOcon, NorthSec, Insomni'hack and MITRE ATT&amp;CKcon. Olaf is the author of ThreatHunting for Splunk, ATTACKdatamap, FalconHound, and Sysmon-modular tools.

Rogier Boon has over 20 years experience as both a security consultant and in-house technical specialist. Throughout his career, Rogier had roles as offensive specialist and blue teamer (TIER2/3 SOC, incident response, detection engineer). Rogier brings extensive experience working in various high-tech environments and researching a multitude of technologies. Rogier facilitated at...</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/1495ba96-4554-4db1-9138-73d36a4f9918/2535d4f3-3049-4e35-a88a-1d2ce772ca6c-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/3xqYRM2k5Q18G96RooJnmL</video:player_loc><video:duration>20</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2026-02-13T19:21:50.387Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/nsec/videos">NorthSec</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/aX8KpvFjY4RQ3sjiEqENKM</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/2633efb2-735d-44e8-bf84-f94fba5559d8.jpg</video:thumbnail_loc><video:title>#chatgpt thinks you should throw away all your upside down cups</video:title><video:description>#chatgpt thinks you should throw away all your upside down cups</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/5094ee2e-25bd-43d0-85df-d6daa97624d3/4b794faa-04bd-4e38-85d8-f1c13ad334a1-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/aX8KpvFjY4RQ3sjiEqENKM</video:player_loc><video:duration>92</video:duration><video:rating>0</video:rating><video:view_count>2</video:view_count><video:publication_date>2026-02-17T18:01:49.897Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/4UtrHKYUACoBzWdZh4te1g</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/190bf271-2ffd-4938-bbac-7478a66d3c83.jpg</video:thumbnail_loc><video:title>That time we asked every #ai if we should walk to the car wash</video:title><video:description>That time we asked every #ai if we should walk to the car wash</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/1f9f0130-739b-4809-a75d-9eaff0f6fc8b/fba9aed3-59a8-4d97-b798-b067d046efd7-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/4UtrHKYUACoBzWdZh4te1g</video:player_loc><video:duration>369</video:duration><video:rating>0</video:rating><video:view_count>3</video:view_count><video:publication_date>2026-02-17T18:03:51.523Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/8kqhKB6UWrZMhxrYWw1Mko</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/642fc387-27c4-412e-acfc-eb5e01893f1d.jpg</video:thumbnail_loc><video:title>Brian Piton // Joe Spectacle (spectacle complet)</video:title><video:description>Un accident de grille-pain fait passer Brian Piton de modeste employé d'épicerie à héros scénique prodigieux. Il n'est plus Brian Piton. Il est... Joe Spectacle. 

Texte // Brian Piton
Script-édition // Pierre-Yves Roy-Desmarais
Réalisation // Pierre-Yves Roy-Desmarais
Captation et mix sonore // Mathieu Magny

Spectacle capté le 18 septembre 2024 au Lionceau Comédie Club à Montréal.
Pour noter le show sur Letterboxd: https://letterboxd.com/film/brian-piton-joe-spectacle/

Je serais très content que vous partagiez le spectacle :)

Mes prochaines dates de show: https://brianpiton.com/

00:00 Titre
00:08 Introduction
01:19 1ère scène: L'accident
06:12 2e scène: Le IGA
08:56 Liste de chiens
10:57 3e scène: La prophétie
14:24 4e scène: La soirée de poésie
19:51 5e scène: Le port de Tétreaultville
21:38 6e scène: Bingo Comédie
24:38 7e scène: Chez Cynthia
27:55 8e scène: L'unicycle
30:16 9e scène: Le IGA (retour)
33:12 10e scène: Préparation au combat
38:36 11e scène: Les doutes de Bruno
40:01 12e scène: La galerie d'art
41:55 13e scène: La confrontation
47:28 14e scène: La galerie d'art (toilette)
48:02 Sortie
49:24 Générique

/ Bande sonore du spectacle /
Spotify: https://open.spotify.com/intl-fr/album/40dSBVvF3R9kRcbjHLKl0e
Apple Music: https://music.apple.com/ie/album/joe-spectacle-bande-sonore-originale/1829699307</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/3b66121d-f7f8-4d8a-98a7-df6229289ad8/6ea6d9b6-22f4-4e18-a0ff-f7f24db6557d-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/8kqhKB6UWrZMhxrYWw1Mko</video:player_loc><video:duration>3014</video:duration><video:rating>0</video:rating><video:view_count>22</video:view_count><video:publication_date>2026-02-27T06:33:56.201Z</video:publication_date><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/w/12j3MS3BWFRh3Py7tWRevB</loc><video:video><video:thumbnail_loc>https://videos.spacebar.ca/lazy-static/thumbnails/b3ee8152-efdd-48c0-80a5-392503583211.jpg</video:thumbnail_loc><video:title>Tunak Tunak Tun Video | Daler Mehndi | Full Song | Daler Mehndi Music</video:title><video:description>Tunak Tunak Tun Video | Daler Mehndi | Full Song | Daler Mehndi Music</video:description><video:content_loc>https://videos.spacebar.ca/static/streaming-playlists/hls/002eddc6-efeb-4626-ab11-c448a1404cf1/493da30d-980c-43ea-a0b8-593aa2341cd6-master.m3u8</video:content_loc><video:player_loc>https://videos.spacebar.ca/videos/embed/12j3MS3BWFRh3Py7tWRevB</video:player_loc><video:duration>256</video:duration><video:rating>5</video:rating><video:view_count>5</video:view_count><video:publication_date>2026-04-05T04:34:31.901Z</video:publication_date><video:tag>DRecords</video:tag><video:tag>DM DRecords</video:tag><video:tag>Daler Mehndi</video:tag><video:tag>Daler Mehndi Drecords</video:tag><video:tag>Music</video:tag><video:family_friendly>YES</video:family_friendly><video:uploader info="https://videos.spacebar.ca/c/simon_archive/videos">Simon's Video Archive</video:uploader><video:live>NO</video:live></video:video></url><url><loc>https://videos.spacebar.ca/c/simon_archive/videos</loc></url><url><loc>https://videos.spacebar.ca/c/nsec/videos</loc></url><url><loc>https://videos.spacebar.ca/c/dans_les_medias/videos</loc></url><url><loc>https://videos.spacebar.ca/c/vegan/videos</loc></url><url><loc>https://videos.spacebar.ca/c/astardust_channel/videos</loc></url><url><loc>https://videos.spacebar.ca/c/slime/videos</loc></url><url><loc>https://videos.spacebar.ca/a/scarpentier/video-channels</loc></url><url><loc>https://videos.spacebar.ca/a/astardust/video-channels</loc></url></urlset>