BSidesNYC's Avatar

BSidesNYC

@bsidesnyc.org

70
Followers
22
Following
73
Posts
31.12.2024
Joined
Posts Following

Latest posts by BSidesNYC @bsidesnyc.org

Post image Post image

The Allure of Go’s Cross-Platform Capability: A Gateway for Threat Actors to Mac and Linux

Anmol Maurya, Staff Malware Reverse Engineer at Palo Alto Networks, examines how threat actors use Go to target Mac and Linux systems and what makes detection and analysis so challenging. #BSidesNYC

18.10.2025 21:06 👍 0 🔁 0 💬 0 📌 0
Post image

Contribute to Learn: Building DFIR Expertise Through Open Source

Christopher Eng, Independent Digital Forensic Researcher and CIO, shares how contributing to open-source DFIR tools like KAPE and Velociraptor can accelerate hands-on learning and community growth. #BSidesNYC

18.10.2025 21:01 👍 1 🔁 0 💬 0 📌 0
Post image

Inside Ransomware: Facts and Findings from the BlackBasta and LockBit Leaks

Cory Wolff, Director of Offensive Security at risk3sixty, breaks down leaked data from major ransomware groups to reveal how affiliates collaborate, develop payloads, and profit. #BSidesNYC

18.10.2025 20:15 👍 0 🔁 0 💬 0 📌 0
Post image Post image

Interactive Networking Fingerprinting Walkthrough

Vlad Iliushin, Cybersecurity Expert at ELLIO and President of AMTSO, leads a hands-on workshop on modern passive fingerprinting techniques like JA3, JA4, p0f, and MuonFP. #BSidesNYC

18.10.2025 19:44 👍 1 🔁 0 💬 0 📌 0
Post image Post image

Rebooting the Cyber Arsenal of Democracy

Eric Foster, CEO of TENEX.ai, shares hard-earned lessons from building and exiting multiple security companies and what it takes to launch and scale a cybersecurity startup in 2025. #BSidesNYC

18.10.2025 19:34 👍 0 🔁 0 💬 0 📌 0
Post image Post image

P0LR Espresso: Pulling Shots of Cloud Live Response & Advanced Analysis

Art Ukshini, Threat Researcher at Permiso Security, presents P0LR Espresso, a tool built to cut through noisy cloud logs, detect threats in real time, and speed up incident response. #BSidesNYC

18.10.2025 19:29 👍 0 🔁 0 💬 0 📌 0
Post image

The Log Rings Don’t Lie: Historical Enumeration in Plain Sight
Bleon Proko, Security Engineer, shows how attackers can use logs to perform enumeration, run C2 channels, and exfiltrate data through cloud infrastructure. #BSidesNYC

18.10.2025 19:22 👍 0 🔁 0 💬 0 📌 0
Post image Post image

The History of Malware: From Floppies to Droppers

Eliad Kimhy, Senior Security Researcher at Acronis, traces the evolution of malware from its early floppy disk days to modern ransomware, showing what has changed and what has stayed the same. #BSidesNYC

18.10.2025 18:36 👍 1 🔁 0 💬 0 📌 0
Post image

Atomic Red Team 101

Gerard Johansen from Red Canary and Ryan Lanciali lead a hands-on workshop on using Atomic Red Team to emulate threats, validate defenses, and strengthen detection and response. #BSidesNYC

18.10.2025 18:29 👍 0 🔁 0 💬 0 📌 0
Post image Post image

When the Shadow Crosses Over
Ilya Yatsenko, Offensive Security Engineer and OSCE3, explores Remote Desktop shadowing in Windows and how the same techniques can now be used from Linux and macOS systems. #BSidesNYC

18.10.2025 18:24 👍 1 🔁 0 💬 0 📌 0
Post image Post image

Trust at Scale: Lessons Learned from a Decade of Engineering for Identity

Frédéric Rivain, CTO at Dashlane, shares lessons from building secure-by-design systems and scaling trust across millions of users in the evolving world of identity security. #BSidesNYC

18.10.2025 18:12 👍 1 🔁 0 💬 0 📌 0
Post image Post image

Living off the (land)cloud: Scattered Spider and the Cloud Control Plane

Shivakumar Buruganahalli, Senior Director of Customer Engineering at Acalvio, breaks down how Scattered Spider exploits cloud identities and IAM to move laterally and evade detection. #BSidesNYC

18.10.2025 18:06 👍 0 🔁 0 💬 0 📌 0
Post image Post image

Using Volatility 3 to Detect Sophisticated Malware

Andrew Case, Director of Research at Volexity, shows how new features and plugins in Volatility 3 help detect modern ransomware and APT techniques that evade traditional defenses. #BSidesNYC

18.10.2025 17:52 👍 0 🔁 0 💬 0 📌 0
Post image

Mastering OWASP Amass v5.0
Jeff Foley, Project Leader at the OWASP Foundation, leads a hands-on workshop on the new graph-powered capabilities in Amass v5.0 for next-level asset discovery and reconnaissance. #BSidesNYC

18.10.2025 17:34 👍 0 🔁 0 💬 0 📌 0
Post image Post image

Essential Marketing for Cyber Founders
Gianna Whitver, Co-Founder and CEO of the Cybersecurity Marketing Society, shares how founders can stretch their budgets and market smarter at every stage of their startup journey. #BSidesNYC

18.10.2025 15:50 👍 1 🔁 0 💬 0 📌 0
Post image

Understanding Python Bytecode
Rocky Bernstein, Chief Mad Scientist Emeritus, leads a hands-on workshop on disassembling, assembling, and decompiling Python bytecode using tools like xdis, xasm, and uncompyle6. #BSidesNYC

18.10.2025 15:36 👍 1 🔁 0 💬 0 📌 0
Post image Post image

The Human-AI Handshake: A Framework to Build Trust and Unlock Innovation in Modern Security Ops

Michael August Raggi, Principal Threat Response Specialist at Crowdstrike, shares how AI can build trust, boost efficiency, and spark innovation in security operations. #BSidesNYC

18.10.2025 15:28 👍 0 🔁 0 💬 0 📌 0
Post image Post image

Spycraft 2.0: Hunting Dead Drops in Web Applications
Jonathan Fuller, CISO and Academy Professor at West Point, explains how attackers hide command and control servers inside public web apps and how defenders can uncover these digital dead drops. #BSidesNYC

18.10.2025 15:23 👍 1 🔁 0 💬 1 📌 0
Post image Post image

Inboxfuscation: Out-of-the-Box Mailbox Obfuscation
Andi Ahmeti, Threat Researcher at Permiso Security, shares new findings on unseen obfuscation techniques in Exchange mailboxes that turn Business Email Compromise into business email chaos. #BSidesNYC

18.10.2025 15:20 👍 0 🔁 0 💬 0 📌 0
Post image Post image

What It’s Like Being the Only Security Startup in Your YC Batch
SubImage Co-founders Alex Chantavy and Kunaal Sikka share what it was like building a cybersecurity startup in Y Combinator’s Winter 2025 batch surrounded by AI ventures. #BSidesNYC

18.10.2025 15:00 👍 0 🔁 0 💬 0 📌 0
Post image Post image

Syndicate: The Life of a Ransomware Affiliate
Tammy Harper from Flare breaks down the world of ransomware-as-a-service, showing how affiliates evolve from small-time operators to full syndicates and what keeps these underground groups running. #BSidesNYC

18.10.2025 14:56 👍 0 🔁 0 💬 0 📌 0
Post image Post image

From Interview Questions to Cluster Damage: Adventures in k8s Cluster Hacking, presented by Amit Serper, Lead Security Researcher at CrowdStrike.

The talk highlights Kubernetes vulnerabilities found during testing and offers practical ways to secure cluster setups. #BSidesNYC

18.10.2025 14:39 👍 0 🔁 0 💬 0 📌 0
Post image Post image

Detecting and Preventing Obfuscated Script Execution with Tree-sitter, presented by David McDonald, Software Engineer at Volexity.

This talk shows how tree-sitter can detect and block obfuscated scripts, strengthening defenses against AMSI bypasses and malware attacks. #BSidesNYC

18.10.2025 14:35 👍 0 🔁 0 💬 0 📌 0
Post image Post image

Down the Drain: Unpacking TON of Crypto Drainers, presented by Elizaveta Mikheeva, Cybersecurity Researcher at Neplox.
The talk explores how attackers use wallet impersonation and data manipulation on the TON Network to steal coins and NFTs. #BSidesNYC

18.10.2025 14:29 👍 0 🔁 0 💬 0 📌 0
Post image Post image

At BSidesNYC, Lucas Nelson, Founding Partner at Lytical Ventures, shares an inside look at how cybersecurity investors think. His talk highlights common pitching mistakes founders make and what truly captures a VC’s attention.

18.10.2025 14:15 👍 0 🔁 0 💬 0 📌 0
Post image

Huge thank you to John Jay College for their continued support and for hosting BSidesNYC again this year. Always a great space for the community to come together.

18.10.2025 13:35 👍 2 🔁 0 💬 0 📌 0
Post image Post image

Great start to the day with John Hammond’s keynote at BSidesNYC 0x05

#BSidesNYC

18.10.2025 13:22 👍 1 🔁 0 💬 0 📌 0
Post image Post image

Kicking of BSidesNYC 0x05 with opening remarks from Huxley Barbee.

18.10.2025 13:13 👍 2 🔁 0 💬 0 📌 0
Post image

BSidesNYC welcomes @semgrep.com as a megabit sponsor for our Oct 18, 2025, conference. bsidesnyc.org Semgrep: All the insights from static analysis. None of the false positives. semgrep.com

17.10.2025 18:34 👍 0 🔁 0 💬 0 📌 0
Post image

BSidesNYC welcomes Cotool as a kilobit sponsor for our Oct 18, 2025, conference. bsidesnyc.org Cotool works alongside security engineers during alert triage & investigation, reducing time spent by up to 90%. cotool.ai

16.10.2025 14:10 👍 0 🔁 0 💬 0 📌 0