Most people think of Evil Twin attacks as little more than fake
login pages for harvesting credentials, but that's only scratching the surface. This talk
explores how an Evil Twin infrastructure can be leveraged for far more impactful attacks,
moving beyond simple phishing into direct methods of gaining access to target
systems.
Speaker: Harold "superkojiman" Rodriguez (Offensive Security Researcher)
Connect with fellow cybersecurity enthusiasts, share knowledge, and stay updated on upcoming events.
AI tools can find the obvious bugs. They follow the most
suspicious-looking signal until it checks out, then move on. This talk breaks down the
structural reasons AI agents fail at exhaustive vulnerability discovery, and what a
better approach looks like.
Speaker: Jeet (Offensive Security Engineer @ Robinhood)
A full ICS attack simulation — false data injection into state
estimation, Modbus register overwrites, MQTT broker takeover, and chained attacks
against distributed energy resources. The operator dashboard stayed green the entire
time.
Speaker: Parham Mohammadi (Postdoctoral Researcher @ York
University)
How ransomware gangs actually work from leaked chats and real
people. From script kiddies to corporate syndicates. DC416's relaunch
event.
Speaker: Tammy Harper (Senior Threat Intelligence Researcher @
Flare)
Have expertise to share with our community? We're accepting proposals for talks and workshops.