Ignat Korchagin: What is Linux kernel keystore and why you should usage it in your next application
Dominik Czarnota: Linux privesc via arbitrary x86 MSRs read/write bug: case survey from CTF challenge
Mateusz Jurczyk: Windows Registry Deja Vu: The Return of Confused Deputies | CONFidence
Kamil Frankowicz: Automatyzacja automatyzacji czyli o fuzzingu w dobie GPT-5 & Gemini i innych
Leo Valentic: Hide and Seek in Windows' Closet: Unmasking the WinSxS Hijacking Hideout | CONFidence
Shmuel Cohen: The Dark Side of EDR: Repurpose EDR as an Offensive Tool | CONFidence
Raunak Parmar: Hacker's communicative from Reader to Global Admin in Azure | CONFidence
Geri Revay: Don’t flatten yourself: deobfuscating malware with Control-Flow Flattening | CONFidence
Szymon Chadam: Elektroniczny, ale czy bezpieczny? Hackowanie nowego mObywatela 2.0 | CONFidence
Piotr Jabłoński: Istio's safety policy breach | CONFidence