Practical Use Cases of Exploiting MS Exchange in External Penetration Tests
Expert at Positive Technologies
Malware analyst at VinCSS Cyber Security Services
Empowering Malware Analysis with IDA AppCall Feature
Threat Researcher at Positive Technologies
Stratocaster: How we automated the routine search for unknown malware in the network traffic
CosmicSting: Unveiling one of the Largest E-Commerce Exploit — Vulnerability Discovery, Live Demo and Security Impact
Independent security researcher
Malware and Hunting for Persistence: How Adversaries Exploit Your Windows?
Leader of IoT Pentest - VNPT Cyber Immunity
How to Steal a Drone (Drone Hijacking)
Hacking BFSI systems: key learnings
Hacking BFSI systems: key learnings
Freelance cybersecurity consultant
NTLM Relay: Attack & Defend
Senior Red Team Operator in Zurich Insurance Group
NTLM Relay: Attack & Defend
CEO of Chongluadao. vn and Technical Expert at the National Cyber Security Center (NCSC)
Opening keynote. Hack the Hackers: The Art of Blackhat Counterintelligence