Madhu Akula

Madhu Akula is a pragmatic security leader and creator of Kubernetes Goat, an intentionally vulnerable by design Kubernetes Cluster to learn and practice Kubernetes Security. Also published author and Cloud Native Security Architect with extensive experience. Also, he is an active member of the international security, DevOps, and Cloud Native communities (null, DevSecOps, AllDayDevOps, AWS, […]

Max Kersten

Max Kersten is a malware analyst, blogger, and speaker who aims to make malware analysis more approachable for those who are starting. In 2019, Max graduated cum laude with a bachelor in IT & Cyber Security, during which Max also worked as an Android malware analyst. Currently, Max works as a malware analyst at Trellix. […]

Matteo Beccaro

Matteo is a security researcher enrolled in computer engineering course at Politecnico of Torino. As Opposing Force’s Chief Technical Officer, he manages internal security research on network protocols, Near Field Communication (NFC) and access control security. He presented the results of his research to prestigious international conferences such DEF CON 21, 30th Chaos Communication Congress (30C3), Black Hat USA Arsenal 2014, DEF CON 22 SkyTalks, […]

Ben Brucker

With over 8 years of experience, Ben Brücker is Secura’s lead for Red Teaming and a senior security specialist. As an avid fan of Social Engineering, he specializes in initial access techniques where he developed Secura’s version of a repeatable Red Teaming infrastructure. Besides his operational work, Ben is a trainer for a number of […]

Laurent Oudot

Laurent OUDOT is a senior international expert in cybersecurity. He is the Chief Technical Officer (CTO) and co-CEO of TEHTRIS, the only European XDR solution recognized by Gartner in its 2021 market guide. For more than 20 years, as an ethical hacker and international expert in cybersecurity, his technical skills and knowledge in penetration testing […]

Mohamad Mokbel

Mohamad Mokbel is a senior security researcher at Trend Micro. He’s responsible for reverse engineering vulnerabilities and malware C&C communication protocols, among others, to write custom filters for TippingPoint NGIPS. Before joining Trend Micro, Mohamad worked for CIBC in the SoC, one of the top five banks in Canada as a senior information security consultant-investigator […]

Marcus Botacin

Marcus is an Assistant Professor @ Texas A&M University, where he develops cybersecurity research. Marcus holds a Computer Science PhD degree. Marcus has more than 10 years of experience in academic research, resulting in publications in top-tier venues. Marcus’ research interests cover all topics related to malware analysis, detection, and forensics. Marcus research experiences resulted […]

Davide Ornaghi

As a long-time iOS security enthusiast, I was able to grasp the main kernel attack vectors and defense mechanisms. I got my Master’s degree in Cybersecurity in 2021. During my thesis, I had the opportunity to write a forensic framework for iOS to support file system acquisitions by reusing the major available kernel exploits. I […]

Carlos Gomez

I am an Offensive Security Engineer at IOActive while I’m in my last year of university studying my degree in Software Engineering specialized in cybersecurity at U-TAD. My passion for cybersecurity, particularly the world of Red Team and offensive security, has led me to participate regularly in CTF platforms like HTB (Hack the Box), TryHackme, […]

Ali Abdollahi

Ali is an Infosec engineer at Picnic Technologies B.V. and researcher with more than a decade of experience working in a variety of fields. He was speaker or trainer at DefCon RedTeam, AppSec and Aerospace villages, IEEE AI-ML-Workshop-2021, SSD TyphoonCon, c0c0n2019, BSides Toronto, Budapest, Calgary, Newcastle, Barcelona, OWASP Ottawa chapter, Confidence Conf2020, NoNameCon20, YASCon2020, COUNTERMEASURE […]