Xuan Hai

PhD student at Lanzhou University. Main research areas: computer security and privacy; AI security

Nicolas Buzy Debat

Nicolas Buzy-Debat is currently the Red Team Lead at Grab, and has over a decade of experience in the cybersecurity industry, occupying positions ranging from Managed Vulnerability Intelligence consultant to Offensive Security and Red Team engineer. He enjoys exploiting Cloud environments and CI/CD systems, as well as experimenting and developing tradecraft on various systems including […]

Sabina Llewellyn

I am a penetration tester specializing in mobile security, with an interest in reverse engineering, vulnerability research, and bug bounty programs. Currently, I am conducting research on the vulnerabilities of Flutter mobile applications.

Surasak Sanguanpong

Interested  in: Computer networking Parallel processing High-speed network design

Pirawat Watanapongse

Assistant professor: Artificial Neural Networks Bioinformatics Computer Ethics Information System Security

Wararit Hongkamnerd

Wararit Hongkamnerd is currently a developer at Jitech Co.,Ltd, who has skills at computer network, computer security and linux system. Wararit is also a master’s student majoring in Computer engineering at Kasetsart University. His thesis mainly focuses on cybersecurity, designs an architecture for multi-tenant SIEM, which he uses his skills to develop proof-of-concept of the […]

Dawin Schmidt

I keep it short: I’m just another “security researcher” who is interested in Android, protocols and Applied Cryptography.

Kritsada Dechawattana

Kritsada Dechawattana, a cybersecurity consultant with over 3 years of experience in the field of Blockchain Security , Smart Contract Audit and Full Stack Security Consultant, He also have strong experience in SRE and DevSecOps engineering in Mobile Wallet development company for more than 6 years.

Anton Belousov

Anton has been involved in malware analysis since 2015. He likes thoroughly analyzing malware samples, identifying their features and similarities between each other. He has studied APT-group attacks, analyzed the tools used, analyzed network infrastructure, and searched for connections with known groups and attacks. At Positive Technologies, he developed expertise in PT Sandbox and PT […]