Infosec In the City
This is the official YouTube channel for Infosec In the City, SINCON and Division Zero (Div0).
Hunting for Zero Days in Large Applications - by Donavan Cheah
NaughtyMag: Making Air-gapped MacBook Wink Its Data Away - by Adhokshaj Mishra
De-anonymizing Threat Actors and Exposing Their Infrastructure Using Infostealer Intelligence
DrawMeATree: The Master Key to WinDbg's Fortress - by Mathilde Venault
From the Frontlines: Building Defences That Work - by Lesley Carhart
A Decade of Cowrie: Evolution & Lessons - by Michel Oosterhof
Hunting for Dark Pink: Uncovering APT Threats through Telegram C2 Message Extraction
The Pitfalls of SSO and the Rise of Extended Access Management - by Dave Lewis
Using Discord For C2 Operations - by Ilyas Jie En & Colby Tan
APTs in APAC aerospace: When Dragons and Chollimas Reach for the Stars - by Vic Huang & Sol Yang
Finding Adversary Infrastructure Before the Attack- Future Based Threat Intelligence by Ken Bagnall
NATO 360 Degree Approach to Security & the Cooperation with Partners - by Pietro De Matteis
CLINKER — An Efficient Distilled LLM Command Line Graph Constructor
DarkMesh: A Knowledge Graph-Enhanced Blue Team Monitoring Tool for Telegram - by Yuki Hung
How Security Blue Team Attacked the SmartLoader Malware by Using Its Own Obfuscator by David Elliot
Detection-as-Code: Build Threat Detections the Way You Build Software - by Cherlynn Cha
Defending Singapore through Adopting a Red Team Mindset - by BG Edward Chen
Squidoor: Unmasking a Sophisticated Multi-Platform Backdoor in APT Operations
Navigating Today's Security Landscape: Insights and Strategies - by Abhishek Kumar Singh
Infosec In the City, SINCON 2025 Highlights
Scaling Red Team Operations - by Sunny Neo
Getting off the Scan-and-Fix Hamster Wheel with Generative AI - by Dr. Asankhaya Sharma
Bug Bounty Hunting for ChromeOS Kernel Vulnerability - by Yao Zhihua
Is Your Brand Being Stolen? - by Byron Wai
Pwning Orbeon Forms to Access Governments, Enterprises & Health Organisations - by Sonny Macdonald
Getting Started with Security Chaos Engineering - by Kevin Low
Cloud Engagement Mastery: Red Team Edition -by Sim Cher Boon
Unmasking Stealthy Threats: Lessons from the Ivanti 0-Days - by Billy Wong & Shawn Chew
Kali Linux: Unveiling the Hidden Gems of the Industry Standard - by Jim O'Gorman
Lateral Movement Exploiting Network Slicing in 5G Core - by Dr. Ayush Kumar & Dr. Vrizlynn Thing