- Pramod Rana – How to have visibility and security OF CICD ecosystem
- Doan Minh Long – Dissecting a Ransomware Operation From Propagation to extortion
- Zeze Lin – Shuttling Through Secret Pipes Unveiling Vulnerabilities in Leading VPNs
- Echo Lee – Demystifying the Arcane of Lateral Movement between Azure & On-Prem AD
- Navigating the Network_ Active Directory Attacks and OPSEC Strategies_by CJ Villapando
- Cellphone Security Exposed_ Understanding Interception and Other Cellphone Threats_by Henry N. Caga
- Launching of Siyasat Linux_by Eric Reyata and Dan Pablo
- Teardown of an EV charger for Security Research and When EV Chargers Attack!_by Jay Turla
- Vic Huang – Eerie Glow Unveiling Security Vulnerabilities in Open-Source Satellite Communication Protocols
- Konstantin Polishin – Red Team Social Engineering 2024 Initial Access TTP and project experience of the our team
- Polishin Konstantin Red Team Social Engineering 2024
- Blank
- Scott Jarkoff – Apocalypse? The Perils of Generative AI
- Chip Off Forensics_by Captain (a.k.a. Forensics and Hardware Ninja)
- Aaron Ng – Cyber-Physical Convergence – Peril or Opportunity?
- CJ Villapando – How Attackers Are Compromising Your Networks and What You Can Do About It
- Mariaane Bermejo – TA577 Tactics NTLM Hash Theft Through SMB Thread Hijacking
- Ely Tingson All in the Shark Family TODDLERSHARK
- Enhancing Your Red Team Arsenal Optimizing Havoc C2 by Bianca Gadiana
- Elvin Gentiles – Seeing is Not Believing Bypassing Facial Liveness Detection by Fooling the Sensor
- Niko Akatyev – How to run a real-world attack on cloud and protect from it
https://www.rootcon.org/html/archives/rc18
