Bug bounty talks

Welcome to our community of renowned ethical hackers who have shared their expertise on the global stage, showcasing the best in cybersecurity research and innovation. This platform not only highlights the talented individuals we collaborate with, but also serves as a hub for event organizers to discover and connect with expert speakers who can bring unique insights and perspectives to their conferences. By featuring a diverse range of ethical hackers and their talks, we aim to foster a community that promotes knowledge sharing, collaboration, and opportunities for both hackers and event organizers alike.

Flo van der Vlist
Gouda, Netherlands
2025
Virtual

Trust No Prompt: Attacking and Defending LLMs

Large Language Models (LLMs) are transforming the way we build applications, automate workflows, and interact with technology, but they also introduce a new and rapidly evolving attack surface. In this talk, I'll dive into the real-world vulnerabilities that can arise when LLMs are integrated into applications without proper security considerations. Through a series of demos and case studies, I'll showcase how LLMs can be exploited through prompt injection, data leakage, privilege escalation, and model manipulation. These are not theoretical issues — they're vulnerabilities I've discovered in the wild, across real systems. But this isn't just about breaking things. I'll also cover practical strategies for securing LLM-powered applications, from input/output validation and sandboxing to context isolation and prompt hardening. Whether you're a red teamer, developer, or architect, you'll leave with a deeper understanding of how to identify, exploit, and defend against LLM-specific threats. AI may be the future, but security needs to catch up. It's time we start treating LLMs as critical components, not magic boxes.

LLM
Europe
2025

Magical Hacks

An interactive show packed with digital spectacle and real ethical hacks, presented as mind-blowing magic tricks. Prepare to be amazed as we reveal hacks that seem impossible until we break them down and show you how they work. Each magical hack comes with practical tips to help you stay cyber-savvy and protect yourself online. With a perfect mix of entertainment, education, and humor, this show is designed for everyone no technical background needed. This isn't just another cybersecurity talk. Itís a thrilling, eye-opening experience where real hacks unfold before your eyes!

Bug bounty
Security awareness
Video
Europe/World
2025
Virtual

Hardware hacking all the things!

Learn basic skills on how to approach and start hacking on IoT and other electronic devices. Discover how to exploit basic vulnerabilities using low-cost equipment. No soldering skills required!

Hardware hacking
Video
Anywhere
2025
Virtual

Hacking is easy!

Hi there 👋 I'm Robbe Van Roey and for the past 8 years I've devoted my life to securing the world around me. I've found vulnerabilities in Amazon, NVIDIA, European banks, and many many more! I've always enjoyed giving talks and have spoken at various conferences and events.

Bug bounty
Videos
West Coast, USA
2025
Virtual

Cybersecurity Shop Talk: Behind The Scenes Banter

Cybersecurity is celebrated as a booming field and fulfilling career choice – but what are the stories that no one tells you? Join John Hammond for an open session with behind-the-scenes banter in a choose-your-own-adventure style chat on cybersecurity training, certificates and industry accolades, current events, resources and more. From there, we'll dive into anything that interests YOU as the group: whether it is malware, cybercrime, hot topics of career mistakes and ethical dilemmas, or anything you want to chat about in an audience-driven discussion.

Security awareness
Video
Antwerp, Belgium
2025
Virtual

Bypassing Web Application Firewalls with API-to-API Hacking

Through organic growth, organisations often end up with an API architecture that allows an attacker to bypass the WAF. This talk explains how from an attacker's point of view.

API hacking
Reviews
Worldwide
2025
Virtual

I’m an API hacker: here’s how I hack everything from military bases to AI

I’m a hacker and I love APIs. Perhaps for obvious reasons: they are really vulnerable! But to my shame I actually don’t find really technical amazing vulnerabilities. Instead, I find the silly mistakes that are left over, the things developers forgot. I'll share four of my "best" bug bounty finds, how I found them, how I taught my mum to find them and how you can find them, too.

API hacking

Categories

Location

Year