Skip to content

Details

We will kick-off 2025 with a technical presentation on malicious browser extension in a new venue.

Thanks to you for

  1. Keeping your RSVP up-to-date. We are usually over booked and have a long waitlist. We will sign you in and keep track of RSVPs attendance.
  2. Aligning with SecTalks no-bullshit code of conduct
  3. Keeping the venue nice and tidy during and after the session (Stone & Chalk is hosting us for first time and we want to be a good guest)

๐Ÿ‘‰ There are some out of pocket expenses for this event. Specifically, we are looking for catering sponsor. If this is something you or your company can support, please contact sydney@sectalks.org.

# Presentation

Title: Acquiring Malicious Browser Extension Samples on a Shoestring Budget

We'll explore how to acquire a set of malicious browser extension samples without needing enterprise-grade resources. Using only free resources and basic cryptanalysis techniques, we'll walk through how to pivot from a known indicator, decrypt obfuscated payloads, and trace newer samples in the hope of uncovering evolving variants of the malicious browser extension.

# Speaker: Pepe Berba

Currently works in the Threat Detection and Hunting team at Canva. I've worked in security for 5 years and previously worked in machine learning in a data science consultancy for 2 years.
X | Linkedin

# Speed hiring (experimental)

There is an opportunity for potential employers to do an impromptu 10 second description of their open role. If you are interested, speak with one of the organizer before start of the session.

Please note the best way to support SecTalks and tell others about your open roles is through sponsorship. We encourage companies, small or large, to come forward and support their local community.

# Sponsors

# Notes

Related topics

Events in Sydney, AU
Cybersecurity
Information Security
Operating Systems

You may also like