Insomni'hack 's Avatar

Insomni'hack

@1ns0mn1h4ck

Security conference and hacking contest founded and organized by @orangecyberch since 2008 in Lausanne, Switzerland.

153
Followers
0
Following
162
Posts
09.12.2024
Joined
Posts Following

Latest posts by Insomni'hack @1ns0mn1h4ck

Post image

Kirill Jutaev's talk is the cherry on the cake to close our agenda on Friday at #Insomnihack. Join us and learn how aged flaws are still exploited today and that they really never die.
Explore the talk: https://ow.ly/aQAa50YkUj7
#Cybersecurity #Infosec #INSO26 #CyberConference

11.03.2026 08:00 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

Physical access control matters. Join us with Marin Cornuot on how digital and physical security intersect in real intrusions.
Get your ticket for Insomni'hack: https://ow.ly/mWYX50YkhKt
#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

10.03.2026 15:00 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

We are proud to have WALLIX Group as a Silver sponsor.

🀝 Special thanks to the local team: Thomas Reinhard Rief, Elodie Oberli & Monika Sierocinski.

πŸ‘‰ Sign up now and be part of this great event: https://ow.ly/cUIh50Y9Wu9

#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

10.03.2026 08:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

On 20th March, Elias Issa presents the next evolution of Azure phishing techniques at #INSO26. For cloud security and SOC teams, you will learn that attackers adapt faster than defenses.
Check the programme: https://ow.ly/FPho50Ykgj3
#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

09.03.2026 08:00 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

Join the talk of Debjeet Banerjee at #INSO26. Debjeet connects development flaws to full-scale compromises. Leave with a GitHub reporting that walks you through the process of developing such malwares. Get to know more: https://ow.ly/zuuz50YkfW1
#Cybersecurity #Infosec #CyberConference

08.03.2026 09:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Explore with Qais Temeiza new attack vectors targeting flash memory and how embedded systems remain highly vulnerable.
Join us at Insomni'hack: https://ow.ly/5cLI50YkfyE
#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

07.03.2026 08:00 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

Poor key management leads to massive breaches, thus Emilien Le Jamtel talks "Keypocalypse". Understand real-world crypto failures and how to avoid them at Insomni'hack 2026.
Get your ticket now: https://ow.ly/Bo5X50YkffG
#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

06.03.2026 15:00 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

We are happy to welcome Fortra as a Silver sponsor for the first time this year.

🀝 Special thanks to the local team: Catherine Zack & Sophia Ivan Fernandes.

πŸ‘‰ Don’t wait and secure your spot now: https://ow.ly/tzgu50Y9W3r

#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

06.03.2026 08:00 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

We are delighted to welcome once again Trust Valley as our Community Partner.

🀝 Special thanks to the local team: Lennig Pedron, Flaminia Giuncato & Mayde Rodriguez!

πŸ‘‰ Book your seat now: https://ow.ly/EmF750YgxpE

#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

05.03.2026 15:00 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Phishing is becoming automated and autonomous. Christophe Tafani-Dereeper explores how modern campaigns evolve into worms at Insomni'hack 2026.
Get to know more: https://ow.ly/ZpkO50Ykepo
#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

05.03.2026 08:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Sebastian Avarvarei join us once again and shares practical ways to streamline security operations without losing control. For CISOs and SOC managers, learn how security complexity kills visibility at #INSO26. Buy your ticket: https://ow.ly/IJsB50YkegS
#Infosec #CyberConference

04.03.2026 15:00 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

We are happy to welcome XM Cyber a Silver sponsor for the first time this year.

🀝 Special thanks to the local team!

πŸ‘‰ Book your seat now: https://ow.ly/NuX150Ybqye

#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

04.03.2026 08:00 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Get to know how a modern smartphone like the Samsung Galaxy S25 got hacked with a 1-click RCE chain. Sacha Kozma & Yichen Chai will walk through how an ordinary app became the key to a full exploit chain. Join the talk: https://ow.ly/xgmL50YkkvS
#Cybersecurity #Infosec #INSO26 #CyberConference

03.03.2026 15:00 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

Learn how to prepare for the transition to post-quantum cryptography. Florian Widmer will share his experience, challenges, and practical solutions for integrating quantum-resistant cryptography.

Get your ticket: https://ow.ly/UT3u50YnSpm

#Cybersecurity #Infosec #INSO26 #CyberConference

03.03.2026 11:00 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

We are delighted to welcome Flare as a Silver sponsor for the first time this year.

🀝 Special thanks to the local team: Bill Imbimbo & Laura Turek.

πŸ‘‰ Don’t wait, sign up now and join our event: https://ow.ly/ABJf50Y9VH8

#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

03.03.2026 08:00 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

We are glad to welcome Proofpoint as a Silver sponsor for this new edition.

🀝 Special thanks to the local team!

πŸ‘‰ To participate, register here: https://ow.ly/kRUt50YgwR1

#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

02.03.2026 15:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Who is not an user of a cloud service nowadays? Well, Bobby Rauch dissects a sophisticated Google Drive attack chain in his talk at #INSO26: Unmasking a Google Drive Phishing Chain.
Stay up-to-date and join us: https://ow.ly/E8lx50Ykch9
#Cybersecurity #Infosec #CyberConference

02.03.2026 08:00 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

What does it take to exploit Linux Kernel USB vulnerabilities against a modern Linux version? Learn more with rherrera and Alex Plaskett in their talk "Exploiting USB on a Tesla IVI".
Secure your ticket: https://ow.ly/fiL650Ykbup
#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

01.03.2026 14:25 πŸ‘ 5 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Post image

Is weak Privileged Account Management a total compromise? Melina Phillips explains why so and how. Buy your ticket and be part #INSO26: https://ow.ly/KMbu50Ykayg
#Cybersecurity #Insomnihack

28.02.2026 08:00 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

Andrea Pierini breaks down reflection attacks and their impact on enterprise security in this new talk at #INSO26. Are you interested in how modern authentication flow works? So this talk is for you! Save your spot: https://ow.ly/bY0650YkakJ
#Cybersecurity #Infosec #CyberConference

27.02.2026 15:00 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

We are grateful to have Exclusive Networks as a Silver sponsor.

🀝 Special thanks to Daniele Regazzoni.

Get your ticket now and be part of the community: https://ow.ly/Af8S50Y9UGS

#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

27.02.2026 08:00 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Legacy authentication keeps haunting enterprises. Understand the struggles of on-the-ground IT and security teams with Marina Bochenkova and why NTLM remains a liability until today.
Join this session at #Insomnihack: https://ow.ly/F3G250YmoOm
#Cybersecurity #Infosec #INSO26 #CyberConference

26.02.2026 15:01 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

SIM farms power large-scale fraud and account takeover. Uncover it with Keven Hendricks and learn how they work and how to detect them. A must for fraud, telecom, and SOC teams!
Buy your ticket: https://ow.ly/apRr50Yk6Gg
#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

26.02.2026 08:00 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

πŸ§‘β€πŸ’» Master advanced detection techniques with our workshop.

πŸ›‘οΈ Build, tune, and optimize detection engines to identify threats. Gain practical skills to strengthen your security.

πŸ‘‰ Register now: https://ow.ly/rZOa50Ygtv1

#InsomniHack #Cybersecurity #Infosec #INSO2026 #Cyberworkshops

25.02.2026 15:00 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

Did you experience how ransomware attacks in real environments works? Explore this suject with Carel van Rooyen and Nicolas Heiniger at #Insomnihack 2026!
Places are limited!
Join us at: https://ow.ly/iQCF50Yk6po
#Cybersecurity #Infosec #INSO26 #CyberConference

25.02.2026 08:00 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

We introduce Wojtek Sochacki and Maroua Lahlouhi as speakers at #INSO26. They show how System Access Control Lists can dramatically improve detection and response. Explore this native audit mechanism with us on March, 19.
Secure your spot: https://ow.ly/oMn650Yk60h
#Infosec #CyberConference

24.02.2026 15:01 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

We are pleased to welcome ESET as a Silver sponsor for the first time this year.

🀝 Special thanks to the local team: Belal Nazar & Simone Bâttcher.

πŸ‘‰ Get your ticket now and be part of the community: https://ow.ly/eohv50Y9Ujo

#InsomniHack #Cybersecurity #Infosec #INSO26 #CyberConference

24.02.2026 08:00 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

πŸ§‘β€πŸš’ Learn to manage cyber crises with our workshop.

πŸ›‘οΈ Prepare, train, and run realistic exercises to protect your organization and gain practical insights from experts in a safe environment.

πŸ‘‰ Sign up: https://ow.ly/b5Bn50Ygs38

#InsomniHack #Cybersecurity #Infosec #INSO2026 #Cyberworkshops

23.02.2026 15:00 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

Explore with AloΓ―s CollΓ©aux-Le ChΓͺne large-scale abuse scenarios and defensive strategies in his talk at #INSO26 and understand how tokens can become single points of failure. Check it out: https://ow.ly/Vbby50Yk5Rq
#Cybersecurity #Infosec #CyberConference

23.02.2026 09:30 πŸ‘ 3 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Post image

What everyday interaction in the Windows context menu could be abused to trigger command injection? Follow this talk with RΓ©mi GASCOU (Podalirius) and understand vulnerabilities in Windows 10 & 11 context menus.

Get to know more: https://ow.ly/YLYf50YiLhx

#InsomniHack #Cybersecurity #INSO26

21.02.2026 08:00 πŸ‘ 3 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0