There is no doubt that GenAI has already disrupted many industries and workflows. However, just like any technology, between the hype and promises, there are risks that do not get the attention they deserve.
Mitigation and defense strategies.
Elaborating on Conditional Access bypasses and what happens after initial access is established.
ITSecX 2025 was a great time again. For everyone who could not make it, we want to summarize our experiences and our talk.