Best Talks at 44CON 2025
Hand-picked from in-depth reviewer verdicts. View all talks at 44CON 2025 →
- 1. Two Fat Men, One Filesystem — Signedness
NFS (Network File System) version 2 and 3 are older than most of the people attacking them, and yet they remain deployed across internal enterprise networks, embedded devices, and — perplexingly — tho
- 2. Unveiling the Ghosts of Mobile Networks: When Will Old Bugs Die? — Dr. Altaf Shaik
Mobile network security bugs do not die when they are patched—they resurface in newer generations, migrate to related products, or persist unaddressed in deployed infrastructure for years. In this 44C
- 3. Bring Your Own Binaries – Train Your Own Graph Neural Network for Binary Function Search — Will Lyn
Will Lyn, Head of Cyber Intelligence at the UK's National Crime Agency (NCA), delivered a candid operational briefing on how law enforcement is evolving its doctrine to combat the ransomware ecosystem
- 4. HL7Magic: Medical Data Hacking Made Easy — Katie Inns
The healthcare industry is one of the most frequently targeted sectors for cyberattacks, yet security research into healthcare-specific protocols has historically been scarce and taboo. At 44CON 2025,
- 5. Unprivileged Containers: Shaving Yaks To Get the Toothpaste Back In the Tube — Matt Carroll
When Yelp's internal security team discovered that any developer on a shared development machine could trivially escalate to root — courtesy of privileged Docker sockets — the obvious answer was "just