2023  11

November  1

November 15, 2023

  • Practical Application of Fuzzing – Finding CVE-2021-3376

    by Yi Tian

October  2

October 18, 2023

  • From Software Engineer to Security Leadership, sharing insights and perspectives from my career journey to help you with yours

    by Mr Tim Yip

October 11, 2023

  • Hacking IoT devices: A story of stealing fingerprints

    by Dr Steve Kerrison

September  1

September 23, 2023

  • ARM Confidential Compute Architecture (ARM CCA)

    by Mr Wang Chenyu (Huawei International Singapore)

April  1

April 5, 2023

  • SQLancer and Intramorphic Testing

    by Dr Manuel Rigger (Assistant Professor leading the TEST Lab at NUS)

  • The IKIGAI of Cyber Security Research

    by Vicky Ray (Director of Palo Alto Networks UNIT 42 Cyber Consulting & Threat Intelligence team for Asia Pacific & Japan)

March  1

March 15, 2023

  • EDGe PS (Enterprise Data Platforms, GIS and Engineering & Production Services)

    by Uma Telidevara (Senior Vice President of APAC Enterprise Data and GIS Production Operations from Bank of America)

  • Hosting Services/Cloud

    by Taryar Win Chan (Vice President and Senior Technology Manager from Bank of America)

February  3

February 16, 2023

  • Intermediate Web Hacking Techniques

    by Devesh

February 9, 2023

  • Introduction to Computer Networking & Wireshark workshop.

    by Sean

February 1, 2023

  • Tricks to RE fast

    by Daniel

January  2

January 26, 2023

  • Intro to Heap Pwn (Part 2)

    by Akash

January 18, 2023

  • Intro to Heap Pwn (Part 1)

    by Akash

2022  7

November  1

November 2, 2022

  • Introduction to System Defence as discipline

    by Kalaiselvi Velusamy (Vice President; Info Security Threat Management Specialist)

  • Vulnerability Assessment and Penetration Testing (VAPT) in the Software Development Lifecycle– Why it is important to have VAPT programs

    by Harris Ramli (Vice President; Info Security Exposure Management Senior Specialist)

October  1

October 19, 2022

  • NUS Greyhats Web Security Workshop

    by Jun Hua

April  1

April 6, 2022

  • A Quick Introduction to Manual Source Code Review

    by Poh Jia Hao (Security Researcher, STAR Labs, NUS Greyhats Alumni)

  • A case study of an incorrect bitwise and optimization in V8

    by Lucas Tay (Security Researcher, STAR Labs)

March  2

March 23, 2022

  • SecWed Mini-CTF

    by NUS Greyhats

March 9, 2022

  • How to build an automated Incident Response and Forensics Readiness Framework on AWS

    by Lucas Kauffman (AWS)

  • (Worst) day in the life of a security engineer?

    by Yeo Quan Yang (Snapchat, NUS Greyhats Alumni)

February  1

February 9, 2022

  • Breach and Attack Simulation (Security Validation)

    by Ragavan Srinivasan (Solutions System Engineer at Mandiant)

  • Some Hows and Whys of CTFs

    by Weiu Cheng (Greyhats)

January  1

January 26, 2022

  • An introduction to container hacking

    by Rory McCune (Cloud Native Security Advocate for Aqua)

  • An Introduction to Burp Suite

    by Adhy (Greyhats)

  • Automate Reverse Engineering CTF with Angr

    by Bailin (Greyhats)

2021  11

November  1

November 3, 2021

  • Source Engine code auditing adventure

    by Bien (SEA Group)

  • SecWed Mini CTF

    by NUS Greyhats

October  4

October 27, 2021

  • My OSCP Journey

    by Tan Jia Le (Greyhats)

  • So you want to be a Malware Reverse Engineer (RE) ?

    by Mark Lim (Palo Alto Networks)

October 20, 2021

  • Cryptography - Diophantine equation

    by Tan Kel Zin (Greyhats)

  • A practical approach to Image Forensics

    by Chan Jian Hao (Greyhats)

  • Hoodwinked

    by Nigel Tan (Greyhats)

  • An introduction to XXE attacks

    by Chong Jin Hwa Brandon (Greyhats)

October 13, 2021

  • A Guide on Antivirus Evasion

    by Glenice Tan (GovTech)

  • Dirty Deeds Done Dirt Cheap

    by Wong Wai Tuck (SMU)

October 6, 2021

  • The Usual SOCpects - How we detect and respond to security threats

    by Dr. Choo Fai Cheong & Ian Starr Esguerra (UKG)

September  3

September 15, 2021

  • Unusual Applications of OpenAI in Cybersecurity

    by Eugene Lim (Govtech)

  • How to get into CTFs

    by Chandrasekaran Akash (NUS Greyhats)

September 8, 2021

  • Identifying Bugs in Router Firmware at Scale with Taint Analysis

    by Daniel Lim (NUS Greyhats)

  • The Spectre of Ransomware and the Criminal Underground

    by Aaron Ng (Crowdstrike)

September 1, 2021

  • Cyber Risk Quantification - Let’s talk cyber risk management

    by Debbie Tan (Greyhats)

  • Static code analysis with Semgrep

    by Terry Chia (Centurion Information Security)

August  3

August 25, 2021

  • Cyber threat intelligence - Winning the war on cybercrime

    by Lionel Bruchez (UBS)

August 18, 2021

  • Defending Singapore’s Digital Borders

    by COL Justiin Ang (SAF)

  • Adversarial Attack on Machine Learning Models

    by Jiyi (NUS)

August 11, 2021

  • Greyhats Introduction

    by NUS Greyhats

  • Enigma and Bombe - How they encrypt and how they decipher in WWII

    by Professor Chang Ee-Chien (NUS)