2022  5

April  1

April 6, 2022

  • A Quick Introduction to Manual Source Code Review

    by Poh Jia Hao (Security Researcher, STAR Labs, NUS Greyhats Alumni)

  • A case study of an incorrect bitwise and optimization in V8

    by Lucas Tay (Security Researcher, STAR Labs)

March  2

March 23, 2022

  • SecWed Mini-CTF

    by NUS Greyhats

March 9, 2022

  • How to build an automated Incident Response and Forensics Readiness Framework on AWS

    by Lucas Kauffman (AWS)

  • (Worst) day in the life of a security engineer?

    by Yeo Quan Yang (Snapchat, NUS Greyhats Alumni)

February  1

February 9, 2022

  • Breach and Attack Simulation (Security Validation)

    by Ragavan Srinivasan (Solutions System Engineer at Mandiant)

  • Some Hows and Whys of CTFs

    by Weiu Cheng (Greyhats)

January  1

January 26, 2022

  • An introduction to container hacking

    by Rory McCune (Cloud Native Security Advocate for Aqua)

  • An Introduction to Burp Suite

    by Adhy (Greyhats)

  • Automate Reverse Engineering CTF with Angr

    by Bailin (Greyhats)

2021  11

November  1

November 3, 2021

  • Source Engine code auditing adventure

    by Bien (SEA Group)

  • SecWed Mini CTF

    by NUS Greyhats

October  4

October 27, 2021

  • My OSCP Journey

    by Tan Jia Le (Greyhats)

  • So you want to be a Malware Reverse Engineer (RE) ?

    by Mark Lim (Palo Alto Networks)

October 20, 2021

  • Cryptography - Diophantine equation

    by Tan Kel Zin (Greyhats)

  • A practical approach to Image Forensics

    by Chan Jian Hao (Greyhats)

  • Hoodwinked

    by Nigel Tan (Greyhats)

  • An introduction to XXE attacks

    by Chong Jin Hwa Brandon (Greyhats)

October 13, 2021

  • A Guide on Antivirus Evasion

    by Glenice Tan (GovTech)

  • Dirty Deeds Done Dirt Cheap

    by Wong Wai Tuck (SMU)

October 6, 2021

  • The Usual SOCpects - How we detect and respond to security threats

    by Dr. Choo Fai Cheong & Ian Starr Esguerra (UKG)

September  3

September 15, 2021

  • Unusual Applications of OpenAI in Cybersecurity

    by Eugene Lim (Govtech)

  • How to get into CTFs

    by Chandrasekaran Akash (NUS Greyhats)

September 8, 2021

  • Identifying Bugs in Router Firmware at Scale with Taint Analysis

    by Daniel Lim (NUS Greyhats)

  • The Spectre of Ransomware and the Criminal Underground

    by Aaron Ng (Crowdstrike)

September 1, 2021

  • Cyber Risk Quantification - Let’s talk cyber risk management

    by Debbie Tan (Greyhats)

  • Static code analysis with Semgrep

    by Terry Chia (Centurion Information Security)

August  3

August 25, 2021

  • Cyber threat intelligence - Winning the war on cybercrime

    by Lionel Bruchez (UBS)

August 18, 2021

  • Defending Singapore‚Äôs Digital Borders

    by COL Justiin Ang (SAF)

  • Adversarial Attack on Machine Learning Models

    by Jiyi (NUS)

August 11, 2021

  • Greyhats Introduction

    by NUS Greyhats

  • Enigma and Bombe - How they encrypt and how they decipher in WWII

    by Professor Chang Ee-Chien (NUS)