2025 LINEUP How Does “The Com” Work?Allison Nixon | Ben Coon Is It Ransomware: The Gameshow!Allan Liska | Jon DiMaggio The Forbidden Fruit: How Info Stealers Take a Byte Out of macOSCharlie Cullen | Maddie Stewart RADIANT SPIDER Unveiled: Insights into a Chinese eCrime Actor’s Tradecraft, from Exploitation to FormjackingEric Loui Crazy, Stupid, RansomwareKristina Savelesky | Simeon Kakpovi Online Bank Account Takeover Via Webinjects in 2025 - Old Techniques Still WorkJohn Mancuso Navigating Shifts in Ransomware TTPs Through the Minds of Basta ActorsBavi Sadayappan | Zach Riddle Seeing is Believing: A Visual and Analytical Map of Russian-affiliated Ransomware GroupsDaniel Schwalbe | Jon DiMaggio The Art of Regifting: How a Retailer Cyber Deception Team Dazzles Gift Card FraudstersTim Pappa | Skylar Simmons Victims Beware: Threat Actors Are Monitoring Your Communications StrategyAllie Bohan The Watched Watching Back: North Korean Threat Actors Investigate Public Threat IntelligenceSreekar Madabushi | Aleksandar Milenkoski Bulletproof Hoster or Proxy Provider? Wrong — It’s Both, or even more.Thibault Seret Slop Engagement Operations - The Weird Web of an AI-Fueled SEO SpambotAlex Delamotte | Jim Walter Cracking the Code: Blockchain and Threat Intel Disrupting CybercrimeMaurice Mason Ransomware to Riches - Operation Destabilise: How tracking ransomware ransom payments uncovered a multi-billion dollar global illicit finance networkWilliam Lyne