| 2025/10/10 · C0c0n · Ghosts in Your GitHub Actions and AI's Hunt for Hidden Exploits |
Suchith Narayan |
presentation, Video |
I can help! |
| 2025/03/14 · Insomnihack · The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) |
Dhiraj Mishra |
presentation, Video |
I can help! |
| 2025/03/02 · Nullcon · Cyber Security from Telco lens |
Sanjeev Dhallam |
presentation, Video |
I can help! |
| 2025/03/01 · Nullcon · Drawing parallels between iOS and macOS Pentesting with DVMA |
Vaibhav Lakhani |
presentation, Video |
I can help! |
| 2024/11/21 · Deepsec · Hacking with Physics v2.0 |
Hrishikesh Somchatwar |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · Invisible Invaders: Bypassing Email Security with Legitimate Tools |
Dhruv Bisani |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers |
Nihar Sawant, Jaydev Joshi |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · Active Directory Deception Strategies |
Madhukar Raina, Sayan Mitra |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · Breach of the borderless: Cyber threat actors targeting India's cyberspace |
Abhijith B R |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · Hacking the Non-Windows Frontier: Thick Client Pentesting on Linux & Mac |
Ajay Sk |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · KEY NOTE |
Navin Kumar Singh |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · Old Bugs, New Tricks: How N-Day Vulnerabilities Are Fueling Today's Threat Landscape |
Dharani Sanjaiy |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · Ride on the House - Exploiting Public Transport Ticketing Systems for Free Rides |
Rakesh Seal, Diptisha Samanta |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · Serverless Phishing Factory: Automate, Attack, Adapt |
Yash Bharadwaj, Manish Gupta |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · The Stealth Code Conspiracy: Unmasking Hidden Threats in CI/CD Pipelines |
Arpith Rajagopal, Suchith Narayan |
presentation, Video |
I can help! |
| 2024/11/16 · C0c0n · Who is holding the Marauders map? |
Maya R Nair |
presentation, Video |
I can help! |
| 2024/11/15 · C0c0n · [Yodha] Nightingale: Docker for Pentesters |
Raja Nagori |
presentation, Video |
I can help! |
| 2024/11/15 · C0c0n · [Yodha] RedCloud : A Multi-Cloud Hacking OS |
Yash Bharadwaj, Manish Gupta |
presentation, Video |
I can help! |
| 2024/11/15 · C0c0n · [Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool |
Gaurav Joshi, Hare Krishna Rai |
presentation, Video |
I can help! |
| 2024/11/15 · C0c0n · Automated Security Engineer Co-Pilot: Leveraging Large Language Models for Enhanced Code Security |
Ashwath Kumar, Hariprasad Pujari |
presentation, Video |
I can help! |
| 2024/11/15 · C0c0n · Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques |
Adrip Mukherjee, Vinay Kumar |
presentation, Video |
I can help! |
| 2024/11/15 · C0c0n · Remote Whispers of Mobile Sim |
Vipin Kumar |
presentation, Video |
I can help! |
| 2024/11/06 · Blackalps · IDAT Loader: The Malware’s Camouflaged Weapon |
Niranjan Jayanand |
presentation, Video |
I can help! |
| 2024/03/12 · Nullcon · Secure Web Gateways are dead. What’s next? |
Vivek Ramachandran |
presentation, Video |
I can help! |
| 2023/09/29 · Hackinparis · A Tale of Credential Leak of a Popular Cloud Threat Actor |
Nitesh Surana |
presentation, Video |
I can help! |
| 2023/09/28 · Hackinparis · How to have visibility and security OF CICD ecosystem |
Pramod Rana |
presentation, Video |
I can help! |
| 2023/08/07 · C0c0n · Cellibrite Premium Mobile Forensic tool iPhone analysis |
Vaibhav Kumar |
presentation, Video |
I can help! |
| 2023/08/07 · C0c0n · Citizen Mobile Security: Responsibilities, Accountability, and Impacts |
Satyendra Verma |
presentation, Video |
I can help! |
| 2023/08/07 · C0c0n · Darkweb Investigations |
Amit Dubey |
presentation, Video |
I can help! |
| 2023/08/07 · C0c0n · ESOC Trinetra Project |
Pankaj Kumar Dalela |
presentation, Video |
I can help! |
| 2023/08/07 · C0c0n · Exploring Threats in Operational Technology |
Manjunath Hiregange |
presentation, Video |
I can help! |
| 2023/08/06 · C0c0n · AI in Cyber Security and Crime Prevention |
Vishal Salvi |
presentation, Video |
I can help! |
| 2023/08/06 · C0c0n · Cryptocurrencies and challenges to Law Enforcement Agencies |
Bhushan Gulabrao Borase |
presentation, Video |
I can help! |
| 2023/08/06 · C0c0n · Cybercrimes Victim Compensation : Legal Remedies and Process |
Nisheeth Dixit |
presentation, Video |
I can help! |
| 2023/08/06 · C0c0n · Dark web for investigations |
Amit Lokhande |
presentation, Video |
I can help! |
| 2023/08/06 · C0c0n · Developments in Deep Fake detection |
Tapas Saini |
presentation, Video |
I can help! |
| 2023/08/06 · C0c0n · Digital Innovation and its Impact on CIOs, CISOs and DPOs |
Navaneethan M |
presentation, Video |
I can help! |
| 2023/08/06 · C0c0n · Influence of Artificial Intelligence in GRC Space |
Mahesh Kalyanaraman |
presentation, Video |
I can help! |
| 2023/06/05 · Confidence · Evading modern day security defenses in corporate environments |
Himanshu Sharma, Rahul Vashista |
presentation, Video |
I can help! |
| 2022/09/28 · Rootcon · Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations |
Harshit Agrawal |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · BEC, still the sure shot trap |
Georgie Kurien |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Building Smart, Resilient and Sustainable Cyber Eco System |
Navin Kumar Singh |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · CANalyse: A Vehicle Network Analysis and Attack Tool |
Kartheek Lade |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Citizen Mobile Security (ICAMPS) |
Satyendra Verma |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Cryptocurrency Forensics |
Bhushan Gulabrao Borase |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Cyber Defence and Role of private players - public private partnership |
Jasbir Singh Solanki |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Deep Learning to detect Network Attacks |
Varun Kohli |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · In production with GRC for cloud |
Mahesh Kalyanaraman |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Introduction to RFID/NFC Hacking |
Davis Sojan |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Know Your Organization? : Mapping Entities in Google Workspace |
Manish Gupta, Yash Bharadwaj |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Need for Advanced SOC |
Vijayakumar K M |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · OSINT Tools and Techniques |
Brijesh Singh |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Power of Narratives in Cyber Security |
Sunil Varkey |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Raining CVEs on Wordpress plugins with Semgrep |
Shreya Pohekar, Syed Sheeraz Ali |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Rationalizing Cyber Security Risk in Risk Language |
Anish Koshy |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks |
Manesh Thankappan |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Weaponising Social Media for Psychological Operations |
A a Gafoor |
presentation, Video |
I can help! |
| 2022/09/24 · C0c0n · Web3 Security - Security in MetaVerse, and the new world of web3 |
Rohit Srivastwa |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · A Tale of Credential Leak of a Popular Cloud Threat Actor |
Nitesh Surana |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Attacking connected industries in 5G networks |
Altaf Shaik |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Battle of 300 Crore - how they lost it and got most of it back |
Prashant Choudhary |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Bridging the gap between Security and Operations |
Sujay Rajashekar Gundagatti |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Building a Safer and Innovative Digital Ecosystem |
Vijay Pamarathi |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Collaborative efforts for safe digital banking |
Biju K |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Common Misconfigurations in your Kubernetes Cluster and What can you do about it? |
Kumar Ashwin |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Cybersecurity for Manufacturing |
Santhosh Srinivasan |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Hacking SmartContracts |
Anto Joseph |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Hyperledger Fabric & Ethereum Apps: Security Deep Dive |
Alex Devassy, Dhanith Krishna |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Log4j vulnerability continuous to be favourite for APT groups through mid 2022 |
Niranjan Jayanand |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Pwning Android Apps at Scale |
Sparsh Kulshrestha, Shashank Barthwal |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Ransomware: Prevention, Early Detection and Response |
Babitha Bp |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Rolling out Central Bank Digital Currency - Technical Design Considerations |
Sunil Raveendran |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Securing your APIs for a cloud native future |
Navendu Pottekkat |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Startup Ecosystem and Investments in Post Covid Era |
Sunil Kanchi |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Technological Reliance for Resilience |
Tulika Pandey |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Threats Landscape and Intelligence of API & Shield to protect |
Navaneethan M |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · Tracking the Bad guys. An interesting story of how the criminal underground operates |
Aarushi Koolwal, Anjana Sathyan |
presentation, Video |
I can help! |
| 2022/09/23 · C0c0n · TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor |
Saurabh Sharma |
presentation, Video |
I can help! |
| 2022/08/14 · Defcon · Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right |
Vivek Ponnada |
presentation, Video |
I can help! |
| 2022/07/23 · Maycontainhackers · How would a real life social media be like? |
Aditi Bhatnagar |
presentation, Video |
I can help! |
| 2021/11/19 · Hackfest · Hacking with Physics |
Hrishikesh Somchatwar |
presentation, Video |
I can help! |
| 2021/11/18 · Hackinparis · Is it really an intrusion if you get called in?: Mis-configuration based attacks in AWS |
Kavisha Sheth |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Decoding new age hackers and Criminal Investigation |
Amit Dubey |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · A look into cyber-espionage activities targeting critical infrastructure in India |
Saurabh Sharma |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Building Global Cyber Security Company Out of India: Key Lessons Learnt During My Entrepreneurship Journey |
Bikash Barai |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Case Study - Cyber Heist in a Bank and Recovery of Systems and Money |
Prashant Choudhary |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Case study - E-crime group targeting mobile users |
Rahul Sasi |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Changing Cyber Security Paradigm & Cyber Tsunami |
Sunil Varkey |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Cloud Threat landscape |
Gunjan Chhillar |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Connecting the dots between customers and security teams |
Shruthi Kamath |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Crisis Capitalization in a Pandemic |
Greeshma M R |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Cyber Warfare & Securing Critical Infrastructures |
Faruk Kazi |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Cybersecurity in the era of Resilience - A walk through people, process and technology |
Babitha B P |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Emerging trends in cyber crimes : Investigation tools & techniques |
Triveni Singh |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics |
Kiran Kumar Pg |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application |
Gayatri Nayak |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Introducing Free & Open Elastic Limitless XDR |
Ravindra Ramnani |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Machine learning to detect Chia mining |
Varun Kohli |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Mature Your Threat Hunting Program |
Neha Dhyani |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Need for Zero Trust in Banking |
Biju K |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · New way of looking at the hidden mysteries in the code |
Vandana Verma Sehgal |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Post pandemic Transformation - A CISO's perspective |
Sridhar Govardhan |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Securing OT in O&G Industry |
George Eapen |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Third Party Risk Management |
Mahesh Kalyanaraman |
presentation, Video |
I can help! |
| 2021/11/13 · C0c0n · Zero Trust & Micro-segmentation |
Suresh Menon |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · “Let’s Go Phishing”: Discerning the insidious nature of Social Engineering |
Ruchira Pokhriyal, Shashi Karhail |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · 2021 Supply Chain Attacks Analysis |
Ajit Hatti |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · Data Security and Privacy |
Abhilasha Vyas |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · Dissecting Malicious Software and Analysis |
Shrutirupa Banerjiee |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · Enterprise Governance and Risk Management |
Arathy Nair, Muskan Mangla |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · Executive Presence....a cardinal of the cyber rostrum |
Bishakha Jain |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · ICS Security ---- A need, a challenge and a new change in Mindset |
Dhruv Gupta |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · IoT Security Guidelines & Standards |
Yashodhan Vivek Mandke |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · Post Covid CISOs - Disappearing trusted boundaries and Innovative CyberSecurity Approaches |
Illyas Kooliyankal |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · Regulating Social Media Platforms : Should it be done in Democratic Societies ? |
J Sam Daniel Stalin, Apar Gupta, Dinesh O Bareja, Prashant Mali, Jiten Jain |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · The evolving nature of cyber community |
Aastha Sahni |
presentation, Video |
I can help! |
| 2021/11/12 · C0c0n · Understanding the Psychology Behind Threats - adding Twists to your Turns |
Saman Fatima |
presentation, Video |
I can help! |
| 2021/09/07 · Confidence · Swapping Asprin formulas with MDMA while Red Teaming a Billion Dollar Pharmaceutical |
Aman Sachdev, Himanshu Sharma |
presentation, Video |
I can help! |
| 2020/11/21 · Appsecindonesia · Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory |
Abhi M Balakrishnan |
presentation, Video |
I can help! |
| 2020/11/21 · Appsecindonesia · The caveats of the unseen: Crouching exposure, Hidden Misconfiguration |
Ashwin Vamshi |
presentation, Video |
I can help! |
| 2020/11/21 · Appsecindonesia · Threat Defense: Defending the ATT&CK with TTP’s |
Avkash Kathiriya |
presentation, Video |
I can help! |
| 2020/11/11 · Powerofcommunity · Arbitrary code execution on RISC-V using fault injection |
Praveen Vadnala |
presentation, Video |
I can help! |
| 2020/09/18 · C0c0n · Herd Immunity, in the Cyber World |
Sunil Varkey |
presentation, Video |
I can help! |
| 2020/09/18 · C0c0n · All about IOT Forensics |
Hima Bindu Vejella |
presentation, Video |
I can help! |
| 2020/09/18 · C0c0n · Automation in Bug Bounties to Work Smarter |
Prerak Mittal |
presentation, Video |
I can help! |
| 2020/09/18 · C0c0n · Broken Cryptography & Account Takeover |
Harsh Bothra |
presentation, Video |
I can help! |
| 2020/09/18 · C0c0n · Deep Learning for Intrusion Attempt Detection |
Varun Kohli |
presentation, Video |
I can help! |
| 2020/09/18 · C0c0n · My top 3 findings in bug Bounty journey | Aiming for high impact issues |
Ankit Giri |
presentation, Video |
I can help! |
| 2020/09/18 · C0c0n · Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux |
Munawwar Hussain Shelia |
presentation, Video |
I can help! |
| 2020/09/18 · C0c0n · Supercharging your initial foothold in Red Team engagements |
Sachin S Kamath |
presentation, Video |
I can help! |
| 2020/08/21 · Thedianainitiative · Trust, No Trust or Zero Trust - Myth Demystifying |
Vandana Verma Sehgal |
presentation, Video |
I can help! |
| 2020/07/26 · Hitbsecconf · Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company |
Himanshu Sharma, Aman Sachdev |
presentation, Video |
I can help! |
| 2020/04/25 · Hitbsecconf · THE STATE OF ICS SECURITY: THEN AND NOW |
Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot |
presentation, Video |
I can help! |
| 2020/04/24 · Hitbsecconf · COMMSEC: The State of ICS Security : Then and Now |
Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlot |
presentation, Video |
I can help! |
| 2020/03/06 · Nullcon · Automated Classification of Web-Application Attacks for Intrusion Detection |
Aneet Kumar Dutta |
presentation, Video |
I can help! |
| 2019/11/07 · Powerofcommunity · Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, 'Neither'?? |
Kushal Shah |
presentation, Video |
I can help! |
| 2019/11/01 · Appsecdayaustralia · A Purple Team View of Serverless and GraphQL Applications |
Abhay Bhargav |
presentation, Video |
I can help! |
| 2019/10/22 · Hacklu · Intro to Dark Arts: Getting Started with CTFs |
Geethna T K, Shruti Dixit, Sowmya Potluri |
presentation, Video |
I can help! |
| 2019/10/12 · Texascybersummit · HX-3012 PErfidious: Make PE Backdooring Great Again! |
Shreyans Doshi |
presentation, Video |
I can help! |
| 2019/10/11 · Texascybersummit · Exploit The State of Embedded Web Security in IoT Devices ! |
Aditya K Sood |
presentation, Video |
I can help! |
| 2019/10/03 · Virusbulletin · Curious tale of 8.t used by multiple campaigns against South Asia |
Niranjan Jayanand |
presentation, Video |
I can help! |
| 2019/09/28 · C0c0n · Vulnerability Prioritization with Threat Intelligence |
Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · A Day in the Life of a CISO |
Sridhar Govardhan |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Advanced Persistent Threat and counter measures |
A a Gafoor |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · AI, ML and Security |
Varun Kohli |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · autoSource an automated framework for Source Code Review |
Malkit Singh |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Block Chain for Secured Automation |
Sanat Bhat |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Building a cloud security monitoring and auditing framework |
Nirali Shah, Prasoon Dwivedi |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · CISO Mind Set |
Lopa Mudraa Basuu |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Cyber Hygiene from Enterprise point of view |
Noorul Haq |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Demystifying HealthCare Security |
Ajay Pratap Singh |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Detection of TOR Sources using Artificial Intelligence |
Roshy John |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Doing SecOps for the Cloud using Cloud Native Services |
Akash Mahajan |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Hacking ICS devices for Fun |
Arun Mane |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Industry 4.0 - Security and Compliance |
Santhosh Srinivasan |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Lessons learned form data breaches in the cloud |
Ajay Agrawal |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Looking a decade ahead: Big data, drones , Robots and cyber security. |
Rahul Sasi |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Offensive Machine Learning for Pentesters and Red Teams |
Tamaghna Basu |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Practical Approach to Cyber Security for financial institutions |
Georgie Kurien |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · RANSOMWARE - to pay or not to pay |
Seshaprakash Kusuma Sreenivasa |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Securing Payment Data with PCI Security Standards and Programs |
Nitin Bhatnagar |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Security @scale for startups |
Shivanath Somanathan |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Serverless SOAR |
Sabyasachi Dhal, Suresh Sharma |
presentation, Video |
I can help! |
| 2019/09/27 · C0c0n · Stepping into Password Less Economy |
Ajit Hatti |
presentation, Video |
I can help! |
| 2019/09/13 · Globalappsec · A Purple Team View of Serverless and GraphQL Applications |
Abhay Bhargav |
presentation, Video |
I can help! |
| 2019/09/13 · Globalappsec · Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center |
Amol Sarwate |
presentation, Video |
I can help! |
| 2019/08/11 · Defcon · Exploiting and Securing iOS Apps using OWASP iGoat |
Swaroop Yermalkar |
presentation, Video |
I can help! |
| 2019/08/08 · Defcon · Anatomy of cloud hacking |
Pratik Shah |
presentation, Video |
I can help! |
| 2019/05/21 · Phdays · Rapid hardware hacking 101 |
Arun Magesh |
presentation, Video |
I can help! |
| 2019/05/04 · Thotcon · What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing |
Priyank Nigam |
presentation, Video |
I can help! |
| 2019/02/28 · Nullcon · Dirty use of USSD Codes |
Ravishankar Borgaonkar |
presentation, Video |
I can help! |
| 2018/11/02 · Hitbsecconf · Defending The Enterprise in 2018 |
Saumil Shah |
presentation, Video |
I can help! |
| 2018/10/10 · Brucon · Simplifying the art of instrumentation |
Krishnakant Patil, Rushikesh D Nandedkar |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Defending cloud Infrastructures with Cloud Security Suite |
Jayesh Chauhan, Shivankar Madaan |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · DNS Exfiltration and Out of Band Attacks |
Nitesh Shilpkar |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Adaptive GRC |
Mahesh Kalyanaraman |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Artificial Intelligence and Social Media Analytics in Criminal Investigation |
Amit Dubey |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Blockchains as techno-power structures: towards emergence of P2P Politics |
Sunil Aggarwal |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Cyber security in Health Care Industry |
Noorul Haq |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Cybersecurity Embedded Digital Transformation - The Future |
Sunil Kanchi |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Data management challenge for Privacy compliance |
Maria Bellarmine |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Dealing with Changing Threat Landscape |
Vijendra Katiyar |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Defending Healthcare Base |
Jiggyasu Sharma |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Digital Innovation revolution in Kerala Government |
Sunil Varkey |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · DomGoat - the DOM Security Playground |
Lavakumar Kuppan |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Future of Mobility & Cyber Security |
Suja Chandy |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · How can we use machine learning to prevent Frauds and password breaches |
Tamaghna Basu |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · OSINT : Indian Citizen Edition |
Anant Shrivastava |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Predictive policing using Big Data analytics. |
Tarun Wig |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Privacy And Data Protection: Stakeholders’ Perspectives |
Rahul Sharma |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Resiliency Focus alongside Digital Disruption |
Lince Lawrence |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · SCANDA: To Unbosom Malware Behavior |
Rajesh Nikam, Parmanand Mishra |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Taking cyber security to the board room |
Amit Pradhan |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Unconventional vulnerabilities in Google Cloud Platform |
Pranav Venkat |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Using Fault Injection for Forensics |
Yashin Mehaboobe |
presentation, Video |
I can help! |
| 2018/10/05 · C0c0n · Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? |
Roshy John |
presentation, Video |
I can help! |
| 2018/10/04 · Confidence · Hacking 50 Million users using 123456 |
Aman Sachdev, Himanshu Sharma |
presentation, Video |
I can help! |
| 2018/06/04 · Confidence · From 123456 on a staging to compromising a multi-million dollar VC - The journey of us Red Teamers of a hack spanning over 200 days |
Himanshu Sharma, Aman Sachdev |
presentation, Video |
I can help! |
| 2017/11/20 · Hackfest · How my SV Machine nailed your Malware |
Nikhil Prabhakar |
presentation, Video |
I can help! |
| 2017/10/05 · Brucon · Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) |
Rushikesh D Nandedkar, Sampada Nandedkar |
presentation, Video |
I can help! |
| 2017/08/19 · C0c0n · Building Trust for Digital Transactions in India's COD Culture |
Parry Aftab |
presentation, Video |
I can help! |
| 2017/08/19 · C0c0n · The Public Private Partnership - Navigating the Govt |
Saikat Datta |
presentation, Video |
I can help! |
| 2017/08/19 · C0c0n · Trust, the foundation of Digital Mastery |
Sunil Varkey |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Hunting Botnets with Analytics |
Shomiron Das Gupta |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Phishing threats to customers and mitigation |
Bhavin Bhansali |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work |
Rahul Binjve |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Androsia: A tool for securing in memory sensitive data |
Samit Anwer |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Anti-Virus Bypassing for Fun and Profit |
Vanshit Malhotra |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Bank on Compliance for Cyber Security |
Dinesh O Bareja |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Big Data Analytics with pattern matching for smarter analytics |
Tarun Wig |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Blockchain for Information security |
Shobha Jagathpal |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Call Centre Frauds |
Parry Aftab |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Case study: Security of Digital Wallet apps in India |
Ashwath Kumar, Sandesh Mysore Anand |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Catching Network anomalies using Deep learning |
Aditya Vasekar |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Challenges in Digital Banking |
Biju K |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Cloud_Security Suite - One stop tool for auditing cloud infrastructure |
Shivankar Madaan, Jayesh Chauhan |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · CoAP versus MQTT: IoT Protocol Vulnerability analysis |
Rajiv Pandey |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! |
Illyas Kooliyankal |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Cyber Threat Intelligence - Are We There , Yet…? |
A Shiju Rawther |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Dynamic Binary Instrumentation |
Vivek Arora, Bhaskar Rastogi |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Exploiting the smartness of BLE Stack |
Apoorva Gupta |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Hacking Homes: A hardware insight for IoT [in]Security |
Jiggyasu Sharma |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Hunting the Hunters – Fighting CyberCrime at the Source |
Valan Sivasubramanian |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · iGoat – A Self Learning Tool for iOS App Pentesting and Security |
Swaroop Yermalkar |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Mobile Banking (In)Security |
Sneha Rajguru |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Moving from Cybersecurity Awareness to Cybersecurity Competence |
Anup Narayanan |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · OSINT and Privacy |
Rohit Srivastwa |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis |
Furqan Khan, Siddharth Anbalahan |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Prevent Dark Side of your Smart City - A Defensive Security model for Smart City and Critical Infrastructure |
Manas Pratim Sarma |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · The card hack - Lessons from the Hitachi Payments Breach |
Saikat Datta |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · The Covert Cupid Under .11 Veil !!! /* Approach for Covert WIFI*/ |
Rushikesh D Nandedkar |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · The Internet Of Things: Essentials of Secur(IOT)y |
Arpit Bajpai, Ronald Michael |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · What Security Managers can learn from story tellers? |
Anup Narayanan |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Yarafying Android Malware: A Missing Step Before Malware Analysis |
Shivang Desai |
presentation, Video |
I can help! |
| 2017/08/18 · C0c0n · Your friendly neighbourhood exploit |
Aseem Jakhar |
presentation, Video |
I can help! |
| 2017/03/24 · Insomnihack · How we hacked Distributed Configuration Management Systems |
Francis Alexander, Bharadwaj Machiraju |
presentation, Video |
I can help! |
| 2017/03/21 · Troopers · New attacks in 4G technologies |
Ravishankar Borgaonkar |
presentation, Video |
I can help! |
| 2017/02/14 · Rsac · Side-Channel Resistant Implementations |
Praveen Vadnala |
presentation, Video |
I can help! |
| 2016/11/06 · Groundzerosummit · Hacking The Droids |
Anto Joseph |
presentation, Conference Link, Video |
I can help! |
| 2016/11/05 · Hackfest · LockPicker: Leaking data from live LUKS partition |
Adhokshaj Mishra |
presentation, Video |
I can help! |
| 2016/10/13 · Appsecusa · Lightning Talk - Demystifying Windows Application |
Rupali Dash |
presentation, Video |
I can help! |
| 2016/08/19 · C0c0n · Abusing Digital Certificates : Malware Style |
Ajit Hatti |
presentation, Video |
I can help! |
| 2016/08/19 · C0c0n · App Sec in the Time of Docker Containers |
Akash Mahajan |
presentation, Video |
I can help! |
| 2016/08/19 · C0c0n · Backdooring my Enemies with a Proxy for Threat Intelligence |
Jovin Lobo, Aditya Vasekar |
presentation, Video |
I can help! |
| 2016/08/19 · C0c0n · Breaking into Gas stations! |
Suraj Pratap |
presentation, Video |
I can help! |
| 2016/08/19 · C0c0n · Evading Corporate Security – You’re as secure as the weakest link |
Prajwal Panchmahalkar |
presentation, Video |
I can help! |
| 2016/08/19 · C0c0n · How (in)secure are Indian GSM networks? |
Ajay Fuloria |
presentation, Video |
I can help! |
| 2016/08/19 · C0c0n · Kill the password - A new era of authentication |
Tamaghna Basu |
presentation, Video |
I can help! |
| 2016/08/19 · C0c0n · SSD Forensics : A Nightmare for Forensic Investigators |
Santosh Khadsare |
presentation, Video |
I can help! |
| 2016/08/19 · C0c0n · The Art of Social Hacking |
Gaurav Trivedi, Rugved Mehta |
presentation, Video |
I can help! |
| 2016/05/26 · Hitbsecconf · HITB Lab: Mobile Application Security for iOS and Android |
Tushar Dalvi |
presentation, Video |
I can help! |
| 2016/03/15 · Groundzerosummit · r00tKidz and Hacking |
Triveni Singh |
presentation, Conference Link, Video |
I can help! |
| 2016/03/15 · Groundzerosummit · Web App Security |
Harpreet Singh, Himanshu Sharma, Nipun Jaswal |
presentation, Conference Link, Video |
I can help! |
| 2016/03/11 · Nullcon · Hitchhiker's guide to hacking Industrial Control systems (ICS) |
Arun Mane |
presentation, Video |
I can help! |
| 2016/03/11 · Nullcon · Million Dollar Baby: Towards ANGRly conquering DARPA CGC |
Aravind Machiry |
presentation, Video |
I can help! |
| 2016/03/11 · Nullcon · Physical Lock Security |
Amey Gat, Swapnil Wadwalkar |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Cyber Security in Hospitals:Hospitals Under Seige |
Anirudh Duggal |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Exposing Cyber Espionage: Hello from Pakistan- IIC Session |
Jiten Jain |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Western Air Command |
B S Singh Deo |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Authentication flaw in Automatic Bank Passbook printing machine. |
Indrajeet Bhuyan |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Browser based Malware attacks |
Harsh Daftary |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · chellam – a Wi-Fi IDS/Firewall for Windows |
Vivek Ramachandran |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Credit Card Frauds – The money making Ecosystem for Cyber criminals |
Abhinav Singh |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Dissecting Android Malware |
Anto Joseph |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Economics of Post Quantum Crypto Systems : Do we really Need it |
Ajit Hatti |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Elliptical Curve Cryptography |
Aneesha S |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Hacking RFIDs under 2000INR |
Jayesh Chauhan |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Sanctioned to Hack: Your SCADA HMIs Belong to Us! |
Aditya K Sood |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Thanks for the free cookies |
Anshul Saxena, Nishant Yadav |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Trailing Terror in the Darknets |
Shesh Sarangdhar |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · Wolves Among Sheep: Defeating Targeted Attacks With Deception |
Sahir Hidayatullah, Raviraj Doshi |
presentation, Video |
I can help! |
| 2015/11/05 · Groundzerosummit · XSS - The art of evading web application filters! |
Anirudh Anand |
presentation, Video |
I can help! |
| 2015/10/30 · T2 · LTE (in) Security |
Ravishankar Borgaonkar, Altaf Shaik |
presentation, Video |
I can help! |
| 2015/10/25 · Toorcon · PixelCAPTCHA – A Unicode Based CAPTCHA Scheme |
Gursev Singh Kalra |
presentation, Video |
I can help! |
| 2015/09/25 · Appsecusa · The State of Web Application Security in SCADA Web Human Machine Interfaces (HMIs)! |
Aditya K Sood |
presentation, Video |
I can help! |
| 2015/09/24 · Appsecusa · Encouraging Diversity and Advancing Cybersecurity Education |
Shruthi Kamath |
presentation, Video |
I can help! |
| 2015/08/07 · Defcon · Getting into the Trust Store We Trust |
Ajit Hatti |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · A Pentester's Methodology to Discover, Automate and Exploit Windows Privilege Escalation flaws. |
Riyaz Walikar |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · Attack chaining for web exploitation- From Information leakage to gaining Root access |
Abhijeth Dugginapeddi |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · Blockchains in Security |
Harsh Patel |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · Breaking into Infosec Research |
Vivek Ramachandran |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · Demystifying and Breaking BLE |
Yashin Mehaboobe |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) |
Anto Joseph |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · Hacking RFIDs under 2000 INR |
Jayesh Chauhan, Divya S John |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · Medical device security and critical infrastructure inside hospitals |
Anirudh Duggal |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · NoPo - The NoSQL HoneyPot Framework |
Francis Alexander |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · Reversing and Deciphering the Cyber Espionage Malware Communications |
Monnappa K A |
presentation, Video |
I can help! |
| 2015/08/01 · C0c0n · S3curi7y at 36K feet |
Rugved Mehta, Gaurav Trivedi |
presentation, Video |
I can help! |
| 2015/05/26 · Phdays · Invisible Backdoors In Your Code |
Debasis Mohanty |
presentation, Video |
I can help! |
| 2015/03/15 · Defcon · TECHNICAL TALK-FUZZING ASYNCHRONOUS PROTOCOLS BUILT OVER WEBSOCKETS |
Lavakumar Kuppan |
presentation, Conference Link, Video |
I can help! |
| 2015/02/06 · Nullcon · Building security and compliance into the software delivery process |
Anubhav Bathla, Dinesh Pillai, S Chandrasekhar |
presentation, Video |
I can help! |
| 2015/02/06 · Nullcon · Toliman, a Hadoop Pentesting Tool |
Jitendra Chauhan |
presentation, Video |
I can help! |
| 2015/01/27 · Owaspappseccalifornia · The Savage Curtain : Mobile SSL Failures |
Tushar Dalvi |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Attacking Cryptography & PKI Implementations |
Ajit Hatti |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Identity theft and its impact on Cyber - Warfare |
Tarun Wig |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Network Time Protocol in Amplification Inferno |
Sriram Krishnan |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Security vulnerabilities in DVB-C networks: Hacking Cable TV network |
Rahul Sasi |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · 9 Cell Cyber Diplomacy |
Alok Vijayant |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · APT protection for the Enterprise |
Deepak Singla |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Attacking Web-Proxies like never before |
Ahamed Nafeez |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Cyber 'BrahMos' - Static analysis driven secure coding |
Joy Sen |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Detecting Fake Cell Phone Towers |
Vijay Mukhi |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Enterprise Security |
Mano Paul |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Evaluating WAF (Web Application Firewall) for Fun and Profit with WOF |
Bhaumik Merchant |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Financial Integrity and Cyber Security |
Karnal Singh |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Fuzzing Asynchronous Protocols built over Websockets |
Lavakumar Kuppan |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Hacking consumer electronics for Fun |
Atul Alex |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · How I won Browser Fuzzing |
Amol Naik |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Internet Governance |
Anjana Kovacs |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Mobile security Automation Framework for Intelligent Auditing |
Ankur Bhargava |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · National Cyber Policy and its impact on Business |
Vaishali Bhagwat |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · SCADA Exploitation through Firmware |
Ashish Saxena |
presentation, Video |
I can help! |
| 2014/11/13 · Groundzerosummit · Vulnerability Reproduction using Zest |
Deep Shah |
presentation, Video |
I can help! |
| 2014/10/16 · Grrcon · Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design |
Aditya K Sood |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · APT: Case Study of attackers targeting public tendering |
Rahul Sasi |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · Breaking and Securing Mobile Apps - Automagically |
Aditya Gupta |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · Cryptocalypse, Heart Bleed : Is our Government Listening? |
Ajit Hatti |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · Cryptographic Backdoors: Subverting the RSA |
Adhokshaj Mishra |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · Exploiting NoSQL Like Never Before |
Francis Alexander |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · Hacking Communication |
Akib Sayyed |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · Idle Machines doing Bounty Hunting (Behind your Back) |
Mrityunjay Gautam |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · Lesser Known Attack - XML Injection |
Amol Naik |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · Piracy Tracker |
Vargheese Babu |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · Still Single with a bleeding heart (Tool Release) |
Tamaghna Basu |
presentation, Video |
I can help! |
| 2014/08/22 · C0c0n · The Curious Case of ProtoBufs - Demystifying Google's hottest binary protocol |
Prasanna Kanagasabai, Jovin Lobo |
presentation, Video |
I can help! |
| 2014/02/14 · Nullcon · Strategic Information Warfare: When Ends define the means |
Amit Sharma |
presentation, Video |
I can help! |
| 2014/02/14 · Nullcon · User Privacy in Cellular Networks |
Ravishankar Borgaonkar |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Advanced security for advanced threats |
Kartik Shahani |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Approach to containing the outbreak of malicious information in online social networks |
Sriniketh Vijayaraghavan |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Central Monitoring System and IT Act 2000 – Balance between rights of citizens and state |
Vaishali Bhagwat |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Cloud Security: Enabling continuous, scalable security for today’s hyper connected world |
Sumedh Thakar |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Evolution of network security around Software Defined Networking (SDN) – The intelligent network |
Diwakar Dayal |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · How I built a pentest lab in under 70 USD |
Swaroop Yermalkar |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Internet – Transforming terrorism |
Sameer Saxena |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · IronWASP |
Lavakumar Kuppan |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Malware for Firefox Mobile OS |
Shantanu Gawde |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Securing government Critical Information Infrastructure |
Kapil Awasthi |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Serial killing of embedded systems |
Atul Alex |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Setting the Data Center on fire |
Ajit Hatti |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · The seven sins of Wi-Fi security |
Vivek Ramachandran |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Towards a next generation secure Internet |
Sanjay Deshpande |
presentation, Video |
I can help! |
| 2013/11/07 · Groundzerosummit · Understanding the anatomy of advanced targeted attacks – The Trend Micro approach |
Tarun Gupta |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · ARM, Thumb and the Finger |
Aseem Jakhar |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · Blur Captcha |
Anirudh Duggal, Abhinav Mohanty |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · Disclosing Vulnerabilities: The Bug Bounty Style |
Nikhil Prabhakar |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · From Bedroom to Boardroom - Taking your Weekend Infosec Project Global |
Vivek Ramachandran |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · Hello CISO! How to make end-users LIKE and FOLLOW “Brand Infosec”? |
Anup Narayanan |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · Infiltrating the Intranet with Skanda |
Jayesh Chauhan |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · Lets Play - Applanting on new Grounds |
Ajit Hatti |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · Pwning WiFi Devices! |
Swaroop Yermalkar |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · Risk and challenges in virtual currencies. |
Harsh Patel, Swatantra Kumar Gupta |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · Sandy - The Malicious Analysis |
Rahul Sasi |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · SSRF / XSPA - Real World Attacks and Mitigations |
Riyaz Walikar |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · The Art and Science of Anamoly based Vulnerability Detection |
Lavakumar Kuppan |
presentation, Video |
I can help! |
| 2013/09/27 · C0c0n · The Secure Software Development Life Cycle |
Harshal Jamdade |
presentation, Video |
I can help! |
| 2013/09/13 · Grrcon · Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution |
Prajwal Panchmahalkar |
presentation, Video |
I can help! |
| 2013/09/12 · Grrcon · The Droid Exploitation Saga – All Over Again! |
Aditya Gupta, Subho Halder |
presentation, Video |
I can help! |
| 2013/08/02 · Defcon · Interactive Web Security Testing with IronWASP |
Lavakumar Kuppan |
presentation, Conference Link, Video |
I can help! |
| 2013/07/31 · Blackhat · LTE booms with vulnerabilities |
Ankit Gupta |
presentation, Video |
I can help! |
| 2013/03/22 · Insomnihack · Guns and Smoke to fight Mobile Malware |
Ruchna Nigam |
presentation, Video |
I can help! |
| 2013/03/01 · Nullcon · Automating JavaScript Static Analysis |
Lavakumar Kuppan |
presentation, Video |
I can help! |
| 2013/03/01 · Nullcon · Pawing the Droid: Twisting the ARM |
Divyanshu Shekhar, Anshul Kumar |
presentation, Video |
I can help! |
| 2013/03/01 · Nullcon · Vulnerability research anyone? |
Omair |
presentation, Video |
I can help! |
| 2012/11/23 · Malcon · Advanced Malware Engine |
Mohit Kumar |
presentation, Video |
I can help! |
| 2012/11/23 · Malcon · Surprise paper! |
Atul Alex |
presentation, Video |
I can help! |
| 2012/11/23 · Malcon · Windows Phone 8 Malware Prototype |
Shantanu Gawde |
presentation, Video |
I can help! |
| 2012/10/23 · Hacklu · Buster: Android Security Buster |
Atul Alex |
presentation, Video |
I can help! |
| 2012/09/29 · Nullcon · Next-gen Forensics |
K K Mookhey |
presentation, Video |
I can help! |
| 2012/09/28 · Nullcon · Alert(/xss/) - How to catch an XSS before someone exploits / reports it? |
Ahamed Nafeez |
presentation, Video |
I can help! |
| 2012/09/28 · Nullcon · Attacking Angry Droids |
Aditya Gupta, Subho Halder |
presentation, Video |
I can help! |
| 2012/09/20 · Ekoparty · Fuzzing DTMF Input Processing Algorithms |
Rahul Sasi |
presentation, Video |
I can help! |
| 2012/08/04 · C0c0n · Impact of cyber laws on various stakeholders |
Sagar Rahurkar |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Building Security Incident Detection & Handling Capabilities in Enterprises |
Sunil Varkey |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Business Continuity and Risk Management in Turbulent Times |
Venkataram Arabolu |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Contemporary Transcription and Resource Parasitism |
Arpit Patel |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Cyber Weapons |
Sameer Saxena |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Data Security |
Alok Vijayant |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Easy Money with UI-Redressing |
Amol Naik |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Enterprise server security |
Raghav Shandilya |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Evil JavaScript |
Bishan Singh |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Gathering security requirements |
K v Prashant, Saleem Ahamed |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Layer 8 Exploitation: A threat to National Security |
Aakash Goel |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · Security Incidents – Avoiding the Apocalypse in 2012 |
Ashish Chandra Mishra |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · The Management of Information Security – A Corporate Practitioner’s Perspective |
Pawan Kumar Singh |
presentation, Video |
I can help! |
| 2012/08/03 · C0c0n · The Weakest Link - Reinforcing the Human Element |
Sandeep Godbole |
presentation, Video |
I can help! |
| 2012/05/13 · Carolinacon · Attacking CAPTCHAs for Fun and Profit |
Gursev Singh Kalra |
presentation, Video |
I can help! |
| 2012/03/15 · Nullcon · An App(le) a day keeps the wallet away |
Antriksh Shah |
presentation, Conference Link, Video |
I can help! |
| 2012/03/15 · C0c0n · Integrated Dial 100 System for Law Enforcement |
Nandkumar Saravade |
presentation, Conference Link, Video |
I can help! |
| 2012/03/15 · Owaspappsecindia · The Magic of Passive Web Vulnerability Analysis |
Lavakumar Kuppan |
presentation, Conference Link, Video |
I can help! |
| 2012/02/15 · Nullcon · Cyberspace: Global commons or a national asset |
Kamlesh Bajaj |
presentation, Video |
I can help! |
| 2012/02/15 · Nullcon · Friction in the machine |
Dinesh Shenoy |
presentation, Video |
I can help! |
| 2012/02/15 · Nullcon · Open source revolution :Need Hardware - Software marriage |
Venkatesh |
presentation, Video |
I can help! |
| 2012/02/15 · Nullcon · SCADA Security: Why is it so hard |
Amol Sarwate |
presentation, Video |
I can help! |
| 2012/02/15 · Nullcon · Teensy for fun and jugaad |
Amey Gat |
presentation, Video |
I can help! |
| 2012/02/15 · Nullcon · Your phone is your phone but your calls are now my calls |
Akib Sayyed, Bipul Sahu, Dipesh Goyal, Nitin Agarwal |
presentation, Video |
I can help! |
| 2011/12/04 · Clubhack · Wi-Fi malware for Fun and Profit |
Vivek Ramachandran |
presentation, Conference Link, Video |
I can help! |
| 2011/11/25 · Malcon · Advanced Malware for Apple Products |
Atul Alex |
presentation, Video |
I can help! |
| 2011/11/25 · Malcon · Exploit the Exploit kits |
Dhruv Soi |
presentation, Video |
I can help! |
| 2011/11/25 · Malcon · Mareech : Look it’s a HID made up of gold |
Nikhil Mittal |
presentation, Video |
I can help! |
| 2011/11/04 · Hackfest · Here are your keystrokes |
Nikhil Mittal |
presentation, Video |
I can help! |
| 2011/10/13 · Hitbsecconf · Web Wars 3 |
Saumil Shah |
presentation, Video |
I can help! |
| 2011/10/08 · C0c0n · Stratagemizing Security Against Perpetrators In Cloud Infrastructure |
K S Abhiraj |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · Deep(er) Penetration: Reaching the Internal Network using Exposed Web Applications |
Riyaz Walikar |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · Digital Evidence |
Sushanth Samudrala |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · iPhone Jailbreak |
Antriksh Shah |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · Mobile Security |
Santosh Satam |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network |
Bala Kumar S, Mohamed Emraanullah |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · Paranoid Android |
Ankur Bhargava, Mrigesh |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · Password Less Authentication, Authorization |
Srikar Sagi |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · Runtime thread injection and execution in Linux processes |
Aseem Jakhar |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · Section 43A IT Act compliance |
Sagar Rahurkar |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · Security and Privacy Risks of Cloud Computing |
Vishnu Tiwari |
presentation, Video |
I can help! |
| 2011/10/07 · C0c0n · Wi-Fi Malware for Fun and Profit |
Vivek Ramachandran |
presentation, Video |
I can help! |
| 2011/09/19 · Hacklu · Linux thread injection - The jugaad way |
Aseem Jakhar |
presentation, Video |
I can help! |
| 2011/09/19 · Brucon · Step-by-Step for Software Security (that anyone can follow) |
Pravir Chandra |
presentation, Video |
I can help! |
| 2011/09/19 · Hacklu · The travelling hacksmith |
Saumil Shah |
presentation, Video |
I can help! |
| 2011/09/07 · Securitybyte · Data Protection |
Dipankar Roy |
presentation, Video |
I can help! |
| 2011/09/07 · Securitybyte · Social Web & Privacy – An evolving world |
Bala Sathiamurthy, Aridaman Tripathi |
presentation, Video |
I can help! |
| 2011/03/15 · Nullcon · Information Warfare Ñ The Indian Perspective |
Alok Vijayant |
presentation, Conference Link, Video |
I can help! |
| 2011/02/25 · Nullcon · Future of cyber crimes: Limitations and Challenges |
Pratap Reddy |
presentation, Video |
I can help! |
| 2011/02/25 · Nullcon · Hacking the Parliament – A classic Social Engineering attack |
Anurag Dhanda |
presentation, Video |
I can help! |
| 2011/02/25 · Nullcon · Incident Management and Beyond |
Dinesh O Bareja |
presentation, Video |
I can help! |
| 2011/02/25 · Nullcon · Jugaad Beta: Linux Thread Injection malware PoC |
Aseem Jakhar |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Cloud Computing & Security: Boon or Bane; Hype or Reality; Cloud Implementation Challenges: A Live Case Study |
Krishnakumar Kottekkat, Whiteknight |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Code Disclosure over HTTP |
Anant Kochhar |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Concept, Methodology and Challenges in Computer Forensics |
Sebastian Edassery |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Dangers and dynamic Malware analysis |
Chandrasekar |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · End-point Security |
Laxi Eshwari |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Hackers' EcoSystem in India |
Rohit Srivastwa |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Horses, Rats and Bots |
Jairam Ramesh |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Last line of defense - Host Intrusion Prevention and Secure application development. |
Avinash Shenoi |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Mobile Security |
Suhas Desai |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Overview of Cyber Legal Systems in India |
Sagar Rahurkar |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · VoIP Security |
Mukund Krishnamurthy |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Wireless MITM |
Prashant Mahajan |
presentation, Video |
I can help! |
| 2010/08/01 · C0c0n · Writing x86 ShellCode & Secure Self Modifying code and Cross Platform Programming - A Security Angle |
Praseed Pai |
presentation, Video |
I can help! |
| 2010/07/01 · Hitbsecconf · The Travelling Hacksmith 2009 – 2010 |
Saumil Shah |
presentation, Video |
I can help! |
| 2010/06/18 · Syscan · REVERSE ENGINEERING WEB 2.0 APPLICATIONS |
Shreeraj Shah |
presentation, Video |
I can help! |
| 2010/02/25 · Nullcon · Imposter ke karnamey: The Browser Phishing Tool. |
Lavakumar Kuppan |
presentation, Video |
I can help! |
| 2010/02/25 · Nullcon · Quantum Computing Challenges in the field of security |
Navin Pai |
presentation, Video |
I can help! |
| 2009/12/04 · Clubhack · Facilitate Collaboration with Information Rights Management |
Abhijit Tannu |
presentation, Video |
I can help! |
| 2009/11/18 · Securitybyte · Cloud Hacking – Distributed Attack & Exploit Platform |
Shreeraj Shah |
presentation, Video |
I can help! |
| 2009/11/17 · Securitybyte · Business Case-Risk Management/Compliance at AMITY |
Js Sodhi |
presentation, Video |
I can help! |
| 2009/11/17 · Securitybyte · Business Continuity Case Study |
Venkataram Arabolu |
presentation, Video |
I can help! |
| 2009/10/28 · Hacklu · Ownage 2.0 |
Saumil Shah |
presentation, Video |
I can help! |
| 2009/08/06 · C0c0n · Cyber Forensics |
Krishna Sastry Pendyal |
presentation, Video |
I can help! |
| 2009/08/06 · C0c0n · Cyber Victimisation |
K Jaishankar |
presentation, Video |
I can help! |
| 2009/08/06 · C0c0n · Information Security Audit |
Venkatapathy Subramaniam |
presentation, Video |
I can help! |
| 2009/08/06 · C0c0n · Information security management practices - Technical issues and the impact of risk management. |
Kp Paulson |
presentation, Video |
I can help! |
| 2009/08/06 · C0c0n · Information Warfare |
A a Gafoor, Vinayak Mishra |
presentation, Video |
I can help! |
| 2009/08/06 · C0c0n · Know Your Enemy, and Yourself: Demystifying Threat Modelin |
Meera Subbarao |
presentation, Video |
I can help! |
| 2009/08/06 · C0c0n · Management & Security of Large Scale Storage Devices |
Prashant Dinde |
presentation, Video |
I can help! |
| 2009/08/06 · C0c0n · Microsoft Security Strategies |
Binoy VC |
presentation, Video |
I can help! |
| 2009/08/06 · C0c0n · Network Intrusions and Hacking |
Manu Zacharia |
presentation, Video |
I can help! |
| 2009/05/19 · Syscan · Securing Applications at Gateway with Web Application Firewalls |
Shreeraj Shah |
presentation, Video |
I can help! |
| 2009/05/19 · Syscan · Securing Enterprise Applications |
Shreeraj Shah |
presentation, Video |
I can help! |
| 2008/11/13 · Deepsec · Game of Web 2.0 Security - Attacking Next Generation Apps |
Shreeraj Shah |
presentation, Video |
I can help! |
| 2008/08/21 · Owaspappsecindia · AppSec For Managers |
Nish Bhalla |
presentation, Video |
I can help! |
| 2008/08/20 · Owaspappsecindia · Building Enterprise AppSec Program |
Nish Bhalla |
presentation, Video |
I can help! |
| 2008/04/16 · Hitbsecconf · Securing Next Generation Applications – Scan, Detect and Mitigate |
Shreeraj Shah |
presentation, Video |
I can help! |
| 2008/03/28 · Blackhat · Spam-Evolution |
Aseem Jakhar |
presentation, Video |
I can help! |
| 2008/03/26 · Cansecwest · Vulnerabilities Die Hard |
Kowsik Guruswamy |
presentation, Video |
I can help! |
| 2008/02/20 · Blackhat · Hacking VoIP through IPSec Tunnels |
Sachin Joglekar, Sudeep Patwardhan |
presentation, Video |
I can help! |
| 2007/12/09 · Clubhack · Vulnerabilities in VoIP Products and Services |
Gaurav Saha |
presentation, Video |
I can help! |
| 2007/04/18 · Cansecwest · Low-Rate Denial-of-Service attacks |
Anil Kumar |
presentation, Video |
I can help! |
| 2007/03/30 · Blackhat · Web Service Vulnerabilities |
Nish Bhalla |
presentation, Video |
I can help! |
| 2005/06/10 · Syscan · .Net Web Security-Attack And Defense |
Shreeraj Shah |
presentation, Conference Link, Video |
I can help! |
| 2005/04/10 · Hitbsecconf · Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection |
Pukhraj Singh |
presentation, Video |
I can help! |
| 2004/04/21 · Cansecwest · Cisco PSIRT TCP/BGP |
Sharad Ahlawat |
presentation, Video |
I can help! |
| 1998/07/29 · Blackhat · Security as an enabler for new business opportunities - The Business Value of Security |
Karan Khanna |
presentation, Video |
I can help! |