| 2025-08-07 | Talk | Blackhat |
Kernel-Enforced DNS Exfiltration Security: Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale
| Vedang Parasnis | #dns#data-leak#kernel+1 |
| 2025-04-29 | Talk | Rsac |
RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security
| Akash Mukherjee, Saurabh Shintre | #secure-development#devsecops#data-protection+1 |
| 2025-03-02 | Talk | Nullcon |
eKYC Crisis: Securing the Lockers
| Kartik Lalan | #risk-management#architecture#data-leak+4 |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | #network-pentesting#ics-security#encryption+4 |
| 2025-03-01 | Panel | Nullcon |
Navigating Data Protection in the age of globalisation
| Saikat Datta, Krishan Dev | #data-protection#gdpr#data-governance+4 |
| 2024-11-15 | Panel | C0c0n |
Intelligence led security
| Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A | #security-strategy#data-analytics#ai-security+1 |
| 2024-09-20 | Talk | 44con |
Unveiling the ghosts of mobile networks: When will old bugs die?
| Altaf Shaik | #5g#authentication#encryption+3 |
| 2024-08-08 | Tool demo | Blackhat |
Octopii v2
| Owais Shaikh | #red-teaming#ai-security#nlp+2 |
| 2024-08-07 | Tool demo | Blackhat |
BucketLoot - An Automated S3 Bucket Inspector
| Kunal Aggarwal, Umair Nehri | #aws#cloud-pentesting#reconnaissance+1 |
| 2024-05-06 | Talk | Rsac |
Headspace’s Privacy Operations Center and Vault
| Shobhit Mehta, Puneet Thapliyal | #data-protection#security-operations-center#security-compliance+1 |
| 2024-04-19 | Tool demo | Blackhat |
Malware clustering using unsupervised ML : CalMal
| Himanshu Anand | #machine-learning#ai-security#malware-detection+3 |
| 2024-04-19 | Tool demo | Blackhat |
BucketLoot - An Automated S3 Bucket Inspector
| Umair Nehri | #aws#cloud-pentesting#reconnaissance+1 |
| 2024-04-19 | Tool demo | Blackhat |
Monitoring and Detecting Leaks with GitAlerts
| Nikhil Mittal 1 | #osint#data-leak#reconnaissance+1 |
| 2024-04-18 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Amrudesh Balakrishnan, Abhishek Jm, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+3 |
| 2024-04-18 | Tool demo | Blackhat |
Secure Local Vault - Git Based Secret Manager
| Sriram Krishnan, Shibly Meeran | #blueteam#application-hardening#secure-coding+2 |
| 2023-12-06 | Tool demo | Blackhat |
BucketLoot - An Automated S3-compatible Bucket Inspector
| Owais Shaikh, Umair Nehri | #aws#cloud-pentesting#reconnaissance+1 |
| 2023-12-06 | Tool demo | Blackhat |
Octopii v2
| Owais Shaikh, Umair Nehri | #ai#data-protection#nlp+4 |
| 2023-12-06 | Tool demo | Blackhat |
HAWK Eye - PII & Secret Detection tool for your Servers, Database, Filesystems, Cloud Storage Services
| Rohit Kumar | #bug-hunting#data-loss-prevention#data-protection+4 |
| 2023-12-06 | Tool demo | Blackhat |
AndroCop: One Click Forensic Investigation & Data Extraction Tool
| Abhinand N, Aswin M Guptha, Varun Nair | #android#android-security#mobile-forensics+4 |
| 2023-12-06 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+3 |
| 2023-10-13 | Talk | Hackfest |
Exploring RAM Forensic Analysis for Effective Digital Investigations
| Sneha Banerjee | #forensics#memory-forensics#digital-forensics+2 |
| 2023-09-24 | Panel | Nullcon |
A CYBER-PHYSICAL SYSTEM FOR INDIA WITH SECURITY, PRIVACY, AND EQUITY
| Kunal Korgaonkar, Kapil Jaiswal, Malcolm Dsouza, Manoj Aggarwal, Niraj Sharma | #cyber-physical-systems#security-strategy#data-protection+1 |
| 2023-09-23 | Panel | Nullcon |
DATA PROTECTION LAW AND ITS POTENTIAL IMPLICATIONS FOR THE INDUSTRY
| Burgess Cooper, Ashish Bhadouria, Jimmi Thakkar, Sunil Bajpai | #data-protection#gdpr#cyber-law |
| 2023-09-23 | Talk | Nullcon |
Your App Is Probably A Spyware…Or Is It?
| Gaurav Gogia, Pandurang Patil | #spyware#secure-development#security-testing+3 |
| 2023-08-10 | Talk | Blackhat |
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs?
| Amit Deokar, Ali Ahmed, Brian Lee | #bug-hunting#incident-management#security-strategy+4 |
| 2023-08-09 | Tool demo | Blackhat |
BucketLoot - An Automated S3 Bucket Inspector
| Owais Shaikh, Umair Nehri | #aws#cloud-pentesting#reconnaissance+1 |
| 2023-08-07 | Panel | C0c0n |
DPDP Act - Transformation challenges for BFSI
| Linson Paul, Venugopal Parameswara, Biju K, Babitha B P, Santosh Khadsare | #data-protection#gdpr#compliance-frameworks+4 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | #encryption#architecture#data-protection+1 |
| 2023-08-07 | Talk | C0c0n |
The DPDPA Effect: Jubilation, Twinge and Reticence that followed
| Rahul Sharma | #security-compliance#security-governance#data-protection+1 |
| 2023-08-06 | Talk | C0c0n |
A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things
| Panchami V, Mahima Mary Mathews | #authentication#data-protection#embedded-security |
| 2023-08-06 | Talk | C0c0n |
Digital Innovation and its Impact on CIOs, CISOs and DPOs
| Navaneethan M | #security-compliance#security-governance#risk-management+2 |
| 2023-08-06 | Talk | C0c0n |
Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G
| Altaf Shaik | #zero-trust#supply-chain-security#attack-surface+4 |
| 2023-05-11 | Tool demo | Blackhat |
MORF - Mobile Reconnaissance Framework
| Abhishek Jm, Amrudesh Balakrishnan, Himanshu Das | #reconnaissance#application-pentesting#static-analysis+3 |
| 2023-05-11 | Tool demo | Blackhat |
Post-Quantum Cryptography Library
| Sagar Bhure, Shain Singh | #encryption#quantum-computing#secure-development+3 |
| 2023-05-10 | Talk | Auscert |
Insights into Deakin University’s Data Breach
| Dushyant Sattiraju | #incident-management#data-leak#digital-forensics |
| 2023-01-26 | Talk | Usenix |
Building an Automated Machine for Discovering Privacy Violations at Scale
| Suchakra Sharma | #static-analysis#secure-coding#data-protection+2 |
| 2022-09-24 | Panel | C0c0n |
Data sovereignty - Challenges and the road ahead
| Sanjeev Sharma, Saranga Rajan, A Muralidhar, Jojy Joy | #data-governance#data-protection#gdpr+2 |
| 2022-09-24 | Panel | C0c0n |
Ransom Trends in India
| Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran | #ransomware#data-loss-prevention#incident-management+2 |
| 2022-09-23 | Panel | C0c0n |
Customer, Credit & Risk - Fintech trends 2022
| Maya R Nair, Balakrishnan A, A Shiju Rawther, Linson Paul, Shivanath Somanathan | #financial-institutions#data-protection#identity-theft+2 |
| 2022-09-23 | Talk | C0c0n |
A Tale of Credential Leak of a Popular Cloud Threat Actor
| Nitesh Surana | #security-assessment#cloud-pentesting#cloud-workload-protection+2 |
| 2022-09-07 | Talk | Nullcon |
Do PDF Tools Conform To The Specification?
| Prashant Anantharaman | #pdf#data-protection#static-analysis+4 |
| 2022-09-07 | Talk | Nullcon |
Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls
| Shyam Sundar Ramaswami, Rakesh Mahanthi | #vulnerability-assessment#hmi#data-protection+1 |
| 2022-09-06 | Panel | Nullcon |
Cloud Services for Financial Inclusion: Possibilities & Challenges
| Nandkumar Saravade, Ganesh Ar, Himanshu Das, Navin Kumar Singh | #cloud-compliance#cloud-monitoring#financial-institutions+2 |
| 2022-08-11 | Tool demo | Blackhat |
Octopii - AI-powered Personal Identifiable Information (PII) scanner
| Owais Shaikh | #ai#ai-security#data-protection+4 |
| 2022-08-11 | Talk | Thedianainitiative |
The Real Cost of Free: What you need to know before downloading a free app
| Ruchira Pokhriyal | #app-security#data-protection#security-training+1 |
| 2022-08-10 | Talk | Blackhat |
Attacks From a New Front Door in 4G & 5G Mobile Networks
| Altaf Shaik, Shinjo Park, Matteo Strada | #api-security#access-management#identity-theft+4 |
| 2022-07-24 | Talk | Maycontainhackers |
No Permissions Needed!
| Aditi Bhatnagar | #android-security#data-protection#mobile-pentesting+1 |
| 2022-07-23 | Talk | Hope |
Combating Ransom-War: Evolving Landscape of Ransomware Infections in Cloud Databases
| Aditya K Sood | #ransomware#cloud-pentesting#data-protection |
| 2022-07-23 | Talk | Maycontainhackers |
How would a real life social media be like?
| Aditi Bhatnagar | #data-protection#security-training#risk-management+3 |
| 2021-11-13 | Talk | C0c0n |
Case study - E-crime group targeting mobile users
| Rahul Sasi | #incident-management#mobile-hacking#phishing+4 |
| 2021-11-12 | Talk | C0c0n |
Data Security and Privacy
| Abhilasha Vyas | #data-protection#encryption#data-loss-prevention+3 |
| 2021-11-10 | Tool demo | Blackhat |
Wireshark Forensics Toolkit
| Rishikesh Bhide | #forensics#network-forensics#data-protection |
| 2021-03-06 | Panel | Nullcon |
From Reactive to Proactive - Operationalizing your Threat Intel
| Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla | #data-analytics#cybersecurity-strategy#intelligence-sharing+1 |
| 2021-03-05 | Panel | Nullcon |
Tech Startups/Businesses and Infonomics
| Sourabh Issar, Burgess Cooper, Joerg Simon | #data-governance#data-protection#cybersecurity-strategy+1 |
| 2020-12-10 | Talk | Blackhat |
Effective Vulnerability Discovery with Machine Learning
| Asankhaya Sharma, Ming Yi Ang | #security-assessment#machine-learning#software-composition-analysis+4 |
| 2020-09-18 | Talk | C0c0n |
All about IOT Forensics
| Hima Bindu Vejella | #forensics#iot-device-management#iot-pentesting+4 |
| 2020-09-18 | Keynote | C0c0n |
Data protection and Privacy Data protection and Privacy
| Kris Gopalakrishnan | #ai-security#data-protection#identity-theft+2 |
| 2020-09-18 | Talk | C0c0n |
Broken Cryptography & Account Takeover
| Harsh Bothra | #encryption#ssl#security-testing+2 |
| 2020-08-07 | Panel | Defcon |
D0 N0 H4RM: A Healthcare Security Conversation
| Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft | #data-protection#identity-management#security-training+3 |
| 2020-08-06 | Tool demo | Blackhat |
MSTICpy: The Security Analysis Swiss Army Knife
| Ashwin Patil, Pete Bryan, Ian Hellen | #digital-forensics#incident-management#data-analytics+3 |
| 2020-07-26 | Talk | Hitbsecconf |
Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company
| Himanshu Sharma, Aman Sachdev | #red-teaming#application-pentesting#incident-management+2 |
| 2020-03-07 | Panel | Nullcon |
Economics Of Data Breach And Attack
| Bhaskar Medhi, Manu Zacharia, Suchit Mishra, Yash Kadakia | #data-loss-prevention#data-protection#cybersecurity-strategy+4 |
| 2020-03-06 | Talk | Nullcon |
Automated Classification of Web-Application Attacks for Intrusion Detection
| Aneet Kumar Dutta | #intrusion-detection#machine-learning#application-pentesting+3 |
| 2020-03-06 | Panel | Nullcon |
Predicting Danger: Building the Ideal Threat Intelligence Model
| Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav | #ai-security#machine-learning#nlp+3 |
| 2019-12-04 | Tool demo | Blackhat |
DumpTheGit
| Malkit Singh | #reconnaissance#data-leak#data-protection+1 |
| 2019-10-17 | Talk | Hitbsecconf |
Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure
| Anima Anandkumar | #ai#deep-learning#data-analytics+1 |
| 2019-09-28 | Panel | C0c0n |
Implementing Data Protection Frameworks with evolving Technology-Challenges, Opportunities & Solutions
| B R Nath, Jijy Oommen, Maya R Nair, Ajay Porus, Georgie Kurien | #data-protection#data-governance#security-strategy |
| 2019-09-27 | Talk | C0c0n |
Demystifying HealthCare Security
| Ajay Pratap Singh | #blueteam#data-protection#identity-theft+4 |
| 2019-09-27 | Panel | C0c0n |
Shouldn’t Organization disclose breaches - The need for a shared platform
| Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary | #data-leak#data-protection#security-testing+4 |
| 2019-09-27 | Talk | C0c0n |
Securing Payment Data with PCI Security Standards and Programs
| Nitin Bhatnagar | #blueteam#data-protection#secure-development+3 |
| 2019-09-27 | Talk | C0c0n |
Detection of TOR Sources using Artificial Intelligence
| Roshy John | #tor#ai#red-teaming |
| 2019-08-29 | Keynote | Hitbsecconf |
The CISO’s Dilemma
| Saumil Shah | #blueteam#compliance-governance#security-strategy+4 |
| 2019-08-10 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+3 |
| 2019-08-08 | Talk | Defcon |
YOUR PHONE IS USING TOR AND LEAKING YOUR PII
| Milind Bhargava, Adam Podgorski | #data-protection#security-assessment#tor+1 |
| 2019-03-28 | Tool demo | Blackhat |
RTS: Real Time Scrapper
| Naveen Rudrappa | #blueteam#application-pentesting#security-monitoring+4 |
| 2019-03-02 | Panel | Nullcon |
Actionable Intelligence and Cyber Security
| Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White | #data-analytics#incident-management#security-analytics+4 |
| 2019-03-01 | Panel | Nullcon |
Clash of the Titans; who will survive?
| Burgess Cooper, Durga Dube, Vasanthika Srinath, Jaya Baloo, Shan Lee | #ethical-hacking#exploit-delivery#data-leak+1 |
| 2018-12-05 | Talk | Blackhat |
The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols
| N Asokan, Lachlan Gunn, Ricardo Vieitez Parra | #red-teaming#encryption#threat-modeling+1 |
| 2018-10-05 | Talk | C0c0n |
Artificial Intelligence and Social Media Analytics in Criminal Investigation
| Amit Dubey | #ai#ai-security#nlp+3 |
| 2018-10-05 | Talk | C0c0n |
Predictive policing using Big Data analytics.
| Tarun Wig | #blueteam#data-analytics#data-protection+3 |
| 2018-10-05 | Talk | C0c0n |
Data management challenge for Privacy compliance
| Maria Bellarmine | #data-protection#security-compliance#data-governance+2 |
| 2018-10-05 | Talk | C0c0n |
OSINT : Indian Citizen Edition
| Anant Shrivastava | #osint#data-governance#identity-theft+2 |
| 2018-10-05 | Talk | C0c0n |
Privacy And Data Protection: Stakeholders’ Perspectives
| Rahul Sharma | #blueteam#data-protection#gdpr+4 |
| 2018-10-05 | Talk | C0c0n |
How can we use machine learning to prevent Frauds and password breaches
| Tamaghna Basu | #machine-learning#blueteam#ai-security+4 |
| 2018-10-03 | Tool demo | Blackhat |
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization
| Ankur Tyagi | #malware-detection#static-analysis#dynamic-analysis+3 |
| 2018-09-06 | Talk | Grrcon |
Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI
| Pranshu Bajpai, Richard Enbody | #encryption#ransomware#dynamic-analysis+1 |
| 2018-08-12 | Talk | Defcon |
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication
| Siddharth Rao, Thanh Bui | #encryption#authentication#ipc+1 |
| 2018-08-11 | Tool demo | Defcon |
Local Sheriff
| Konark Modi | #reconnaissance#blueteam#data-leak+4 |
| 2018-08-11 | Talk | Defcon |
Compression Oracle Attacks on VPN Networks
| Ahamed Nafeez | #vpn#network-architecture#application-pentesting+3 |
| 2018-08-11 | Tool demo | Defcon |
HealthyPi—Connected Health
| Ashwin Whitchurch | #raspberry-pi#hardware-embedded#embedded-systems+4 |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | #security-analytics#threat-hunting#osint+3 |
| 2018-08-09 | Talk | Defcon |
Anonymous rate-limiting in services with Direct Anonymous Attestation
| Konark Modi, Alex Catarineu | #data-protection#architecture#security-strategy+1 |
| 2018-08-08 | Tool demo | Blackhat |
DataSploit 2.0
| Kunal Aggarwal, Shubham Mittal | #osint#reconnaissance#data-governance+4 |
| 2018-05-29 | Award | |
Data Exfiltration via Formula Injection #Part1
| Ajay Prashar, Balaji Gopal | #data-leak#exploitation#web-security+1 |
| 2018-03-13 | Talk | Troopers |
Securing your in-ear fitness coach: Challenges in hardening next generation wearables
| Sumanth Naropanth, Kavya Racharla | #secure-development#data-protection#architecture |
| 2018-03-03 | Panel | Nullcon |
Forensic Challenges and Road Ahead
| Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov | #data-leak#data-protection#forensics+4 |
| 2018-03-02 | Panel | Nullcon |
Should all ciso promote hall of fame” within their organizations
| Shomiron Das Gupta, Hariprasad Chede, Keyur Desai, Subramanian Kumaraswamy | #security-training#behavior-change#zero-day+1 |
| 2018-03-01 | Talk | Nullcon |
Looting your bank savings using Digital India
| Indrajeet Bhuyan | #red-teaming#application-pentesting#api-security+4 |
| 2017-12-07 | Tool demo | Blackhat |
DataSploit - OSINT Framework
| Shubham Mittal | #osint#reconnaissance#security-tools+2 |
| 2017-12-06 | Talk | Blackhat |
BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES
| Saurabh Harit | #red-teaming#data-leak#identity-theft+1 |
| 2017-08-18 | Talk | C0c0n |
OSINT and Privacy
| Rohit Srivastwa | #osint#data-leak#surveillance+4 |
| 2017-08-18 | Talk | C0c0n |
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR!
| Abhinav Biswas | #tor#network-monitoring#incident-detection+1 |
| 2017-07-28 | Tool demo | Defcon |
GibberSense
| Ajit Hatti | #encryption#red-teaming#security-assessment |
| 2017-07-28 | Tool demo | Defcon |
Lamma 1.0
| Ajit Hatti, Antriksh Shah | #encryption#security-assessment#audit+1 |
| 2017-07-27 | Tool demo | Blackhat |
Gibber Sense
| Ajit Hatti | #secure-coding#reconnaissance#encryption+3 |
| 2017-07-26 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan | #osint#reconnaissance#social-engineering+4 |
| 2017-06-24 | Talk | Lehack |
When encryption is not enough: Attacking Wearable - Mobile communication over BLE
| Sumanth Naropanth, Eliza Chelleng, Kavya Racharla | #bluetooth#device-security#encryption+3 |
| 2017-05-23 | Talk | Phdays |
How we hacked distributed configuration management systems
| Bharadwaj Machiraju, Francis Alexander | #red-teaming#fingerprinting#configuration-management |
| 2017-04-14 | Talk | Hitbsecconf |
Is There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#application-pentesting#data-protection+3 |
| 2017-03-31 | Talk | Blackhat |
Mobile-Telephony Threats in Asia
| Payas Gupta, Marco Balduzzi, Lion Gu | #red-teaming#social-engineering#phishing+2 |
| 2017-03-30 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Shubham Mittal | #osint#reconnaissance#security-tools+3 |
| 2017-03-30 | Tool demo | Blackhat |
LAMMA 1.0
| Ajit Hatti | #encryption#security-assessment#static-analysis+1 |
| 2017-02-14 | Talk | Rsac |
Side-Channel Resistant Implementations
| Praveen Vadnala | #side-channel-attacks#embedded-security#encryption |
| 2016-11-05 | Talk | Hackfest |
LockPicker: Leaking data from live LUKS partition
| Adhokshaj Mishra | #linux#red-teaming#data-leak |
| 2016-11-03 | Tool demo | Blackhat |
DataSploit
| Shubham Mittal, Nutan Kumar Panda | #osint#reconnaissance#security-tools+3 |
| 2016-10-13 | Talk | Appsecusa |
When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE
| Sumanth Naropanth, Kavya Racharla, Chandra Prakash Gopalaiah | #reverse-engineering#secure-development#ble+4 |
| 2016-08-19 | Talk | C0c0n |
SSD Forensics : A Nightmare for Forensic Investigators
| Santosh Khadsare | #forensics#memory-forensics#incident-management+2 |
| 2016-08-06 | Tool demo | Defcon |
Datasploit
| Shubham Mittal | #osint#reconnaissance#data-leak+4 |
| 2016-08-06 | Tool demo | Defcon |
LAMMA (beta)
| Ajit Hatti | #encryption#security-assessment#audit+1 |
| 2016-08-04 | Talk | Blackhat |
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
| Anirudh Duggal | #ics-security#risk-management#application-pentesting+3 |
| 2016-08-04 | Tool demo | Blackhat |
LAMMA
| Ajit Hatti | #encryption#security-assessment#audit+1 |
| 2016-05-17 | Talk | Phdays |
Fingerprinting and Attacking a Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#fingerprinting#ransomware+4 |
| 2016-03-11 | Talk | Nullcon |
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day
| Pallav Jakhotiya, Vipul Sawant | #secure-development#blueteam#data-analytics+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Authentication flaw in Automatic Bank Passbook printing machine.
| Indrajeet Bhuyan | #authentication#identity-management#application-pentesting+3 |
| 2015-11-05 | Talk | Groundzerosummit |
Credit Card Frauds – The money making Ecosystem for Cyber criminals
| Abhinav Singh | #identity-theft#cyber-crime#data-leak+1 |
| 2015-11-05 | Talk | Groundzerosummit |
OSINT Black Magic: Listen who whispers your name in the dark!!!
| Sudhanshu Chauhan, Nutan Kumar Panda | #osint#deep-web#data-leak+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Cyber Security in Hospitals:Hospitals Under Seige
| Anirudh Duggal | #hl7#data-protection#incident-management |
| 2015-11-05 | Talk | Groundzerosummit |
Economics of Post Quantum Crypto Systems : Do we really Need it
| Ajit Hatti | #encryption#quantum-computing#security-strategy+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Elliptical Curve Cryptography
| Aneesha S | #encryption#elliptic-curve-cryptography#secure-development+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Trailing Terror in the Darknets
| Shesh Sarangdhar | #deep-web#tor#cryptocurrency+1 |
| 2015-03-26 | Talk | Blackhat |
The underground Ecosystem of Credit Card frauds
| Abhinav Singh | #red-teaming#data-leak#identity-theft+1 |
| 2015-03-03 | Award | |
FREAK Attack
| Karthikeyan Bhargavan, Mi Tls Team | #ssl#encryption#vulnerability-discovery |
| 2015-02-06 | Talk | Nullcon |
Anatomy of a credit card stealing POS malware
| Amol Sarwate | #red-teaming#application-pentesting#data-protection+1 |
| 2015-02-06 | Talk | Nullcon |
Drone Attacks: How I hijacked a drone
| Rahul Sasi | #red-teaming#drone#gps+2 |
| 2014-11-13 | Talk | Groundzerosummit |
Attacking Cryptography & PKI Implementations
| Ajit Hatti | #encryption#red-teaming#ssl+4 |
| 2014-11-13 | Talk | Groundzerosummit |
Identity theft and its impact on Cyber - Warfare
| Tarun Wig | #identity-theft#phishing#social-engineering |
| 2014-09-28 | Talk | Blackhat |
Understanding IMSI Privacy
| Swapnil Udar, Ravishankar Borgaonkar | #imsi#red-teaming#android+4 |
| 2014-08-22 | Talk | C0c0n |
Cryptocalypse, Heart Bleed : Is our Government Listening?
| Ajit Hatti | #encryption#ssl#cyber-law+3 |
| 2014-08-22 | Talk | C0c0n |
Cryptographic Backdoors: Subverting the RSA
| Adhokshaj Mishra | #encryption#red-teaming#security-strategy+3 |
| 2014-02-15 | Tool demo | Nullcon |
NoSQL Exploitation Framework
| Francis Alexander | #red-teaming#application-pentesting#security-tools+3 |
| 2014-02-14 | Talk | Nullcon |
User Privacy in Cellular Networks
| Ravishankar Borgaonkar | #data-protection#network-architecture#data-governance+2 |
| 2014-02-14 | Talk | Nullcon |
Strategic Information Warfare: When Ends define the means
| Amit Sharma | #cyber-war#c4isr#ncw+1 |
| 2014-02-14 | Talk | Nullcon |
phoneypdf: A Virtual PDF Analysis Framework
| Kiran Bandla | #pdf#web-security#red-teaming+2 |
| 2013-11-21 | Talk | Deepsec |
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
| Parth Shukla | #botnet#telnet#network-architecture+3 |
| 2012-12-01 | Talk | Clubhack |
Real Time Event Recording System, the tool for Digital Forensics Investigation
| Madhav Limaye | #digital-forensics#endpoint-protection#endpoint-hardening+4 |
| 2012-12-01 | Talk | Clubhack |
Content-Type attack -Dark hole in the secure environment
| Raman Gupta | #red-teaming#application-pentesting#pdf+3 |
| 2012-09-05 | Talk | 44con |
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves?
| Jitender Arora | #data-protection#security-strategy#threat-modeling+3 |
| 2012-08-03 | Talk | C0c0n |
Data Security
| Alok Vijayant, S Bhansali | #data-protection#encryption#data-loss-prevention+3 |
| 2012-08-03 | Talk | C0c0n |
Security Incidents – Avoiding the Apocalypse in 2012
| Ashish Chandra Mishra | #blueteam#phishing#social-engineering+1 |
| 2012-08-03 | Talk | C0c0n |
The Management of Information Security – A Corporate Practitioner’s Perspective
| Pawan Kumar Singh | #cyber-law#security-strategy#data-protection+2 |
| 2012-03-15 | Talk | Grrcon |
SCADA Security: Why is it so hard?
| Amol Sarwate | #scada#ics-security#authentication+2 |
| 2011-12-04 | Talk | Clubhack |
Android Forensics
| Manish Chasta | #android#forensics#android-security+4 |
| 2011-10-07 | Talk | C0c0n |
Section 43A IT Act compliance
| Sagar Rahurkar | #cyber-law#compliance-frameworks#cybersecurity-strategy+1 |
| 2011-09-07 | Talk | Securitybyte |
Data Protection
| Dipankar Roy | #blueteam#data-loss-prevention#data-protection+1 |
| 2011-09-07 | Talk | Securitybyte |
Social Web & Privacy – An evolving world
| Bala Sathiamurthy, Aridaman Tripathi | #data-protection#api-security#security-compliance+2 |
| 2011-09-06 | Talk | Securitybyte |
Using Data Analytics for Incident Response
| Samir Saklikar | #incident-management#data-analytics#security-analytics+3 |
| 2011-09-06 | Talk | Securitybyte |
Private Internet Circuits - Towards A Next Generation Internet
| Sanjay Deshpande | #network-architecture#encryption#network-defense |
| 2011-08-07 | Talk | Defcon |
VDLDS — All Your Voice Are Belong To Us
| Ganesh Devarajan, Don Le Bert | #blueteam#data-leak#cyber-crime |
| 2011-08-03 | Talk | Blackhat |
Femtocells: A poisonous needle in the operator’s hay stack
| Ravishankar Borgaonkar, Nico Golde, Kevin Redon | #network-pentesting#identity-theft#firmware-analysis |
| 2011-02-25 | Talk | Nullcon |
Enterprise Paradigm for Controlling Data Leakage
| Deepak Rout | #data-leak#blueteam#data-loss-prevention+3 |
| 2011-02-25 | Talk | Nullcon |
Incident Management and Beyond
| Dinesh O Bareja | #incident-management#data-leak#phishing+2 |
| 2011-02-25 | Talk | Nullcon |
Protect infrastructure or protect information – Lessons from Wikileaks
| Vishal Gupta | #data-leak#blueteam#data-protection+2 |
| 2011-02-25 | Talk | Nullcon |
SSLSmart – Smart SSL Cipher Enumeration
| Gursev Singh Kalra | #encryption#ssl#security-assessment |
| 2011-02-25 | Talk | Nullcon |
Fuzzing with complexities
| Vishwas Sharma | #fuzzing#red-teaming#application-pentesting+4 |
| 2011-02-25 | Talk | Nullcon |
Chupa Rustam
| Abhijeet Hatekar | #surveillance#red-teaming#application-pentesting+2 |
| 2010-12-04 | Talk | Clubhack |
Data theft in India
| K K Mookhey | #data-leak#red-teaming#cyber-crime |
| 2010-12-04 | Talk | Clubhack |
Ultimate Pen Test – Compromising a highly secure environment
| Nikhil Mittal | #security-assessment#social-engineering#application-pentesting+4 |
| 2010-08-01 | Talk | C0c0n |
Client Side Exploits using PDF
| Ankur Bhargava, Tamaghna Basu | #red-teaming#pdf#data-leak+2 |
| 2010-07-30 | Talk | Defcon |
Hacking Oracle From Web Apps
| Sumit Siddharth | #sql-injection#application-pentesting#security-testing+2 |
| 2010-07-29 | Talk | Blackhat |
Hacking Oracle From Web Apps
| Sumit Siddharth | #red-teaming#sql-injection#application-pentesting+3 |
| 2010-02-25 | Talk | Nullcon |
Quantum Computing Challenges in the field of security
| Navin Pai | #quantum-computing#security-strategy#threat-modeling+3 |
| 2009-12-05 | Talk | Clubhack |
India Cyber Crime Scene - Caught in the Crossfire
| Vinoo Thomas, Rahul Mohandas | #cyber-crime#data-leak#pdf+3 |
| 2009-12-05 | Talk | Clubhack |
Advance Computer Forensic concepts (windows)
| Kush Wadhwa | #forensics#windows#data-protection |
| 2009-12-05 | Talk | Clubhack |
Open source for securing data with advanced Crypto-Steganography technology
| Suhas Desai | #encryption#steganography#blueteam |
| 2009-12-04 | Talk | Clubhack |
Facilitate Collaboration with Information Rights Management
| Abhijit Tannu | #information-rights-management#data-protection#application-hardening+4 |
| 2009-11-17 | Talk | Securitybyte |
Usability and Privacy in Security
| Ponnurangam Kumaraguru | #data-protection#architecture#security-training+2 |
| 2009-08-06 | Talk | C0c0n |
Cyber Forensics
| Krishna Sastry Pendyal | #forensics#digital-forensics#data-leak+4 |
| 2009-08-06 | Talk | C0c0n |
Management & Security of Large Scale Storage Devices
| Prashant Dinde | #blueteam#data-protection#security-strategy+2 |
| 2009-07-29 | Talk | Blackhat |
Psychotronica: Exposure, Control, and Deceit
| Nitesh Dhanjani | #red-teaming#reconnaissance#social-engineering+3 |
| 2008-12-06 | Talk | Clubhack |
State of Cyber Law in India
| Rohas Nagpal | #cyber-law#cyber-resilience#cybersecurity-framework+4 |
| 2008-12-06 | Talk | Clubhack |
Economic offenses through Credit Card Frauds Dissected
| Harshad Patil | #fraud#identity-theft#financial-institutions |
| 2007-12-09 | Talk | Clubhack |
7 years of Indian IT act - 7 Best Cases
| Rohas Nagpal | #cyber-law#data-governance |
| 2007-12-09 | Talk | Clubhack |
Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How?
| Chetan Gupta | #forensics#windows#data-loss-prevention+4 |
| 2007-08-02 | Talk | Blackhat |
Smoke ’em Out!
| Rohyt Belani | #forensics#incident-management#digital-forensics+4 |
| 2004-05-19 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#automated-scanning+2 |
| 2004-01-29 | Talk | Blackhat |
HTTP Fingerprinting and Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+3 |
| 2003-12-16 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#network-defense+3 |
| 2003-10-01 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+2 |
| 2003-07-31 | Talk | Blackhat |
HTTP Fingerprinting & Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+2 |
| 2003-02-26 | Talk | Blackhat |
HTTP: Advanced Assessment Techniques
| Saumil Shah | #fingerprinting#blueteam#application-pentesting+4 |
| 2001-07-13 | Talk | Defcon |
Security & Privacy are Critically Important Issues in Todays Digitally Connected Age
| Sharad Popli | #security-assessment#data-protection#blueteam |