🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Security Information Event Management

Security information and event management and related activities

33
Total Entries
35
Contributors
53
Unique Tags
83
Related Tags

Top Contributors

Sanket Karpe(2) Sri Harsha Gajavalli(2) Varun Kohli(2) Vijayakumar K M(2) Vivek Ramachandran(2)

Related Tags (9)


All Entries (33 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishraweb-securitymalware-detectionbrowser-security+2
2025-03-02TalkNullcon Cyber Security from Telco lens Sanjeev Dhallamnetwork-architecturenetwork-hardeningnetwork-monitoring+2
2024-11-28TalkBlackhat Harnessing Language Models for Detection of Evasive Malicious Email Attachments Abhishek Singh, Kalpesh Mantrisecurity-architecturesecurity-information-event-management
2024-11-16TalkC0c0n Who is holding the Marauders map? Maya R Nairnetwork-pentestingnetwork-monitoringnetwork-traffic-analysis+1
2024-08-29Tool demoHitb Sec Conf eBPFShield Source Code Sagar Bhureidsincident-responsenetwork-monitoring+1
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussainasset-inventoryvulnerability-managementsecurity-architecture+3
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Waliasocics-securityindustrial-control-systems-security+3
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K Mincident-responsethreat-huntingsecurity-monitoring+1
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K Mthreat-huntingsecurity-monitoringthreat-detection+2
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Riteshthreat-landscapethreat_modelingthreat-hunting+2
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittalred-teamingactive-directorythreat-detection
2022-09-24TalkC0c0n Deep Learning to detect Network Attacks Varun Kohliidsnetwork-monitoringthreat-detection+2
2022-09-24TalkC0c0n Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks Manesh Thankappanidsnetwork-monitoringnetwork-pentesting+3
2022-09-24TalkC0c0n Need for Advanced SOC Vijayakumar K Msocsecurity-monitoringsecurity-analytics+3
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagattidevsecopssecurity-architecturethreat-detection+3
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohlithreat-detectionthreat-huntingmalware-detection+2
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnanithreat-detectionsecurity-monitoringvulnerability-management+1
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyanithreat-huntingthreat-detectionthreat_modeling+2
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiyaawssecurity-monitoringiam+2
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavallipentestingvulnerability-assessmentnetwork-pentesting+3
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar DuttawebAutomationintrusion-detection
2019-09-13TalkGlobal App Sec Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center Amol Sarwatevulnerability-managementawssecurity-information-event-management+1
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavallinetwork-pentestingvulnerability-assessmentfirewall+3
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyanthreat-detectionsecurity-architecture
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akulasecurity-analyticsthreat-hunting
2018-08-08Tool demoBlackhat ANWI (All New Wireless IDS): The $5 WIDS Source Code Rishikesh Bhide, Sanket Karpenetworkintrusion-detectionblueteam+2
2017-12-06Tool demoBlackhat ANWI (All New Wireless IDS) - The £5 WIDS Source Code Sanket Karpenetworkintrusion-detectionblueteam+2
2015-11-05TalkGround Zero Summit Western Air Command B S Singh Deonetwork-defensenetwork-monitoringnetwork-pentesting+3
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandrannetwork-forensicspacket-analysisnetwork-monitoring+3
2015-08-08TalkDefcon Chigula — a framework for Wi-Fi Intrusion Detection and Forensics Video Vivek Ramachandrannetworkwifiintrusion-detection+2
2015-03-15TalkHitb Sec Conf Sniffing the Airwaves with RTLSDR Presentation Yashin Mehaboobenetwork-pentestingpacket-analysisnetwork-monitoring+2
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2004-07-29TalkBlackhat Evasion and Detection of Web Application Attacks Presentation Whitepaper Video K K Mookheywebblueteamintrusion-detection+1