| 2024-11-28 | Talk | Blackhat |
From Breach to Blueprint: Building a Resilient Future
| Amit Ghodekar | incident-responsevulnerability-managementpentesting+3 |
| 2024-11-16 | Talk | C0c0n |
Breach of the borderless: Cyber threat actors targeting India’s cyberspace
| Abhijith B R | threat-hunting |
| 2024-10-02 | Talk | Virus Bulletin |
Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study
| Sathwik RAM Prakki | reverse-engineeringvulnerability-managementapt+1 |
| 2023-12-06 | Tool demo | Blackhat |
DetectiveSQ: A Extension Auditing Framework
| Jeswin Mathai, Shourya Pratap Singh | threat-intelligence |
| 2023-09-29 | Talk | Hackinparis |
A Tale of Credential Leak of a Popular Cloud Threat Actor
| Nitesh Surana | container-securitydockerthreat-hunting+1 |
| 2023-08-07 | Talk | C0c0n |
Chinese APT against Government officials using G7 summit lure
| Niranjan Jayanand | aptincident-responsethreat-hunting |
| 2023-08-07 | Talk | C0c0n |
Darkweb Investigations
| Amit Dubey | threat-huntingdigital-forensicsincident-response+1 |
| 2023-08-07 | Talk | C0c0n |
Exploring Threats in Operational Technology
| Manjunath Hiregange | ics-securityindustrial-control-systems-securityoperational-technology+2 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | malwaresecurity-awarenessrisk-management+2 |
| 2023-08-07 | Talk | C0c0n |
Tackling Advanced Threat Landscape with MDR - Best Practices
| Vijayakumar K M | incident-responsethreat-huntingsecurity-monitoring+1 |
| 2023-08-07 | Talk | C0c0n |
Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs
| Sathwik RAM Prakki | aptreverse-engineeringincident-response |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | threat-huntingdigital-forensicsnetwork-forensics+3 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | threat-huntingsecurity-monitoringthreat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management
| Kumar Ritesh | threat-landscapethreat_modelingthreat-hunting+2 |
| 2023-08-06 | Talk | C0c0n |
Emerging crimes and threat landscape in cyber domain and the need for international cooperation
| Kiran Sivakumar | threat-landscapethreat_modelingrisk-management |
| 2023-08-06 | Talk | C0c0n |
Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape
| Jaydev Joshi, Simran Kothari | threat-landscapeincident-responsevulnerability-management |
| 2023-05-11 | Tool demo | Blackhat |
ThreatSeeker - Threat Hunting via Windows Event Logs
| Ashish Bhangale, G Khartheesvar, Arafat Ansari | threat-hunting |
| 2022-09-24 | Talk | C0c0n |
OSINT Tools and Techniques
| Brijesh Singh | threat-huntingintelligence-sharingsecurity-awareness+1 |
| 2022-09-24 | Talk | C0c0n |
Weaponising Social Media for Psychological Operations
| A a Gafoor | social-engineeringsecurity-awarenessthreat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Threats Landscape and Intelligence of API & Shield to protect
| Navaneethan M | api-securitythreat-landscapethreat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Tracking the Bad guys. An interesting story of how the criminal underground operates
| Aarushi Koolwal, Anjana Sathyan | threat-huntingincident-response |
| 2022-09-23 | Talk | C0c0n |
Log4j vulnerability continuous to be favourite for APT groups through mid 2022
| Niranjan Jayanand | vulnerability-managementpentestingapt |
| 2022-09-06 | Panel | Nullcon |
Unlocking Security Collaboration With Cyber Threat Intelligence
| Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naik | threat-intelligence |
| 2022-08-10 | Talk | Blackhat |
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting
| Sameer Koranne | threat-hunting |
| 2021-11-13 | Talk | C0c0n |
A look into cyber-espionage activities targeting critical infrastructure in India
| Saurabh Sharma | industrial-control-systems-securitycritical-infrastructurethreat-hunting+1 |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | threat-detectionthreat-huntingmalware-detection+2 |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | threat-huntingthreat-detectionthreat_modeling+2 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | cybersecurity-strategiesthreat-landscaperisk-management+4 |
| 2021-11-13 | Talk | C0c0n |
Cloud Threat landscape
| Gunjan Chhillar | threat-landscapecloud-compliancecloud-workload-protection+1 |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | threat-huntingthreat_modelingsecurity-architecture+2 |
| 2020-12-09 | Tool demo | Blackhat |
Strafer: A Tool to Detect Infections in Elasticsearch Instances
| Rohit Bansal, Aditya K Sood | cloudblueteampentest+1 |
| 2020-08-22 | Talk | The Diana Initiative |
Automating Threat Hunting on the Dark Web and other nitty-gritty things
| Apurv Singh Gautam | threat-huntingAutomation |
| 2020-03-06 | Tool demo | Nullcon |
Hachi
| Parmanand Mishra | att&ckblueteamrest-api+1 |
| 2020-03-06 | Panel | Nullcon |
Predicting Danger: Building the Ideal Threat Intelligence Model
| Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav | threat-intelligence |
| 2019-10-12 | Talk | Texas Cyber Summit |
TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | incident-responsethreat-huntingioc+3 |
| 2019-10-03 | Talk | Virus Bulletin |
Curious tale of 8.t used by multiple campaigns against South Asia
| Niranjan Jayanand | reverse-engineeringvulnerability-managementapt+1 |
| 2019-09-28 | Talk | C0c0n |
Vulnerability Prioritization with Threat Intelligence
| Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja | threat-intelligence |
| 2019-08-08 | Tool demo | Defcon |
Hachi: An Intelligent threat mapper
| Parmanand Mishra | att&ckblueteamrest-api+1 |
| 2019-08-08 | Talk | Blackhat |
Death to the IOC: What’s Next in Threat Intelligence
| Bhavna Soman | threat-intelligencemachine-learningblueteam |
| 2019-08-05 | Tool demo | Blackhat |
CertPivot: Infra-Chaining + Cert-Check
| Ajit Hatti | incident-responsethreat-hunting |
| 2018-10-05 | Talk | C0c0n |
Dealing with Changing Threat Landscape
| Vijendra Katiyar | threat-landscapethreat-huntingrisk-management+1 |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | security-analyticsthreat-hunting |
| 2017-12-07 | Tool demo | Blackhat |
THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL
| Raghudeep Kannavara | Automationthreat-intelligencemachine-learning+1 |
| 2017-08-18 | Talk | C0c0n |
Cyber Threat Intelligence - Are We There , Yet…?
| A Shiju Rawther | threat-huntingthreat_modelingioc+3 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | vulnerability-assessmentbug-bountynetwork-pentesting+1 |
| 2016-08-03 | Tool demo | Blackhat |
DataSploit
| Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda | pentestingvulnerability-managementthreat-hunting |
| 2015-03-27 | Talk | Blackhat |
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence
| Preeti Subramanian | threat-intelligenceblueteamredteam+1 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | threat-huntingthreat_modelingsecurity-awareness+2 |