🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Threat Intelligence

Threat intelligence gathering and analysis

48
Total Entries
60
Contributors
52
Unique Tags
33
Related Tags

Top Contributors

Niranjan Jayanand(3) A a Gafoor(2) Brijesh Singh(2) Muslim Koser(2) Parmanand Mishra(2)

Related Tags (7)


All Entries (48 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-16TalkC0c0n Breach of the borderless: Cyber threat actors targeting India’s cyberspace Abhijith B Rthreat-hunting
2024-10-02TalkVirus Bulletin Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study Presentation Whitepaper Video Sathwik RAM Prakkireverse-engineeringvulnerability-managementapt+1
2023-12-06Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Jeswin Mathai, Shourya Pratap Singhthreat-intelligence
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Suranacontainer-securitydockerthreat-hunting+1
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanandaptincident-responsethreat-hunting
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubeythreat-huntingdigital-forensicsincident-response+1
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregangeics-securityindustrial-control-systems-securityoperational-technology+2
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K Mincident-responsethreat-huntingsecurity-monitoring+1
2023-08-07TalkC0c0n Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs Video Sathwik RAM Prakkiaptreverse-engineeringincident-response
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhandethreat-huntingdigital-forensicsnetwork-forensics+3
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K Mthreat-huntingsecurity-monitoringthreat-detection+2
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Riteshthreat-landscapethreat_modelingthreat-hunting+2
2023-08-06TalkC0c0n Emerging crimes and threat landscape in cyber domain and the need for international cooperation Video Kiran Sivakumarthreat-landscapethreat_modelingrisk-management
2023-08-06TalkC0c0n Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape Video Jaydev Joshi, Simran Kotharithreat-landscapeincident-responsevulnerability-management
2023-05-11Tool demoBlackhat ThreatSeeker - Threat Hunting via Windows Event Logs Source Code Ashish Bhangale, G Khartheesvar, Arafat Ansarithreat-hunting
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singhthreat-huntingintelligence-sharingsecurity-awareness+1
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoorsocial-engineeringsecurity-awarenessthreat-hunting+1
2022-09-23TalkC0c0n Threats Landscape and Intelligence of API & Shield to protect Navaneethan Mapi-securitythreat-landscapethreat-hunting+1
2022-09-23TalkC0c0n Tracking the Bad guys. An interesting story of how the criminal underground operates Aarushi Koolwal, Anjana Sathyanthreat-huntingincident-response
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanandvulnerability-managementpentestingapt
2022-09-06PanelNullcon Unlocking Security Collaboration With Cyber Threat Intelligence Video Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naikthreat-intelligence
2022-08-10TalkBlackhat The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting Presentation Source Code Sameer Korannethreat-hunting
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharmaindustrial-control-systems-securitycritical-infrastructurethreat-hunting+1
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohlithreat-detectionthreat-huntingmalware-detection+2
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyanithreat-huntingthreat-detectionthreat_modeling+2
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkeycybersecurity-strategiesthreat-landscaperisk-management+4
2021-11-13TalkC0c0n Cloud Threat landscape Gunjan Chhillarthreat-landscapecloud-compliancecloud-workload-protection+1
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgalthreat-huntingthreat_modelingsecurity-architecture+2
2020-12-09Tool demoBlackhat Strafer: A Tool to Detect Infections in Elasticsearch Instances Presentation Source Code Rohit Bansal, Aditya K Soodcloudblueteampentest+1
2020-08-22TalkThe Diana Initiative Automating Threat Hunting on the Dark Web and other nitty-gritty things Video Apurv Singh Gautamthreat-huntingAutomation
2020-03-06Tool demoNullcon Hachi Source Code Parmanand Mishraatt&ckblueteamrest-api+1
2020-03-06PanelNullcon Predicting Danger: Building the Ideal Threat Intelligence Model Video Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhavthreat-intelligence
2019-10-12TalkTexas Cyber Summit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Sudheendra Bhatincident-responsethreat-huntingioc+3
2019-10-03TalkVirus Bulletin Curious tale of 8.t used by multiple campaigns against South Asia Niranjan Jayanandreverse-engineeringvulnerability-managementapt+1
2019-09-28TalkC0c0n Vulnerability Prioritization with Threat Intelligence Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Barejathreat-intelligence
2019-08-08Tool demoDefcon Hachi: An Intelligent threat mapper Source Code Parmanand Mishraatt&ckblueteamrest-api+1
2019-08-08TalkBlackhat Death to the IOC: What’s Next in Threat Intelligence Presentation Video Bhavna Somanthreat-intelligencemachine-learningblueteam
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hattiincident-responsethreat-hunting
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyarthreat-landscapethreat-huntingrisk-management+1
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akulasecurity-analyticsthreat-hunting
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep KannavaraAutomationthreat-intelligencemachine-learning+1
2017-08-18TalkC0c0n Cyber Threat Intelligence - Are We There , Yet…? A Shiju Rawtherthreat-huntingthreat_modelingioc+3
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddivulnerability-assessmentbug-bountynetwork-pentesting+1
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Pandapentestingvulnerability-managementthreat-hunting
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanianthreat-intelligenceblueteamredteam+1
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2