| 2025-06-02 | Talk | Confidence |
Local LLMs in Action: Automating CTI to Connect the Dots
| Kai Iyer | #threat-intelligence-analysis#machine-learning#threat-detection+1 |
| 2024-11-16 | Talk | C0c0n |
Breach of the borderless: Cyber threat actors targeting India’s cyberspace
| Abhijith B R | #threat-hunting#cybersecurity-strategy#cyber-war+2 |
| 2024-10-02 | Talk | Virusbulletin |
Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study
| Sathwik RAM Prakki | #reverse-engineering#apt#malware-reverse-engineering |
| 2024-08-09 | Panel | Defcon |
Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors
| Abhijith B R, Nikhil Mittal, Adam Pennington, Ken Kato, Ashley Stryker | #ransomware#apt#dfir+2 |
| 2023-12-06 | Tool demo | Blackhat |
DetectiveSQ: A Extension Auditing Framework
| Jeswin Mathai, Shourya Pratap Singh | #threat-intelligence-analysis#application-pentesting#application-hardening+3 |
| 2023-09-29 | Talk | Hackinparis |
A Tale of Credential Leak of a Popular Cloud Threat Actor
| Nitesh Surana | #container-security#docker#threat-hunting+1 |
| 2023-09-24 | Panel | Nullcon |
Cyber Operations, Doctrine, And Geo-Politics
| Anand Venkatanarayanan, Manu Zacharia, John Lambert | #cyber-war#cyber-crime#national-security+2 |
| 2023-09-24 | Panel | Nullcon |
INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI
| Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey, Travis Carelock | #threat-hunting#ai-security#blueteam |
| 2023-09-23 | Panel | Nullcon |
THREAT INTEL SHARING IN OT COMMUNITY AND INDUSTRY
| Ramandeep Singh Walia, Yask Sharma, Sanjeev Sharma, Britto Sidhan, Rohit Sharma | #ics-security#cyber-war#intelligence-sharing+3 |
| 2023-08-07 | Talk | C0c0n |
Chinese APT against Government officials using G7 summit lure
| Niranjan Jayanand | #apt#incident-management#threat-hunting |
| 2023-08-07 | Talk | C0c0n |
Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs
| Sathwik RAM Prakki | #apt#reverse-engineering#incident-management |
| 2023-08-07 | Talk | C0c0n |
Darkweb Investigations
| Amit Dubey | #threat-hunting#digital-forensics#incident-management+1 |
| 2023-08-07 | Talk | C0c0n |
Exploring Threats in Operational Technology
| Manjunath Hiregange | #ics-security#operational-technology#threat-hunting+1 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | #security-training#risk-management#threat-hunting |
| 2023-08-07 | Talk | C0c0n |
Tackling Advanced Threat Landscape with MDR - Best Practices
| Vijayakumar K M | #incident-management#threat-hunting#security-monitoring+1 |
| 2023-08-06 | Talk | C0c0n |
Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape
| Jaydev Joshi, Simran Kothari | #threat-landscape#incident-management#cyber-war+1 |
| 2023-08-06 | Talk | C0c0n |
Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management
| Kumar Ritesh | #threat-landscape#threat-modeling#threat-hunting+2 |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | #threat-hunting#digital-forensics#network-forensics+3 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | #threat-hunting#security-monitoring#threat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Emerging crimes and threat landscape in cyber domain and the need for international cooperation
| Kiran Sivakumar | #threat-landscape#threat-modeling#risk-management |
| 2023-05-11 | Tool demo | Blackhat |
ThreatSeeker - Threat Hunting via Windows Event Logs
| Ashish Bhangale, G Khartheesvar, Arafat Ansari | #threat-hunting#windows#security-tools |
| 2023-05-10 | Talk | Auscert |
Staying ahead of evolving threats from the get-go with proactive intelligence
| Tara Dharnikota | #threat-intelligence-analysis#threat-hunting#threat-detection |
| 2023-05-10 | Talk | Auscert |
Decentralised, multi-stakeholder and non-linear cyber incident response with the Incident Command System
| Pukhraj Singh | #incident-management#soc#threat-intelligence-analysis |
| 2022-09-24 | Panel | C0c0n |
Ransom Trends in India
| Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran | #ransomware#data-loss-prevention#incident-management+2 |
| 2022-09-24 | Talk | C0c0n |
OSINT Tools and Techniques
| Brijesh Singh | #threat-hunting#intelligence-sharing#security-training |
| 2022-09-24 | Talk | C0c0n |
Weaponising Social Media for Psychological Operations
| A a Gafoor | #social-engineering#security-training#threat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Log4j vulnerability continuous to be favourite for APT groups through mid 2022
| Niranjan Jayanand | #security-assessment#apt#exploit-kit+1 |
| 2022-09-23 | Panel | C0c0n |
Digital Apocalypse: Emerging cybersecurity challenges and future Crimes
| Nidhish Bhatnagar, Amit Dubey, Philip Varughese Vayarakunnil, Rahul Sasi, Saranga Rajan, Suhel Daud | #cybersecurity-strategy#cyber-crime#digital-currency |
| 2022-09-23 | Talk | C0c0n |
Tracking the Bad guys. An interesting story of how the criminal underground operates
| Aarushi Koolwal, Anjana Sathyan | #threat-hunting#incident-management#cyber-crime+4 |
| 2022-09-23 | Talk | C0c0n |
Threats Landscape and Intelligence of API & Shield to protect
| Navaneethan M | #api-security#threat-landscape#threat-hunting+1 |
| 2022-09-06 | Panel | Nullcon |
Unlocking Security Collaboration With Cyber Threat Intelligence
| Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naik | #intelligence-sharing#attack-surface#cybersecurity-strategy+1 |
| 2022-08-10 | Talk | Blackhat |
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting
| Sameer Koranne, John Dwyer, Neil Wyler | #threat-hunting#security-strategy#threat-modeling |
| 2021-11-13 | Talk | C0c0n |
A look into cyber-espionage activities targeting critical infrastructure in India
| Saurabh Sharma, Kurt Baumgartner | #ics-security#critical-infrastructure#threat-hunting+1 |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | #threat-detection#threat-hunting#malware-detection+2 |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | #threat-hunting#threat-detection#threat-modeling+2 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | #cybersecurity-strategy#threat-landscape#risk-management+3 |
| 2021-11-13 | Talk | C0c0n |
Cloud Threat landscape
| Gunjan Chhillar | #threat-landscape#cloud-compliance#cloud-workload-protection+1 |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | #threat-hunting#threat-modeling#architecture+1 |
| 2021-03-06 | Panel | Nullcon |
From Reactive to Proactive - Operationalizing your Threat Intel
| Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla | #data-analytics#cybersecurity-strategy#intelligence-sharing+1 |
| 2020-12-09 | Tool demo | Blackhat |
Strafer: A Tool to Detect Infections in Elasticsearch Instances
| Rohit Bansal, Aditya K Sood | #blueteam#security-assessment#threat-intelligence-analysis |
| 2020-11-21 | Talk | Appsecindonesia |
Threat Defense: Defending the ATT&CK with TTP’s
| Avkash Kathiriya | #blueteam#threat-hunting#security-analytics |
| 2020-10-07 | Talk | Rootcon |
Automating Threat Hunting on the Dark Web and other nitty-gritty thingso
| Apurv Singh Gautam | #deep-web#red-teaming#threat-hunting+1 |
| 2020-08-22 | Talk | Thedianainitiative |
Internal Red Team Operations Framework - Building your practical internal Red Team
| Abhijith B R | #red-teaming#cyber-war#phishing+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Automating Threat Hunting on the Dark Web and other nitty-gritty things
| Apurv Singh Gautam | #threat-hunting#nlp#machine-learning+1 |
| 2020-03-06 | Tool demo | Nullcon |
Hachi
| Parmanand Mishra | #att&ck#blueteam#rest-api+1 |
| 2019-10-12 | Talk | Texascybersummit |
TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | #incident-management#threat-hunting#ioc+3 |
| 2019-10-03 | Talk | Virusbulletin |
Curious tale of 8.t used by multiple campaigns against South Asia
| Niranjan Jayanand, Ivan Macalintal, Debalina Ghosh | #reverse-engineering#apt#malware-reverse-engineering |
| 2019-09-28 | Talk | C0c0n |
Vulnerability Prioritization with Threat Intelligence
| Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja | #threat-intelligence-analysis#automated-scanning#security-assessment+3 |
| 2019-09-27 | Talk | C0c0n |
Advanced Persistent Threat and counter measures
| A a Gafoor | #blueteam#apt#network-defense+4 |
| 2019-08-08 | Tool demo | Defcon |
Hachi: An Intelligent threat mapper
| Parmanand Mishra | #att&ck#blueteam#rest-api+1 |
| 2019-08-08 | Talk | Blackhat |
Death to the IOC: What’s Next in Threat Intelligence
| Bhavna Soman | #threat-intelligence-analysis#machine-learning#blueteam |
| 2019-08-05 | Tool demo | Blackhat |
CertPivot: Infra-Chaining + Cert-Check
| Ajit Hatti | #incident-management#threat-hunting#ssl+1 |
| 2019-03-01 | Panel | Nullcon |
Clear and Present Danger: Cyber Wars will Target Critical Infrastructure
| Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu | #cyber-war#critical-infrastructure#security-strategy+1 |
| 2018-10-05 | Talk | C0c0n |
How can we use machine learning to prevent Frauds and password breaches
| Tamaghna Basu | #machine-learning#blueteam#ai-security+4 |
| 2018-10-05 | Talk | C0c0n |
Dealing with Changing Threat Landscape
| Vijendra Katiyar | #threat-landscape#threat-hunting#risk-management |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | #security-analytics#threat-hunting#osint+3 |
| 2018-08-08 | Tool demo | Blackhat |
PA Toolkit: Wireshark Plugins for Pentesters
| Nishant Sharma, Jeswin Mathai | #wireshark#security-assessment#network-architecture+2 |
| 2018-03-01 | Talk | Nullcon |
Software Supply Chain Cyberattack
| Samiran Ghatak | #red-teaming#cyberattack#supply-chain-attack+1 |
| 2017-12-07 | Tool demo | Blackhat |
THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL
| Raghudeep Kannavara | #threat-intelligence-analysis#machine-learning#security-development-lifecycle+4 |
| 2017-08-18 | Talk | C0c0n |
Cyber Threat Intelligence - Are We There , Yet…?
| A Shiju Rawther | #threat-hunting#threat-modeling#ioc+3 |
| 2017-08-18 | Talk | C0c0n |
Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them!
| Illyas Kooliyankal | #blueteam#cyber-crime#intelligence-sharing+3 |
| 2017-08-18 | Talk | C0c0n |
Hunting the Hunters – Fighting CyberCrime at the Source
| Valan Sivasubramanian | #red-teaming#cybersecurity-strategy#cyber-crime+2 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | #vulnerability-assessment#bug-bounty#network-pentesting+1 |
| 2017-07-26 | Talk | Blackhat |
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
| Ravishankar Borgaonkar, Altaf Shaik, Shinjo Park, Lucca Hirschi, Andrew Martin, Jean Pierre Seifert | #red-teaming#spying#3g+3 |
| 2017-03-03 | Panel | Nullcon |
Digital warriors: India and the Future of Conflict on the Internet
| Saikat Datta, Brijesh Datta, Muktesh Chander, Cmde Anand, Anja Kovacs | #cyber-war#national-security#digital-currency+2 |
| 2016-08-19 | Talk | C0c0n |
Threats in Connected World
| Bhavin Gandhi | #iot-pentesting#device-security#threat-landscape |
| 2016-08-04 | Tool demo | Blackhat |
rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | #incident-management#threat-hunting#ioc+1 |
| 2016-08-03 | Tool demo | Blackhat |
DataSploit
| Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda | #security-assessment#threat-hunting#osint+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Credit Card Frauds – The money making Ecosystem for Cyber criminals
| Abhinav Singh | #identity-theft#cyber-crime#data-leak+1 |
| 2015-11-05 | Talk | Groundzerosummit |
OSINT Black Magic: Listen who whispers your name in the dark!!!
| Sudhanshu Chauhan, Nutan Kumar Panda | #osint#deep-web#data-leak+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Trailing Terror in the Darknets
| Shesh Sarangdhar | #deep-web#tor#cryptocurrency+1 |
| 2015-03-27 | Talk | Blackhat |
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence
| Preeti Subramanian | #threat-intelligence-analysis#blueteam#red-teaming+1 |
| 2015-02-06 | Panel | Nullcon |
2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys
| Shomiron Das Gupta, K S Narayanan, Shantanu Ghosh, Subrahmanya Gupta Boda, Vishal Salvi, Benjamin Rivera | #cyber-crime#incident-management#attack-surface+1 |
| 2015-02-06 | Talk | Nullcon |
Attack and Defence in Radio and Communication Warfare
| Akib Sayyed | #red-teaming#blueteam#purpleteam+2 |
| 2015-02-06 | Panel | Nullcon |
Defender’s Diary: Who’s attacking? What are my options?
| Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla | #blueteam#threat-hunting#cybersecurity-strategy |
| 2014-11-13 | Talk | Groundzerosummit |
APT protection for the Enterprise
| Deepak Singla | #blueteam#apt#security-strategy |
| 2014-08-22 | Talk | C0c0n |
APT: Case Study of attackers targeting public tendering
| Rahul Sasi | #red-teaming#apt#attack-surface+4 |
| 2014-02-14 | Talk | Nullcon |
Strategic Information Warfare: When Ends define the means
| Amit Sharma | #cyber-war#c4isr#ncw+1 |
| 2012-08-03 | Talk | C0c0n |
Cyber Weapons
| Sameer Saxena | #security-assessment#exploitation#cyber-war+3 |
| 2012-02-15 | Talk | Nullcon |
Shall we dust Beep? The Geo-strategic realities of Cyberwar
| Pukhraj Singh | #cyber-war#security-strategy#attack-surface |
| 2011-10-13 | Talk | Hitbsecconf |
Web Wars 3
| Saumil Shah | #cyber-war#exploit-delivery#application-pentesting+1 |
| 2011-08-07 | Talk | Defcon |
VDLDS — All Your Voice Are Belong To Us
| Ganesh Devarajan, Don Le Bert | #blueteam#data-leak#cyber-crime |
| 2011-02-25 | Talk | Nullcon |
Cyber Crime 101 - Cost of cybercrime, trends & analysis
| Simran Gambhir, Cn Shashidhar | #cyber-crime#financial-institutions#attack-surface+2 |
| 2011-02-25 | Talk | Nullcon |
Future of cyber crimes: Limitations and Challenges
| Pratap Reddy | #blueteam#red-teaming#purpleteam+1 |
| 2010-12-04 | Talk | Clubhack |
Data theft in India
| K K Mookhey | #data-leak#red-teaming#cyber-crime |
| 2009-12-05 | Talk | Clubhack |
India Cyber Crime Scene - Caught in the Crossfire
| Vinoo Thomas, Rahul Mohandas | #cyber-crime#data-leak#pdf+3 |
| 2009-08-06 | Talk | C0c0n |
Cyber Forensics
| Krishna Sastry Pendyal | #forensics#digital-forensics#data-leak+4 |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | #threat-hunting#threat-modeling#security-training+2 |
| 2008-12-06 | Talk | Clubhack |
Economic offenses through Credit Card Frauds Dissected
| Harshad Patil | #fraud#identity-theft#financial-institutions |
| 2003-12-12 | Talk | Hitbsecconf |
New Generation Frauds
| Yerra Ravi Kiran Raju | #fraud#red-teaming#money-laundering |