🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

🕵️ Threat Intelligence

Threat intelligence gathering and analysis

122
Contributors
68
Talks
10
Tool Demos
12
Panels

Top Contributors

A a Gafoor(3) Abhijith B R(3) Avkash Kathiriya(3) Niranjan Jayanand(3) Amit Dubey(2)

Related Tags (17)

Show all 17 tags...

All Entries (90 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-06-02TalkConfidence Local LLMs in Action: Automating CTI to Connect the Dots Video Kai Iyer#threat-intelligence-analysis#machine-learning#threat-detection+1
2024-11-16TalkC0c0n Breach of the borderless: Cyber threat actors targeting India’s cyberspace Abhijith B R#threat-hunting#cybersecurity-strategy#cyber-war+2
2024-10-02TalkVirusbulletin Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study Presentation Whitepaper Video Sathwik RAM Prakki#reverse-engineering#apt#malware-reverse-engineering
2024-08-09PanelDefcon Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors Abhijith B R, Nikhil Mittal, Adam Pennington, Ken Kato, Ashley Stryker#ransomware#apt#dfir+2
2023-12-06Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Jeswin Mathai, Shourya Pratap Singh#threat-intelligence-analysis#application-pentesting#application-hardening+3
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Surana#container-security#docker#threat-hunting+1
2023-09-24PanelNullcon Cyber Operations, Doctrine, And Geo-Politics Video Anand Venkatanarayanan, Manu Zacharia, John Lambert#cyber-war#cyber-crime#national-security+2
2023-09-24PanelNullcon INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey, Travis Carelock#threat-hunting#ai-security#blueteam
2023-09-23PanelNullcon THREAT INTEL SHARING IN OT COMMUNITY AND INDUSTRY Ramandeep Singh Walia, Yask Sharma, Sanjeev Sharma, Britto Sidhan, Rohit Sharma#ics-security#cyber-war#intelligence-sharing+3
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanand#apt#incident-management#threat-hunting
2023-08-07TalkC0c0n Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs Video Sathwik RAM Prakki#apt#reverse-engineering#incident-management
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubey#threat-hunting#digital-forensics#incident-management+1
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregange#ics-security#operational-technology#threat-hunting+1
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singh#security-training#risk-management#threat-hunting
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K M#incident-management#threat-hunting#security-monitoring+1
2023-08-06TalkC0c0n Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape Video Jaydev Joshi, Simran Kothari#threat-landscape#incident-management#cyber-war+1
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Ritesh#threat-landscape#threat-modeling#threat-hunting+2
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhande#threat-hunting#digital-forensics#network-forensics+3
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K M#threat-hunting#security-monitoring#threat-detection+2
2023-08-06TalkC0c0n Emerging crimes and threat landscape in cyber domain and the need for international cooperation Video Kiran Sivakumar#threat-landscape#threat-modeling#risk-management
2023-05-11Tool demoBlackhat ThreatSeeker - Threat Hunting via Windows Event Logs Source Code Ashish Bhangale, G Khartheesvar, Arafat Ansari#threat-hunting#windows#security-tools
2023-05-10TalkAuscert Staying ahead of evolving threats from the get-go with proactive intelligence Video Tara Dharnikota#threat-intelligence-analysis#threat-hunting#threat-detection
2023-05-10TalkAuscert Decentralised, multi-stakeholder and non-linear cyber incident response with the Incident Command System Presentation Video Pukhraj Singh#incident-management#soc#threat-intelligence-analysis
2022-09-24PanelC0c0n Ransom Trends in India Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran#ransomware#data-loss-prevention#incident-management+2
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singh#threat-hunting#intelligence-sharing#security-training
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoor#social-engineering#security-training#threat-hunting+1
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanand#security-assessment#apt#exploit-kit+1
2022-09-23PanelC0c0n Digital Apocalypse: Emerging cybersecurity challenges and future Crimes Nidhish Bhatnagar, Amit Dubey, Philip Varughese Vayarakunnil, Rahul Sasi, Saranga Rajan, Suhel Daud#cybersecurity-strategy#cyber-crime#digital-currency
2022-09-23TalkC0c0n Tracking the Bad guys. An interesting story of how the criminal underground operates Aarushi Koolwal, Anjana Sathyan#threat-hunting#incident-management#cyber-crime+4
2022-09-23TalkC0c0n Threats Landscape and Intelligence of API & Shield to protect Navaneethan M#api-security#threat-landscape#threat-hunting+1
2022-09-06PanelNullcon Unlocking Security Collaboration With Cyber Threat Intelligence Video Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naik#intelligence-sharing#attack-surface#cybersecurity-strategy+1
2022-08-10TalkBlackhat The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting Presentation Source Code Sameer Koranne, John Dwyer, Neil Wyler#threat-hunting#security-strategy#threat-modeling
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharma, Kurt Baumgartner#ics-security#critical-infrastructure#threat-hunting+1
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohli#threat-detection#threat-hunting#malware-detection+2
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyani#threat-hunting#threat-detection#threat-modeling+2
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkey#cybersecurity-strategy#threat-landscape#risk-management+3
2021-11-13TalkC0c0n Cloud Threat landscape Gunjan Chhillar#threat-landscape#cloud-compliance#cloud-workload-protection+1
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgal#threat-hunting#threat-modeling#architecture+1
2021-03-06PanelNullcon From Reactive to Proactive - Operationalizing your Threat Intel Video Akshat Jain, Amit Ghodekar, Suhas Desai, Ambuj Bhalla#data-analytics#cybersecurity-strategy#intelligence-sharing+1
2020-12-09Tool demoBlackhat Strafer: A Tool to Detect Infections in Elasticsearch Instances Presentation Source Code Rohit Bansal, Aditya K Sood#blueteam#security-assessment#threat-intelligence-analysis
2020-11-21TalkAppsecindonesia Threat Defense: Defending the ATT&CK with TTP’s Avkash Kathiriya#blueteam#threat-hunting#security-analytics
2020-10-07TalkRootcon Automating Threat Hunting on the Dark Web and other nitty-gritty thingso Presentation Video Apurv Singh Gautam#deep-web#red-teaming#threat-hunting+1
2020-08-22TalkThedianainitiative Internal Red Team Operations Framework - Building your practical internal Red Team Video Abhijith B R#red-teaming#cyber-war#phishing+3
2020-08-22TalkThedianainitiative Automating Threat Hunting on the Dark Web and other nitty-gritty things Video Apurv Singh Gautam#threat-hunting#nlp#machine-learning+1
2020-03-06Tool demoNullcon Hachi Source Code Parmanand Mishra#att&ck#blueteam#rest-api+1
2019-10-12TalkTexascybersummit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Presentation Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+3
2019-10-03TalkVirusbulletin Curious tale of 8.t used by multiple campaigns against South Asia Niranjan Jayanand, Ivan Macalintal, Debalina Ghosh#reverse-engineering#apt#malware-reverse-engineering
2019-09-28TalkC0c0n Vulnerability Prioritization with Threat Intelligence Muslim Koser, Devesh Vatsa, Rohit Srivastwa, Dinesh O Bareja#threat-intelligence-analysis#automated-scanning#security-assessment+3
2019-09-27TalkC0c0n Advanced Persistent Threat and counter measures A a Gafoor#blueteam#apt#network-defense+4
2019-08-08Tool demoDefcon Hachi: An Intelligent threat mapper Source Code Parmanand Mishra#att&ck#blueteam#rest-api+1
2019-08-08TalkBlackhat Death to the IOC: What’s Next in Threat Intelligence Presentation Video Bhavna Soman#threat-intelligence-analysis#machine-learning#blueteam
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hatti#incident-management#threat-hunting#ssl+1
2019-03-01PanelNullcon Clear and Present Danger: Cyber Wars will Target Critical Infrastructure Video Sourabh Issar, Sachin Burman, Sudarshan Rajagopal, Somenath Kundu#cyber-war#critical-infrastructure#security-strategy+1
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basu#machine-learning#blueteam#ai-security+4
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyar#threat-landscape#threat-hunting#risk-management
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akula#security-analytics#threat-hunting#osint+3
2018-08-08Tool demoBlackhat PA Toolkit: Wireshark Plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathai#wireshark#security-assessment#network-architecture+2
2018-03-01TalkNullcon Software Supply Chain Cyberattack Presentation Samiran Ghatak#red-teaming#cyberattack#supply-chain-attack+1
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep Kannavara#threat-intelligence-analysis#machine-learning#security-development-lifecycle+4
2017-08-18TalkC0c0n Cyber Threat Intelligence - Are We There , Yet…? A Shiju Rawther#threat-hunting#threat-modeling#ioc+3
2017-08-18TalkC0c0n Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them! Illyas Kooliyankal#blueteam#cyber-crime#intelligence-sharing+3
2017-08-18TalkC0c0n Hunting the Hunters – Fighting CyberCrime at the Source Valan Sivasubramanian#red-teaming#cybersecurity-strategy#cyber-crime+2
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddi#vulnerability-assessment#bug-bounty#network-pentesting+1
2017-07-26TalkBlackhat New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor Presentation Video Ravishankar Borgaonkar, Altaf Shaik, Shinjo Park, Lucca Hirschi, Andrew Martin, Jean Pierre Seifert#red-teaming#spying#3g+3
2017-03-03PanelNullcon Digital warriors: India and the Future of Conflict on the Internet Video Saikat Datta, Brijesh Datta, Muktesh Chander, Cmde Anand, Anja Kovacs#cyber-war#national-security#digital-currency+2
2016-08-19TalkC0c0n Threats in Connected World Presentation Bhavin Gandhi#iot-pentesting#device-security#threat-landscape
2016-08-04Tool demoBlackhat rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+1
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda#security-assessment#threat-hunting#osint+1
2015-11-05TalkGroundzerosummit Credit Card Frauds – The money making Ecosystem for Cyber criminals Abhinav Singh#identity-theft#cyber-crime#data-leak+1
2015-11-05TalkGroundzerosummit OSINT Black Magic: Listen who whispers your name in the dark!!! Presentation Source Code Sudhanshu Chauhan, Nutan Kumar Panda#osint#deep-web#data-leak+4
2015-11-05TalkGroundzerosummit Trailing Terror in the Darknets Shesh Sarangdhar#deep-web#tor#cryptocurrency+1
2015-03-27TalkBlackhat Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Presentation Whitepaper Video Preeti Subramanian#threat-intelligence-analysis#blueteam#red-teaming+1
2015-02-06PanelNullcon 2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys Shomiron Das Gupta, K S Narayanan, Shantanu Ghosh, Subrahmanya Gupta Boda, Vishal Salvi, Benjamin Rivera#cyber-crime#incident-management#attack-surface+1
2015-02-06TalkNullcon Attack and Defence in Radio and Communication Warfare Presentation Akib Sayyed#red-teaming#blueteam#purpleteam+2
2015-02-06PanelNullcon Defender’s Diary: Who’s attacking? What are my options? Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla#blueteam#threat-hunting#cybersecurity-strategy
2014-11-13TalkGroundzerosummit APT protection for the Enterprise Deepak Singla#blueteam#apt#security-strategy
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasi#red-teaming#apt#attack-surface+4
2014-02-14TalkNullcon Strategic Information Warfare: When Ends define the means Amit Sharma#cyber-war#c4isr#ncw+1
2012-08-03TalkC0c0n Cyber Weapons Sameer Saxena#security-assessment#exploitation#cyber-war+3
2012-02-15TalkNullcon Shall we dust Beep? The Geo-strategic realities of Cyberwar Presentation Pukhraj Singh#cyber-war#security-strategy#attack-surface
2011-10-13TalkHitbsecconf Web Wars 3 Saumil Shah#cyber-war#exploit-delivery#application-pentesting+1
2011-08-07TalkDefcon VDLDS — All Your Voice Are Belong To Us Presentation Video Ganesh Devarajan, Don Le Bert#blueteam#data-leak#cyber-crime
2011-02-25TalkNullcon Cyber Crime 101 - Cost of cybercrime, trends & analysis Presentation Simran Gambhir, Cn Shashidhar#cyber-crime#financial-institutions#attack-surface+2
2011-02-25TalkNullcon Future of cyber crimes: Limitations and Challenges Pratap Reddy#blueteam#red-teaming#purpleteam+1
2010-12-04TalkClubhack Data theft in India Presentation K K Mookhey#data-leak#red-teaming#cyber-crime
2009-12-05TalkClubhack India Cyber Crime Scene - Caught in the Crossfire Presentation Vinoo Thomas, Rahul Mohandas#cyber-crime#data-leak#pdf+3
2009-08-06TalkC0c0n Cyber Forensics Krishna Sastry Pendyal#forensics#digital-forensics#data-leak+4
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishra#threat-hunting#threat-modeling#security-training+2
2008-12-06TalkClubhack Economic offenses through Credit Card Frauds Dissected Presentation Harshad Patil#fraud#identity-theft#financial-institutions
2003-12-12TalkHitbsecconf New Generation Frauds Video Yerra Ravi Kiran Raju#fraud#red-teaming#money-laundering