🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Vulnerability Management

Vulnerability management and related activities

211
Total Entries
193
Contributors
171
Unique Tags
121
Related Tags

Top Contributors

Ajit Hatti(6) Amol Sarwate(5) Devdatta Akhawe(5) Shreeraj Shah(5) Anto Joseph(4)

Related Tags (18)

Show all 18 tags...

All Entries (211 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Frogy 2.0 - Automated external attack surface analysis toolkit Source Code Chintan Gurjarattack-surfacevulnerability-assessmentasset-management+2
2025-08-07Tool demoBlackhat Pentest Copilot: Cursor for Pentesters Source Code Dhruva Goyal, Sitaraman Spentestingapplication-pentestingvulnerability-assessment+2
2025-08-07Tool demoBlackhat AzDevRecon - Azure DevOps Enumeration Tool Source Code Raunak Parmarazuredevsecopsiam+1
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkarincident-responseweb-securityvulnerability-management+2
2025-08-07TalkBlackhat Uncovering ‘NASty’ 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing Kanika Guptareverse-engineeringfirmware-analysismobile-security+2
2025-08-06Tool demoBlackhat Realtic Sohan Simha Prabhakar, Samarth Bhaskar Bhatpentestingvulnerability-assessmentstatic-analysis+3
2025-08-06TalkBlackhat Adversarial Fuzzer for Teleoperation Commands: Evaluating Autonomous Vehicle Resilience Shanit Guptaautomotive-cybersecurityvulnerability-managementsecurity-testing+1
2025-08-06Tool demoBlackhat Damn Vulnerable Browser Extension (DVBE): Unmask the risks of your Browser Supplements Source Code Abhinav Khanna, Krishna Chagantiweb-securitysecure-codingpentesting+3
2025-08-06Tool demoBlackhat ROP ROCKET: Advanced Framework for Return-Oriented Programming Source Code Shiva Shashankreverse-engineeringexploitationpentesting+3
2025-08-06TalkBlackhat The 5G Titanic Altaf Shaiknetwork-pentestingnetwork-architecturevulnerability-management+1
2025-08-06Tool demoBlackhat Varunastra: Securing the Depths of Docker V2 Source Code Devang Solankicontainer-securitydockerstatic-analysis+4
2025-08-06Tool demoBlackhat vet: Proactive Guardrails against Malicious OSS using Code Analysis Source Code Abhisek Dattastatic-analysissoftware-securitydevsecops+3
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Varun Sharma, Ashish Kurmici-cdincident-responsedevsecops+3
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Mohit Arorasecure-developmentdevsecopsvulnerability-management+5
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Akash Mukherjeesecure-developmentdevsecopsdata-protection+2
2025-04-04Tool demoBlackhat Agneyastra - Firebase Misconfiguration Detection Toolkit V2 Source Code Bhavarth Karmarkar, Devang Solankimisconfiguration
2025-04-03Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Yadhu Krishna M, Akhil Mahendra, Hritik Vijaysupply-chainsbomsca+2
2025-04-03TalkBlackhat Determining Exploitability of Vulnerabilities with SBOM and VEX Presentation Anusha Penumacha, Srinija Kammarisbomsupply-chainsca+2
2025-04-03Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashantvulnerability-managementsupply-chainsupply-chain-attack+2
2025-03-02TalkNullcon Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks Presentation Shyam Kumar Arshid, Chinmay Krishnaembedded-securityfirmware-analysishardware-security+3
2025-03-02TalkNullcon eKYC Crisis: Securing the Lockers Kartik Lalanrisk-managementvulnerability-managementsecurity-architecture
2025-03-02TalkNullcon Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms Kumar Ashwinvulnerability-managementsecure-codingdevsecops+1
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Drishti Jainnetwork-pentestingvulnerability-managementindustrial-control-systems-security
2025-03-01TalkNullcon The Future is Trustless: How zkVMS and zkTLS Transform Bug Bounties Video Anto Josephvulnerability-managementbug-bountysecure-development
2024-12-11Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashantvulnerability-managementsupply-chainsca+1
2024-11-28TalkBlackhat A Tale of Pwning 500+ Vehicle Anti-theft Devices Umair Nehrimobile-securityvulnerability-assessmentiot-pentesting+1
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-27Tool demoBlackhat Varunastra: Securing the Depths of Docker Source Code Kunal Aggarwalcontainer-securitydockerpentesting+3
2024-11-27TalkBlackhat The Future of Cybersecurity: Addressing New Threats with Groundbreaking Strategies Mahesh Babu Kanigiririsk-managementvulnerability-managementsecurity-architecture+2
2024-11-26TalkBlackhat Critical Exposures: Lessons from a Decade of Vulnerability Research Nikhil Shrivastavavulnerability-managementsql-injectionpentesting+2
2024-11-26Tool demoBlackhat Halberd: Multi-Cloud Security Testing Tool Source Code Arpan Abani Sarkarcloud-pentestingcloud-compliancepentesting+1
2024-11-16TalkC0c0n We got the Shiny SBoM; what next? Presentation Anant Shrivastavasbomsupply-chainsoftware-bill-of-materials
2024-11-15TalkC0c0n [Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool Source Code Gaurav Joshi, Hare Krishna Raivulnerability-managementsupply-chainsca+1
2024-11-15TalkC0c0n Hackers highway: Uncovering vulnerabilities hidden behind every car’s license plate Kartik Lalanautomotive-cybersecurityvulnerability-managementreverse-engineering+2
2024-10-23Tool demoBlackhat Cyber Arsenal47 Simardeep Singhautomated-scanningvulnerability-assessmentpentesting+3
2024-10-02TalkVirus Bulletin Arming WinRAR: deep dive into APTs exploiting WinRAR’s 0-day vulnerability - a SideCopy case study Presentation Whitepaper Video Sathwik RAM Prakkireverse-engineeringvulnerability-managementapt+1
2024-08-30TalkHitb Sec Conf Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles Presentation Video Ravi Rajputweb-securitypentestingexploitation+4
2024-08-29Tool demoHitb Sec Conf Mantis Source Code Bharath Kumar, Akshay Jainvulnerability-managementasset-inventorydast+2
2024-08-14TalkUsenix Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors Presentation Whitepaper Video Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayreverse-engineeringvulnerability-managementsecurity-architecture+1
2024-08-10TalkDefcon Sneaky Extensions: The MV3 Escape Artists Vivek Ramachandran, Shourya Pratap Singhweb-securitypentestingvulnerability-management
2024-08-08Tool demoBlackhat ICSGoat: A Damn Vulnerable ICS Infrastructure Source Code Shantanu Kale, Divya Nainics-securityscadaplc+3
2024-06-27TalkTroopers The Hidden Dangers Lurking in Your Pocket – Pwning Apple Wallet ecosystem and its apps Presentation Priyank Nigammobile-securitypentestingapi-security+2
2024-05-09TalkRsac The Good, the Bad, and the Bounty: 10 Years of Buying Bugs at Microsoft Aanchal Guptavulnerability-managementbug-bountyrisk-management+1
2024-05-07TalkRsac A Proven Approach on Automated Security Architectural Pattern Validation Video Sunil Arorasecurity-architecturedevsecopsvulnerability-management+2
2024-05-07TalkRsac Anatomy of a Vulnerability Response - A View from the Inside Video Mohit Aroravulnerability-managementincident-responserisk-management+1
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyayembedded-securityfirmware-analysisvulnerability-management+2
2024-04-18Tool demoBlackhat Mantis - Asset Discovery at Scale Source Code Ankur Bhargava, Prateek Thakare, Saddam Hussainasset-inventoryvulnerability-managementsecurity-architecture+3
2024-03-21TalkCan Sec West Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Arif Hussainvulnerability-managementpentestingsecurity-architecture+1
2024-03-11TalkNullcon Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC Presentation Video Arpan Jativulnerability-assessment
2023-12-06Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Akhil Mahendra, Hritik Vijayawssupply-chainsbom+2
2023-12-06Tool demoBlackhat Honeyscanner: a vulnerability analyzer for Honeypots Source Code Shreyas Srinivasavulnerability-assessment
2023-11-17TalkDeepsec Nostalgic Memory – Remembering All the Wins and Losses for Protecting Memory Corruption Shubham Dubeyvulnerability-managementreverse-engineeringexploitation+1
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Ranacicd-securitydevsecopsvulnerability-management+6
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Waliasocics-securityindustrial-control-systems-security+3
2023-08-13Tool demoBlackhat Advanced ROP Framework: Pushing ROP to Its Limits Presentation Whitepaper Source Code Video Shiva Shashankreverse-engineeringpentestingexploitation+3
2023-08-12TalkDefcon Getting More Bang for your Buck:Appsec on a Limited Budget Vandana Verma Sehgal, Viraj Gandhisecure-developmentdevsecopsrisk-management+3
2023-08-11TalkDefcon Generative Adversarial Network (GAN) based autonomous penetration testing for Web Applications Ankur Chowdharyweb-securityxssapplication-pentesting+3
2023-08-11Tool demoDefcon vAPI : Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarniapi-securityowaspauthorization+1
2023-08-10TalkDefcon Attacking Vehicle Fleet Management Systems Presentation Video Yashin Mehaboobeautomotive-cybersecurityvulnerability-managementindustrial-control-systems-security
2023-08-10TalkDefcon Hardware Backdooring an e-Scooter Arun Manereverse-engineeringindustrial-control-systems-securityvulnerability-management+2
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwarfirmware-analysisreverse-engineeringautomotive-cybersecurity+1
2023-08-09Tool demoBlackhat DIAL - Did I Alert Lambda? Centralised Security Misconfiguration Detection Framework Source Code Saransh Rana, Rashid Feroze, Harsh Varagiyamisconfiguration
2023-08-07TalkC0c0n Uncovering Azure’s Silent Threats: A Story of Cloud Vulnerabilities Video Nitesh Suranaazurecloud-vulnerabilitiescloud-pentesting+2
2023-08-07TalkC0c0n ESOC Trinetra Project Pankaj Kumar Dalelasecurity-governancerisk-managementvulnerability-management+1
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogismart-contractsblockchain-securityphishing+3
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hattiincident-responsesecurity-architecturerisk-management+2
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathewsauthenticationprivacyembedded-security+1
2023-08-06TalkC0c0n Developments in Deep Fake detection Tapas Sainisecurity-architecturesecurity-awarenessreverse-engineering+1
2023-08-06TalkC0c0n Expanding capability horizons : Homelabs and beyond Video Anant Shrivastavapentestingnetwork-pentestingsecurity-architecture+1
2023-08-06TalkC0c0n Mitigating SSRF at scale the right way with IMDSv2! Video Ayush Priyaweb-securityapi-securityaws+3
2023-08-06TalkC0c0n Playing cat and mouse with the Adversary: Sometimes a breach is inevitable Video Abhijith B Rincident-responsevulnerability-managementrisk-management
2023-08-06TalkC0c0n Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape Video Jaydev Joshi, Simran Kotharithreat-landscapeincident-responsevulnerability-management
2023-08-06TalkC0c0n Surviving In Dependency Hell Video Kumar Ashwinsecure-developmentdevsecopsvulnerability-management+1
2023-08-06TalkC0c0n Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector Video Anshu Kumar, Pavan Sorabdevsecopsci-cdcicd-pipeline+3
2023-04-21TalkHitb Sec Conf LOCKNOTE:THE HAND THAT STRIKES, ALSO BLOCKS Presentation Video Saumil Shahsecurity-architecturerisk-managementsecurity-awareness+2
2022-09-28TalkRootcon Gazing into the Crystal Ball - The Fog of Cyberwarfare Escalations Harshit Agrawalindustrial-control-systems-securitysecurity-architecturerisk-management+1
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kuriensocial-engineeringpentestingsecurity-awareness+1
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojanembedded-securityfirmware-analysishardware-security+3
2022-09-24TalkC0c0n Know Your Organization? : Mapping Entities in Google Workspace Manish Gupta, Yash Bharadwajgcpidentity-managementaccess-management+2
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singhthreat-huntingintelligence-sharingsecurity-awareness+1
2022-09-24TalkC0c0n Raining CVEs on Wordpress plugins with Semgrep Shreya Pohekar, Syed Sheeraz Aliweb-securitystatic-analysissast+2
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudharyincident-responsevulnerability-managementrisk-management+1
2022-09-23TalkC0c0n Cybersecurity for Manufacturing Santhosh Srinivasanindustrial-control-systems-securityics-securitycontrol-systems+4
2022-09-23TalkC0c0n Hacking SmartContracts Anto Josephblockchain-securitysmart-contractsvulnerability-management+2
2022-09-23TalkC0c0n Log4j vulnerability continuous to be favourite for APT groups through mid 2022 Niranjan Jayanandvulnerability-managementpentestingapt
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bpransomwareincident-responsevulnerability-management
2022-09-23TalkC0c0n TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor Saurabh Sharmareverse-engineeringvulnerability-managementpentesting
2022-09-08TalkNullcon vPrioritizer: Art of Risk Prioritization Presentation Pramod Ranavulnerability-assessment
2022-09-08TalkNullcon Hack the Source: Securing Open Source Software – One bug at a time Video Sandeep Singhopen-source-securitysupply-chainvulnerability-management
2022-09-07TalkNullcon Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj Presentation Video Devdutt Patnaikopen-source-securitysupply-chainsupply-chain-attack+3
2022-08-14TalkDefcon Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right Vivek Ponnadaindustrial-control-systems-securityvulnerability-managementrisk-management+2
2022-08-12TalkDefcon Stop worrying about Nation-States and Zero-Days; let’s fix things that have been known for years Video Vivek Ponnadasecure-codingvulnerability-managementdevsecops+1
2022-08-11TalkThe Diana Initiative The Real Cost of Free: What you need to know before downloading a free app Ruchira Pokhriyalmobile-securityapp-securityprivacy+3
2022-08-11TalkBlackhat Eliminating Triage Intermediaries for Zero-day Exploits Using a Decentralised Payout Protocol Presentation Whitepaper Subhechha Subudhizero-day
2022-05-18TalkCan Sec West Launching EMUX - A framework for emulating ARM and MIPS IoT Devices Presentation Source Code Saumil Shahfirmware-analysisreverse-engineeringembedded-security+1
2022-05-12Tool demoBlackhat Mitigating Open Source Software Supply Chain Attacks Source Code Ajinkya Rajputopen-source-securitysupply-chainsupply-chain-attack+3
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasimobile-securityincident-responsevulnerability-management
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkeycybersecurity-strategiesthreat-landscaperisk-management+4
2021-11-13TalkC0c0n Emerging trends in cyber crimes : Investigation tools & techniques Triveni Singhincident-responsevulnerability-managementdigital-forensics
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnanithreat-detectionsecurity-monitoringvulnerability-management+1
2021-11-13TalkC0c0n Light Basin - Telecom roaming network attack case study Video Akib Sayyednetwork-pentestingnetwork-traffic-analysisvulnerability-management
2021-11-13TalkC0c0n Third Party Risk Management Mahesh Kalyanaramanrisk-managementcompliance-governancevulnerability-management+3
2021-11-12TalkC0c0n 2021 Supply Chain Attacks Analysis Ajit Hattivulnerability-managementincident-responserisk-management+2
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiyaawssecurity-monitoringiam+2
2021-10-15TalkRootcon The Curious case of knowing the unknown Video Vandana Verma Sehgalvulnerability-managementsecure-codingdevsecops+1
2021-08-26TalkHitb Sec Conf Gazing Ahead: What Modern RF Combat Looks Like in the Next Decade Presentation Video Harshit Agrawalindustrial-control-systems-securitysecurity-architecturevulnerability-management+1
2021-08-08TalkDefcon Top 20 Secure PLC Coding Practices Video Vivek Ponnadaindustrial-control-systems-securitysecure-codingvulnerability-management+3
2021-08-07Tool demoDefcon Tenacity- An Adversary Emulation Tool for Persistence Video Atul Nair, Harshal Tupsamudreincident-responsevulnerability-management
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgalthreat-huntingthreat_modelingsecurity-architecture+2
2021-08-06TalkDefcon Adversary village Kick-off Video Abhijith B Rred-teamingethical-hackingvulnerability-assessment+2
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawalvulnerability-managementiot-pentestingsecurity-architecture+1
2021-08-05TalkDefcon The Bug Hunter’s Recon Methodology Video Tushar Vermapentestingvulnerability-assessmentapplication-pentesting+1
2021-08-04Tool demoBlackhat Counterfit: Attacking Machine Learning in Blackbox Settings Source Code Raja Sekhar Rao Dheekondavulnerability-assessment
2021-08-04Tool demoBlackhat Joern: An Interactive Shell for Code Analysis Source Code Suchakra Sharmavulnerability-assessment
2020-11-21TalkApp Sec Indonesia Learn how to find and exploit race conditions in web apps with OWASP TimeGap Theory Abhi M Balakrishnanweb-securityowaspapplication-pentesting+2
2020-11-21TalkApp Sec Indonesia The caveats of the unseen: Crouching exposure, Hidden Misconfiguration Ashwin Vamshivulnerability-managementsecurity-architecturedevsecops+2
2020-10-02Tool demoBlackhat OWASP Nettacker Source Code Sri Harsha Gajavallipentestingvulnerability-assessmentnetwork-pentesting+3
2020-09-19TalkC0c0n Automate your Recon with ReconNote Video Prasoon Guptapentestingvulnerability-assessmentAutomation+1
2020-09-18TalkC0c0n Herd Immunity, in the Cyber World Sunil Varkeysecurity-awarenessrisk-managementvulnerability-management+1
2020-08-06Tool demoBlackhat FuzzCube Source Code Anto Josephfuzzingkubernetescloud+1
2020-04-25TalkHitb Sec Conf THE STATE OF ICS SECURITY: THEN AND NOW Praveen Soni, Shivbihari Pandey, Ashish Kumar Gahlotvulnerability-assessmentpentestinfrastructure+1
2020-03-06Tool demoNullcon FuzzCube Source Code Anto Josephfuzzingkubernetescloud+1
2019-11-09TalkToor Con 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringhardware-reverse-engineeringvulnerability-management+3
2019-10-12TalkTexas Cyber Summit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshireverse-engineeringmalwarebinary-analysis+3
2019-10-03TalkVirus Bulletin Curious tale of 8.t used by multiple campaigns against South Asia Niranjan Jayanandreverse-engineeringvulnerability-managementapt+1
2019-09-27TalkC0c0n A Day in the Life of a CISO Sridhar Govardhancompliancegovernancerisk-management+3
2019-09-23TalkRootcon Identity crisis: war stories from authentication failures Presentation Video Vishal Chauhanauthenticationidentity-managementvulnerability-assessment+3
2019-09-13TalkGlobal App Sec Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center Amol Sarwatevulnerability-managementawssecurity-information-event-management+1
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Jatin Katariareverse-engineeringvulnerability-managementsecurity-architecture+2
2019-08-08TalkDefcon Anatomy of cloud hacking Pratik Shahcloud-pentestingpost-exploitationcloud-architecture+1
2019-08-08TalkDefcon Hacking ICS devices for Fun Penetration Testing of Vehicle Components Video Arun Maneautomotive-cybersecuritycan-busics-security+3
2019-03-28Tool demoBlackhat OWASP Nettacker: Automated Penetration Testing Framework Source Code Sri Harsha Gajavallinetwork-pentestingvulnerability-assessmentfirewall+3
2018-10-10TalkBrucon Simplifying the art of instrumentation Krishnakant Patil, Rushikesh D Nandedkarreverse-engineeringstatic-analysisdynamic-analysis+2
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyarthreat-landscapethreat-huntingrisk-management+1
2018-10-05TalkC0c0n Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? Roshy Johnrisk-managementvulnerability-managementsecurity-architecture
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatiaincident-responsevulnerability-managementsecurity-architecture
2018-08-16TalkUsenix Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer Presentation Whitepaper Video Siddharth Raopentestingvulnerability-managementsecurity-architecture+1
2018-08-10TalkDefcon AN OSINT APPROACH TO THIRD PARTY CLOUD SERVICE PROVIDER EVALUATION Presentation Video Lokesh Pidawekarthird-party-risk-managementcloud-securityvulnerability-management+2
2018-08-09TalkDefcon Backdooring DVR/NVR devices Arun Manehardware-reverse-engineeringembedded-securitypentesting+3
2018-06-27TalkFirst Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Sumanth Naropanth, Sunil Kumarmobile-securitysecure-developmentvulnerability-management+2
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharlamobile-securitysecure-developmentvulnerability-management+2
2018-01-31TalkOwasp App Sec California Hunter – Optimize your Pentesters time Video Kiran Shiraliapplication-pentestingpentestingvulnerability-management+2
2017-11-14TalkBlackhat Pwning a Smart Home in Under 10 Minutes Presentation Aditya Guptaiot-pentestingembedded-securitypentesting+3
2017-10-05TalkBrucon Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) Rushikesh D Nandedkar, Sampada Nandedkarvulnerability-assessmentpentestingsecure-coding+2
2017-10-05TalkVirus Bulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anandvulnerability-managementreverse-engineeringpentesting+1
2017-08-18TalkC0c0n Threats with online gaming and issues with games like Pokemon Riyaz Walikar, Akash Mahajansecurity-awarenessmobile-securityvulnerability-management+1
2017-08-18TalkC0c0n Your friendly neighbourhood exploit Aseem Jakharexploitationpentestingreverse-engineering+1
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Praveen Vadnalareverse-engineeringvulnerability-managementsecurity-architecture+1
2017-07-28Tool demoDefcon Lamma 1.0 Source Code Ajit Hatti, Antriksh Shahcryptographypentestaudit+1
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddivulnerability-assessmentbug-bountynetwork-pentesting+1
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Maneics-securityindustrial-control-systems-securitypentesting+2
2017-06-23TalkHackinparis Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2017-05-23TalkPhdays Injecting security into web apps in the runtime Presentation Ajin Abrahamwebblueteamsecure-development+6
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Bharadwaj Machirajupentestingapplication-pentestingvulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Francis Alexanderpentestingapplication-pentestingvulnerability-assessment+4
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpalincident-responsevulnerability-managementrisk-management+2
2017-03-03TalkNullcon Injecting Security into Web apps with Runtime Patching and Context Learning Presentation Video Ajin Abrahamwebblueteamsecure-development+6
2017-01-25TalkOwasp App Sec California OCSP Stapling in the Wild Devdatta Akhaweweb-securityvulnerability-managementsecurity-architecture+1
2016-10-13TalkApp Sec Usa When encryption is not enough: Attacking Wearable - Mobile Application communication over BLE Video Sumanth Naropanth, Kavya Racharlamobile-securityvulnerability-managementreverse-engineering+1
2016-10-07TalkDeepsec Inside Stegosploit Presentation Video Saumil Shahweb-securityexploitationpentesting+1
2016-10-05TalkVirus Bulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anandreverse-engineeringincident-responsevulnerability-management
2016-08-07TalkDefcon Cyber Grand Shellphish Video Aravind Machiryautomated-exploit-detectionreverse-engineeringvulnerability-assessment+1
2016-08-06Tool demoDefcon LAMMA (beta) Source Code Ajit Hatticryptographypentestaudit+1
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-08-04Tool demoBlackhat LAMMA Source Code Ajit Hatticryptographypentestaudit+1
2016-08-04TalkBlackhat Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages Video Anirudh Duggalvulnerability-managementindustrial-control-systems-securityrisk-management
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Pandapentestingvulnerability-managementthreat-hunting
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Katariareverse-engineeringhardware-reverse-engineeringfirmware-analysis+3
2016-03-11TalkNullcon Physical Lock Security Amey Gat, Swapnil Wadwalkarpentestingreverse-engineeringvulnerability-management+1
2015-11-05TalkGround Zero Summit Sanctioned to Hack: Your SCADA HMIs Belong to Us! Aditya K Soodics-securityweb-securityvulnerability-management+3
2015-09-24TalkApp Sec Usa Continuous Cloud Security Automation Video Rohit PitkeawsdevsecopsAutomation+2
2015-08-07TalkDefcon Hacker’s Practice Ground Video Lokesh Pidawekarpentestingethical-hackingvulnerability-assessment+2
2015-08-07TalkDefcon Getting into the Trust Store We Trust Ajit Hattireverse-engineeringsecurity-architecturevulnerability-management
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwatevulnerability-managementautomated-scanningvulnerability-assessment+2
2015-03-15TalkDefcon TECHNICAL TALK-WIHAWK: ROUTER VULNERABILITY SCANNER Anamika Singhnetwork-pentestingvulnerability-assessmentvulnerability-management+2
2015-02-06TalkNullcon Analyzing Chrome crash reports at scale Presentation Video Abhishek Aryawebbrowserclusterfuzz+3
2015-02-06TalkNullcon Building custom scans for real world enterprise network Presentation Source Code Video Sanoop Thomaspentestingnetwork-pentestingvulnerability-assessment+2
2015-01-27TalkOwasp App Sec California Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringvulnerability-managementincident-response+1
2015-01-27TalkOwasp App Sec California The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Video Devdatta Akhaweweb-securityxsscsrf+3
2014-09-26TalkVirus Bulletin Evolution of Android exploits from a static analysis tools perspective Presentation Whitepaper Video Jagadeesh Chandraiahandroid-securitystatic-analysisvulnerability-management+2
2014-09-18TalkApp Sec Usa Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringmemory-forensicsincident-response+1
2014-08-22TalkC0c0n Still Single with a bleeding heart (Tool Release) Tamaghna Basusecure-developmentvulnerability-management
2014-08-21TalkUsenix The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Presentation Whitepaper Devdatta Akhaweweb-securityxsscsrf+3
2014-03-15TalkBlackhat Anatomy of a Credit Card Stealing POS Malware Presentation Video Amol Sarwatereverse-engineeringpentestingvulnerability-management
2014-03-08TalkDefcon WI-Hawk Source Code Anamika Singhnetwork-pentestingvulnerability-assessmentnetwork-vulnerability-assessment+3
2014-01-28TalkOwasp App Sec California Application Sandboxes: Know thy limits Video Rahul Kashyapapplication-pentestingreverse-engineeringvulnerability-management+1
2013-11-21TalkAppsec Usa Wassup MOM? Owning the Message Oriented Middleware Video Gursev Singh Kalraapi-securityvulnerability-managementsecure-coding+1
2013-09-13TalkGrrcon Matriux Leandros - An Open Source Penetration Testing and Forensic Distribution Prajwal Panchmahalkarpentestingforensicsdigital-forensics+2
2013-08-15TalkUsenix An Empirical Study of Vulnerability Rewards Programs Presentation Whitepaper Devdatta Akhawevulnerability-managementbug-bountysoftware-security+3
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3
2013-03-01TalkNullcon Capturing Zero-Day Information Video Dinesh O Bareja, Sumit Sharmazero-dayredteam
2012-12-01TalkClubhack Anatomy of a Responsible Disclosure – Zero Day Vulnerability in Oracle BI Publisher Presentation Video Vishal Kalrozero-day
2012-10-25TalkApp Sec Usa Cross Site Port Scanning Video Riyaz Walikarweb-securityvulnerability-managementowasp+1
2012-08-03TalkC0c0n Cyber Weapons Sameer Saxenapentestingexploitationmalware+1
2012-07-22Tool demoBlackhat Kautilya and Nishang Source Code Nikhil Mittalpost-exploitationethical-hackingpentesting+2
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Ramansocial-engineeringweb-securitysecurity-awareness+2
2011-08-03TalkBlackhat Reverse Engineering Browser Components: Dissecting and Hacking Silverlight, HTML 5 and Flex Presentation Whitepaper Video Shreeraj Shahreverse-engineeringwebajax+6
2011-08-03TalkBlackhat Femtocells: A poisonous needle in the operator’s hay stack Presentation Whitepaper Video Ravishankar Borgaonkarnetwork-pentestingmobile-securityvulnerability-management
2010-10-29TalkT2 Hacking Femtocells Ravishankar Borgaonkarmobile-securityreverse-engineeringvulnerability-management
2010-08-01TalkC0c0n Hackers’ EcoSystem in India Rohit Srivastwapentestingsecurity-awarenessrisk-management+1
2010-06-18TalkSyscan REVERSE ENGINEERING WEB 2.0 APPLICATIONS Shreeraj Shahreverse-engineeringwebajax+6
2010-03-15TalkBlackhat 400 Apps in 40 Days Presentation Video Nish Bhallavulnerability-managementrisk-managementapplication-pentesting+2
2009-11-19TalkDeepsec Top 10 Security Issues Developers Don’t Know About Video Neelay S Shahsecure-codingdevsecopsvulnerability-management+3
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankarcybersecurity-educationsecurity-awarenessrisk-management+2
2009-08-06TalkC0c0n Information Security Audit Venkatapathy Subramaniamcompliancegovernanceaudit+2
2009-05-19TalkSyscan Securing Enterprise Applications Shreeraj Shahblueteamwebweb-application-security+13
2009-02-19TalkBlackhat Blinded by Flash: Widespread Security Risks Flash Developers Don’t See Presentation Video Prajakta Jagdaleflashblueteamweb
2008-08-20TalkOwasp App Sec India Web 2.0 Attacks - Next Generation Threats on the Rise Presentation Shreeraj Shahredteamblueteampurpleteam+4
2008-02-20TalkBlackhat Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools Presentation Shreeraj Shahredteamblueteampurpleteam+4
2006-08-02TalkBlackhat SQL Injections by Truncation Presentation Bala Neerumallaweb-securitysql-injectionsecure-coding+1