🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Ai Security

Focus Area: 🤖 AI & ML Security
77
Total Entries
102
Contributors

Top Contributors

Owais Shaikh(4) Rahul Sasi(4) Tamaghna Basu(4) Sherin Stephen(3) Aditya Vasekar(2)

All Entries (77 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat From Triage to Threat Modeling: Open-Source Security LLM in Action Source Code Dhruv Kedia, Sajana Weerawardhena#ai-security#threat-modeling#vulnerability-assessment+1
2025-08-07TalkBlackhat Weaponizing Apple AI for Offensive Operations Video Hari Shanmugam#ai#macos#ai-security+2
2025-06-02TalkConfidence Local LLMs in Action: Automating CTI to Connect the Dots Video Kai Iyer#threat-intelligence-analysis#machine-learning#threat-detection+1
2025-04-29TalkRsac XPIA Attacks—Rethinking Defense in Depth for an AI-Powered World Video Aanchal Gupta, Abhilasha Bhargav Spantzel, John Leo Jr, Stefano Zanero#ai#ai-security#input-validation+3
2025-04-15TalkStackx Cybersecurity AI in Cybersecurity: Hype, Reality, and the Shift from Tools to Teammates Video Pawan Kinger#ai-security#threat-detection#security-operations-center
2025-03-01PanelNullcon AI in SecOps: Enhancing Incident Response with Intelligence Mrudul Uchil, Parag Deodhar, Felix Mohan#ai-security#ai#machine-learning+3
2025-03-01PanelNullcon AI versus AI : Reimagining Security Operation Arnav Khorana, Prithvi Raju Alluri, Vinay Jain#ai-security#ai#machine-learning
2025-03-01PanelNullcon Bug Bounties 2.0 : AI, Automation, and the Future of Ethical Hacking Krishna Pandey#ai-security#ai#ml+1
2025-03-01PanelNullcon Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense Ajit Hatti, Varun Singla#ai-security#zero-trust#ai+3
2025-03-01TalkNullcon MLOps Under Attack: Threat Modeling Modern AI Systems Presentation Sandeep Singh#ai#ml#ai-security+4
2025-03-01TalkNullcon Reversing Large Deep learning AI Models Presentation Yashodhan Vivek Mandke#ai#ai-security#deep-learning+2
2024-12-11Tool demoBlackhat Open Source Tool to Shift Left Security Testing by Leveraging AI Shivam Rawat, Shivansh Agrawal#ai-security#secure-development#security-testing+2
2024-11-15TalkC0c0n GenAI and Autonomous Security in the Age of Zero Trust Video Philip Varughese Vayarakunnil#ai#ai-security#zero-trust+2
2024-11-15PanelC0c0n Intelligence led security Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A#security-strategy#data-analytics#ai-security+1
2024-10-29TalkBlackhat Hacking Deepfake Image Detection System with White and Black Box Attacks Video Sagar Bhure#deepfake#ai-security#deep-learning+4
2024-08-29Tool demoHitbsecconf AI Assisted Code Reviewer Rajanish Pathak, Hardik Mehta#ai#ai-security#code-review+4
2024-08-08Tool demoBlackhat Octopii v2 Source Code Owais Shaikh#red-teaming#ai-security#nlp+2
2024-08-08Tool demoBlackhat Open Source LLM Security Source Code Ankita Gupta 1, Ankush Jain#ai-security#application-pentesting#security-testing+3
2024-08-07Tool demoBlackhat Hacking generative AI with PyRIT Source Code Video Raja Sekhar Rao Dheekonda#ai#ai-security#machine-learning+4
2024-04-19Tool demoBlackhat AWSDefenderGPT: Leveraging OpenAI to Secure AWS Cloud Source Code Sherin Stephen, Nishant Sharma, Rishappreet Singh Moonga#aws#ai-security#ai+4
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anand#machine-learning#ai-security#malware-detection+3
2024-04-18Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Version 2 Govind Krishna, Xian Xiang Chang#audit#application-pentesting#ai-security+4
2023-12-07TalkBlackhat Unmasking APTs: An Automated Approach for Real-World Threat Attribution Presentation Video Aakansha Saha#machine-learning#ai-security#static-analysis+1
2023-12-06Tool demoBlackhat Octopii v2 Source Code Owais Shaikh, Umair Nehri#ai#data-protection#nlp+4
2023-09-24PanelNullcon INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey, Travis Carelock#threat-hunting#ai-security#blueteam
2023-09-23PanelNullcon WEAPONIZATION OF AI WITH SPECIAL REFERENCE TO GEN-AI Rahul Neel Mani, Manish Tiwari, Yogesh Kulkarni, Ambarish Kumar Singh, Alan J White#ai-security#deepfake#ml+1
2023-08-10TalkBlackhat AI Assisted Decision Making of Security Review Needs for New Features Presentation Mrityunjay Gautam, Pavan Kolachoor#ai#ai-security#deep-learning+3
2023-08-09Tool demoBlackhat AntiSquat - An AI-Powered Phishing Domain Finder Source Code Owais Shaikh, Umair Nehri#ai#ai-security#phishing+2
2023-08-09Tool demoBlackhat ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections Video Ankit Anurag, Ashwath Kumar, Manikandan Rajappan#cloud-access-security-broker#incident-management#security-tools+2
2023-08-09Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. Source Code Sagar Bhure#kernel#machine-learning#forensics+4
2023-08-07TalkC0c0n Putting a leash on AI Video Aditya Vasekar#ai#ai-security#smart-contracts+1
2023-08-06TalkC0c0n AI in Cyber Security and Crime Prevention Vishal Salvi#ai#ai-security#deep-learning+3
2023-08-06TalkC0c0n Cybersecurity in the Era of AI Video Suvin Mullaseril#ai#ai-security#deep-learning+4
2023-08-06PanelC0c0n Generative AI - An Industry Perspective Video Georgie Kurien, Balakrishnan A, Sreekumar Balachandran, V v Jacob, Sony A#ai-security#deep-learning#machine-learning
2022-09-08TalkNullcon Automate Your Whatsapp Chats Presentation Video Aditi Bhatnagar#android#application-pentesting#ai-security+2
2022-09-06PanelNullcon Impact of disruptive technologies on CISO’s career & progression Video Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Ravi Kumar, Ankur Bhargava#security-strategy#cybersecurity-framework#ai-security
2022-08-11Tool demoBlackhat Octopii - AI-powered Personal Identifiable Information (PII) scanner Source Code Owais Shaikh#ai#ai-security#data-protection+4
2022-08-10Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephen#reconnaissance#ai-security#nlp+3
2022-05-12Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephen#reconnaissance#ai-security#nlp+4
2021-10-08KeynoteShellcon Keynote - Advanced Application of Adversarial AI for Scenario Based Hacking Video Tamaghna Basu#ai#ai-security#deep-learning+4
2021-08-05TalkBlackhat The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks Presentation Ambrish Rawat, Killian Levacher, Mathieu Sinn#ai#ai-security#deep-learning+4
2021-08-04Tool demoBlackhat Counterfit: Attacking Machine Learning in Blackbox Settings Source Code Raja Sekhar Rao Dheekonda, Will Pearce#vulnerability-assessment#ai-security#machine-learning+2
2021-08-04TalkBlackhat Siamese Neural Networks for Detecting Brand Impersonation Presentation Jugal Parikh, Nitin Kumar Goel, Justin Grana, Yuchao Dai#impersonation#ai-security#deep-learning+4
2020-10-09TalkShellcon How I Created My Clone Using AI - Next-Gen Social Engineering Video Tamaghna Basu#ai#social-engineering#ai-security+4
2020-10-02Tool demoBlackhat MalViz.ai Source Code Vasu Sethia, Shivam Kataria#blueteam#machine-learning#deep-learning+3
2020-09-18TalkC0c0n How I created my clone using AI - next-gen Social Engineering Video Tamaghna Basu#ai#impersonation#ai-security+3
2020-09-18TalkC0c0n Automation in Bug Bounties to Work Smarter Prerak Mittal#bug-hunting#bug-bounty#security-tools+4
2020-09-18KeynoteC0c0n Data protection and Privacy Data protection and Privacy Video Kris Gopalakrishnan#ai-security#data-protection#identity-theft+2
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar Dutta#intrusion-detection#machine-learning#application-pentesting+3
2020-03-06PanelNullcon Predicting Danger: Building the Ideal Threat Intelligence Model Video Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav#ai-security#machine-learning#nlp+3
2020-03-06Tool demoNullcon spike2kill Source Code Manish Singh#web-scraping#ai-security#nlp+4
2019-09-27TalkC0c0n AI, ML and Security Varun Kohli#ai#machine-learning#ai-security+2
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasi#ics-security#architecture#ai-security+2
2019-08-29KeynoteHitbsecconf The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#compliance-governance#security-strategy+4
2019-05-21TalkPhdays GDALR: an efficient model duplication attack on black-box machine learning models Presentation Rewanth Tammana, Nikhil Joshi#red-teaming#machine-learning#api-security+3
2019-03-28Tool demoBlackhat MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research Source Code Nilaksh Das, Evan Yang, Li Chen#machine-learning#blueteam#ai-security+4
2019-03-01PanelNullcon Cybersecurity: Is Machine Learning the Answer? Video Rahul Sasi, Sitesh Behera, Sumeet Khokhani, Rui Bastos#ai-security#machine-learning#ml
2018-11-27TalkHitbsecconf COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding Presentation Video Vikash Yadav#deep-learning#blueteam#ai-security+3
2018-10-05TalkC0c0n Artificial Intelligence and Social Media Analytics in Criminal Investigation Amit Dubey#ai#ai-security#nlp+3
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basu#machine-learning#blueteam#ai-security+4
2018-10-05TalkC0c0n Predictive policing using Big Data analytics. Tarun Wig#blueteam#data-analytics#data-protection+3
2018-10-05TalkC0c0n Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? Roshy John#risk-management#architecture#ai-security+2
2018-10-03Tool demoBlackhat Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Presentation Source Code Ankur Tyagi#malware-detection#static-analysis#dynamic-analysis+3
2018-08-09TalkBlackhat Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks Presentation Video Jugal Parikh, Randy Treit, Holly Stewart#blueteam#ai-security#machine-learning+4
2018-03-01TalkNullcon A Game between Adversary and AI Scientist Presentation Video Satnam Singh#ai#blueteam#ai-security+3
2017-08-18TalkC0c0n Catching Network anomalies using Deep learning Aditya Vasekar#machine-learning#deep-learning#ai-security
2017-08-18TalkC0c0n Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis Furqan Khan, Siddharth Anbalahan#machine-learning#security-assessment#nlp+4
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thaware#machine-learning#red-teaming#ai-security+3
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+2
2017-03-03TalkNullcon Tale of training a Web Terminator! Presentation Bharadwaj Machiraju#ml#security-assessment#application-pentesting+4
2016-05-17TalkPhdays Security Automation Based on Artificial Intelligence Video Rahul Sasi#ai#blueteam#ai-security+4
2016-03-11TalkNullcon Making Machines think about security for fun and profit Presentation Rahul Sasi#blueteam#ml#application-pentesting+4
2013-09-27TalkC0c0n The Art and Science of Anamoly based Vulnerability Detection Lavakumar Kuppan#blueteam#security-analytics#automated-scanning+2
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2012-12-01TalkClubhack Infrastructure Security Presentation Video Sivamurthy Hiremath#blueteam#security-strategy#threat-modeling+1
2012-09-26TalkNullcon Opening the kimono: Automating behavioral analysis for mobile apps Video Pradeep Kulkarni, Michael Sutton#application-pentesting#security-testing#dynamic-analysis+1
2012-08-29TalkOwaspappsecindia Find me if you can Smart fuzzing and discovery! Presentation Shreeraj Shah#fuzzing#application-pentesting#dynamic-analysis+3