| 2025-12-11 | Tool demo | Blackhat |
From Triage to Threat Modeling: Open-Source Security LLM in Action
| Dhruv Kedia, Sajana Weerawardhena | #ai-security#threat-modeling#vulnerability-assessment+1 |
| 2025-08-07 | Talk | Blackhat |
Weaponizing Apple AI for Offensive Operations
| Hari Shanmugam | #ai#macos#ai-security+2 |
| 2025-06-02 | Talk | Confidence |
Local LLMs in Action: Automating CTI to Connect the Dots
| Kai Iyer | #threat-intelligence-analysis#machine-learning#threat-detection+1 |
| 2025-04-29 | Talk | Rsac |
XPIA Attacks—Rethinking Defense in Depth for an AI-Powered World
| Aanchal Gupta, Abhilasha Bhargav Spantzel, John Leo Jr, Stefano Zanero | #ai#ai-security#input-validation+3 |
| 2025-04-15 | Talk | Stackx Cybersecurity |
AI in Cybersecurity: Hype, Reality, and the Shift from Tools to Teammates
| Pawan Kinger | #ai-security#threat-detection#security-operations-center |
| 2025-03-01 | Panel | Nullcon |
AI in SecOps: Enhancing Incident Response with Intelligence
| Mrudul Uchil, Parag Deodhar, Felix Mohan | #ai-security#ai#machine-learning+3 |
| 2025-03-01 | Panel | Nullcon |
AI versus AI : Reimagining Security Operation
| Arnav Khorana, Prithvi Raju Alluri, Vinay Jain | #ai-security#ai#machine-learning |
| 2025-03-01 | Panel | Nullcon |
Bug Bounties 2.0 : AI, Automation, and the Future of Ethical Hacking
| Krishna Pandey | #ai-security#ai#ml+1 |
| 2025-03-01 | Panel | Nullcon |
Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense
| Ajit Hatti, Varun Singla | #ai-security#zero-trust#ai+3 |
| 2025-03-01 | Talk | Nullcon |
MLOps Under Attack: Threat Modeling Modern AI Systems
| Sandeep Singh | #ai#ml#ai-security+4 |
| 2025-03-01 | Talk | Nullcon |
Reversing Large Deep learning AI Models
| Yashodhan Vivek Mandke | #ai#ai-security#deep-learning+2 |
| 2024-12-11 | Tool demo | Blackhat |
Open Source Tool to Shift Left Security Testing by Leveraging AI
| Shivam Rawat, Shivansh Agrawal | #ai-security#secure-development#security-testing+2 |
| 2024-11-15 | Talk | C0c0n |
GenAI and Autonomous Security in the Age of Zero Trust
| Philip Varughese Vayarakunnil | #ai#ai-security#zero-trust+2 |
| 2024-11-15 | Panel | C0c0n |
Intelligence led security
| Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A | #security-strategy#data-analytics#ai-security+1 |
| 2024-10-29 | Talk | Blackhat |
Hacking Deepfake Image Detection System with White and Black Box Attacks
| Sagar Bhure | #deepfake#ai-security#deep-learning+4 |
| 2024-08-29 | Tool demo | Hitbsecconf |
AI Assisted Code Reviewer
| Rajanish Pathak, Hardik Mehta | #ai#ai-security#code-review+4 |
| 2024-08-08 | Tool demo | Blackhat |
Octopii v2
| Owais Shaikh | #red-teaming#ai-security#nlp+2 |
| 2024-08-08 | Tool demo | Blackhat |
Open Source LLM Security
| Ankita Gupta 1, Ankush Jain | #ai-security#application-pentesting#security-testing+3 |
| 2024-08-07 | Tool demo | Blackhat |
Hacking generative AI with PyRIT
| Raja Sekhar Rao Dheekonda | #ai#ai-security#machine-learning+4 |
| 2024-04-19 | Tool demo | Blackhat |
AWSDefenderGPT: Leveraging OpenAI to Secure AWS Cloud
| Sherin Stephen, Nishant Sharma, Rishappreet Singh Moonga | #aws#ai-security#ai+4 |
| 2024-04-19 | Tool demo | Blackhat |
Malware clustering using unsupervised ML : CalMal
| Himanshu Anand | #machine-learning#ai-security#malware-detection+3 |
| 2024-04-18 | Tool demo | Blackhat |
DetectiveSQ: A Extension Auditing Framework Version 2
| Govind Krishna, Xian Xiang Chang | #audit#application-pentesting#ai-security+4 |
| 2023-12-07 | Talk | Blackhat |
Unmasking APTs: An Automated Approach for Real-World Threat Attribution
| Aakansha Saha | #machine-learning#ai-security#static-analysis+1 |
| 2023-12-06 | Tool demo | Blackhat |
Octopii v2
| Owais Shaikh, Umair Nehri | #ai#data-protection#nlp+4 |
| 2023-09-24 | Panel | Nullcon |
INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI
| Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey, Travis Carelock | #threat-hunting#ai-security#blueteam |
| 2023-09-23 | Panel | Nullcon |
WEAPONIZATION OF AI WITH SPECIAL REFERENCE TO GEN-AI
| Rahul Neel Mani, Manish Tiwari, Yogesh Kulkarni, Ambarish Kumar Singh, Alan J White | #ai-security#deepfake#ml+1 |
| 2023-08-10 | Talk | Blackhat |
AI Assisted Decision Making of Security Review Needs for New Features
| Mrityunjay Gautam, Pavan Kolachoor | #ai#ai-security#deep-learning+3 |
| 2023-08-09 | Tool demo | Blackhat |
AntiSquat - An AI-Powered Phishing Domain Finder
| Owais Shaikh, Umair Nehri | #ai#ai-security#phishing+2 |
| 2023-08-09 | Tool demo | Blackhat |
ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections
| Ankit Anurag, Ashwath Kumar, Manikandan Rajappan | #cloud-access-security-broker#incident-management#security-tools+2 |
| 2023-08-09 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security.
| Sagar Bhure | #kernel#machine-learning#forensics+4 |
| 2023-08-07 | Talk | C0c0n |
Putting a leash on AI
| Aditya Vasekar | #ai#ai-security#smart-contracts+1 |
| 2023-08-06 | Talk | C0c0n |
AI in Cyber Security and Crime Prevention
| Vishal Salvi | #ai#ai-security#deep-learning+3 |
| 2023-08-06 | Talk | C0c0n |
Cybersecurity in the Era of AI
| Suvin Mullaseril | #ai#ai-security#deep-learning+4 |
| 2023-08-06 | Panel | C0c0n |
Generative AI - An Industry Perspective
| Georgie Kurien, Balakrishnan A, Sreekumar Balachandran, V v Jacob, Sony A | #ai-security#deep-learning#machine-learning |
| 2022-09-08 | Talk | Nullcon |
Automate Your Whatsapp Chats
| Aditi Bhatnagar | #android#application-pentesting#ai-security+2 |
| 2022-09-06 | Panel | Nullcon |
Impact of disruptive technologies on CISO’s career & progression
| Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Ravi Kumar, Ankur Bhargava | #security-strategy#cybersecurity-framework#ai-security |
| 2022-08-11 | Tool demo | Blackhat |
Octopii - AI-powered Personal Identifiable Information (PII) scanner
| Owais Shaikh | #ai#ai-security#data-protection+4 |
| 2022-08-10 | Tool demo | Blackhat |
ReconPal: Leveraging NLP for Infosec
| Jeswin Mathai, Shantanu Kale, Sherin Stephen | #reconnaissance#ai-security#nlp+3 |
| 2022-05-12 | Tool demo | Blackhat |
ReconPal: Leveraging NLP for Infosec
| Jeswin Mathai, Shantanu Kale, Sherin Stephen | #reconnaissance#ai-security#nlp+4 |
| 2021-10-08 | Keynote | Shellcon |
Keynote - Advanced Application of Adversarial AI for Scenario Based Hacking
| Tamaghna Basu | #ai#ai-security#deep-learning+4 |
| 2021-08-05 | Talk | Blackhat |
The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks
| Ambrish Rawat, Killian Levacher, Mathieu Sinn | #ai#ai-security#deep-learning+4 |
| 2021-08-04 | Tool demo | Blackhat |
Counterfit: Attacking Machine Learning in Blackbox Settings
| Raja Sekhar Rao Dheekonda, Will Pearce | #vulnerability-assessment#ai-security#machine-learning+2 |
| 2021-08-04 | Talk | Blackhat |
Siamese Neural Networks for Detecting Brand Impersonation
| Jugal Parikh, Nitin Kumar Goel, Justin Grana, Yuchao Dai | #impersonation#ai-security#deep-learning+4 |
| 2020-10-09 | Talk | Shellcon |
How I Created My Clone Using AI - Next-Gen Social Engineering
| Tamaghna Basu | #ai#social-engineering#ai-security+4 |
| 2020-10-02 | Tool demo | Blackhat |
MalViz.ai
| Vasu Sethia, Shivam Kataria | #blueteam#machine-learning#deep-learning+3 |
| 2020-09-18 | Talk | C0c0n |
How I created my clone using AI - next-gen Social Engineering
| Tamaghna Basu | #ai#impersonation#ai-security+3 |
| 2020-09-18 | Talk | C0c0n |
Automation in Bug Bounties to Work Smarter
| Prerak Mittal | #bug-hunting#bug-bounty#security-tools+4 |
| 2020-09-18 | Keynote | C0c0n |
Data protection and Privacy Data protection and Privacy
| Kris Gopalakrishnan | #ai-security#data-protection#identity-theft+2 |
| 2020-03-06 | Talk | Nullcon |
Automated Classification of Web-Application Attacks for Intrusion Detection
| Aneet Kumar Dutta | #intrusion-detection#machine-learning#application-pentesting+3 |
| 2020-03-06 | Panel | Nullcon |
Predicting Danger: Building the Ideal Threat Intelligence Model
| Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav | #ai-security#machine-learning#nlp+3 |
| 2020-03-06 | Tool demo | Nullcon |
spike2kill
| Manish Singh | #web-scraping#ai-security#nlp+4 |
| 2019-09-27 | Talk | C0c0n |
AI, ML and Security
| Varun Kohli | #ai#machine-learning#ai-security+2 |
| 2019-09-27 | Talk | C0c0n |
Looking a decade ahead: Big data, drones , Robots and cyber security.
| Rahul Sasi | #ics-security#architecture#ai-security+2 |
| 2019-08-29 | Keynote | Hitbsecconf |
The CISO’s Dilemma
| Saumil Shah | #blueteam#compliance-governance#security-strategy+4 |
| 2019-05-21 | Talk | Phdays |
GDALR: an efficient model duplication attack on black-box machine learning models
| Rewanth Tammana, Nikhil Joshi | #red-teaming#machine-learning#api-security+3 |
| 2019-03-28 | Tool demo | Blackhat |
MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research
| Nilaksh Das, Evan Yang, Li Chen | #machine-learning#blueteam#ai-security+4 |
| 2019-03-01 | Panel | Nullcon |
Cybersecurity: Is Machine Learning the Answer?
| Rahul Sasi, Sitesh Behera, Sumeet Khokhani, Rui Bastos | #ai-security#machine-learning#ml |
| 2018-11-27 | Talk | Hitbsecconf |
COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding
| Vikash Yadav | #deep-learning#blueteam#ai-security+3 |
| 2018-10-05 | Talk | C0c0n |
Artificial Intelligence and Social Media Analytics in Criminal Investigation
| Amit Dubey | #ai#ai-security#nlp+3 |
| 2018-10-05 | Talk | C0c0n |
How can we use machine learning to prevent Frauds and password breaches
| Tamaghna Basu | #machine-learning#blueteam#ai-security+4 |
| 2018-10-05 | Talk | C0c0n |
Predictive policing using Big Data analytics.
| Tarun Wig | #blueteam#data-analytics#data-protection+3 |
| 2018-10-05 | Talk | C0c0n |
Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security?
| Roshy John | #risk-management#architecture#ai-security+2 |
| 2018-10-03 | Tool demo | Blackhat |
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization
| Ankur Tyagi | #malware-detection#static-analysis#dynamic-analysis+3 |
| 2018-08-09 | Talk | Blackhat |
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks
| Jugal Parikh, Randy Treit, Holly Stewart | #blueteam#ai-security#machine-learning+4 |
| 2018-03-01 | Talk | Nullcon |
A Game between Adversary and AI Scientist
| Satnam Singh | #ai#blueteam#ai-security+3 |
| 2017-08-18 | Talk | C0c0n |
Catching Network anomalies using Deep learning
| Aditya Vasekar | #machine-learning#deep-learning#ai-security |
| 2017-08-18 | Talk | C0c0n |
Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis
| Furqan Khan, Siddharth Anbalahan | #machine-learning#security-assessment#nlp+4 |
| 2017-07-26 | Talk | Blackhat |
Wire Me Through Machine Learning
| Ankit Singh, Vijay Thaware | #machine-learning#red-teaming#ai-security+3 |
| 2017-03-31 | Talk | Blackhat |
The Seven Axioms of Security
| Saumil Shah | #blueteam#security-strategy#threat-modeling+2 |
| 2017-03-03 | Talk | Nullcon |
Tale of training a Web Terminator!
| Bharadwaj Machiraju | #ml#security-assessment#application-pentesting+4 |
| 2016-05-17 | Talk | Phdays |
Security Automation Based on Artificial Intelligence
| Rahul Sasi | #ai#blueteam#ai-security+4 |
| 2016-03-11 | Talk | Nullcon |
Making Machines think about security for fun and profit
| Rahul Sasi | #blueteam#ml#application-pentesting+4 |
| 2013-09-27 | Talk | C0c0n |
The Art and Science of Anamoly based Vulnerability Detection
| Lavakumar Kuppan | #blueteam#security-analytics#automated-scanning+2 |
| 2013-03-01 | Talk | Nullcon |
Sensitive Campus Security with Network
| Aravind Sitaraman | #blueteam#network-monitoring#security-strategy+4 |
| 2012-12-01 | Talk | Clubhack |
Infrastructure Security
| Sivamurthy Hiremath | #blueteam#security-strategy#threat-modeling+1 |
| 2012-09-26 | Talk | Nullcon |
Opening the kimono: Automating behavioral analysis for mobile apps
| Pradeep Kulkarni, Michael Sutton | #application-pentesting#security-testing#dynamic-analysis+1 |
| 2012-08-29 | Talk | Owaspappsecindia |
Find me if you can Smart fuzzing and discovery!
| Shreeraj Shah | #fuzzing#application-pentesting#dynamic-analysis+3 |