| 2025-08-07 | Tool demo | Blackhat |
Kubernetes Goat - A Hands-on Interactive Kubernetes Security Playground
| Madhu Akula | #kubernetes#cloud-workload-protection#container-security+3 |
| 2025-08-07 | Tool demo | Blackhat |
Q-TIP (QR Code Threat Inspection Platform)
| Rushikesh D Nandedkar | #incident-management#web-security#architecture+1 |
| 2025-08-06 | Talk | Blackhat |
When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach
| Varun Sharma, Ashish Kurmi | #ci-cd#incident-management#devsecops+2 |
| 2025-04-04 | Tool demo | Blackhat |
Decoy Mutex
| Madhukar Raina | #ransomware#endpoint-protection#malware-prevention+3 |
| 2025-04-04 | Panel | Blackhat |
Locknote: Highlights & Key Takeaways from Black Hat Asia 2025
| Vandana Verma Sehgal, Daniel Cuthbert, Ryan Flores, Vitaly Kamluk, Jeff Moss, Asuka Nakajima | #security-strategy#cybersecurity-framework#digital-learning+1 |
| 2025-04-04 | Tool demo | Blackhat |
SHIVA Spampot: Actionable Spam and Phishing Intelligence
| Rahul Binjve, Viren Kapadia | #honeypot#network-monitoring#incident-management+1 |
| 2025-03-02 | Panel | Nullcon |
Cyber Fusion Center: The Command Center for Integrated Cyber Defense
| Avkash Kathiriya, Mathan Babu Kasilingam, Yogi Kapur | #security-monitoring#network-defense#threat-modeling+3 |
| 2025-03-02 | Panel | Nullcon |
How can organisations protect themselves against Advanced Cyber Threats
| Bithal Bhardwaj, Vishal Salvi | #security-strategy#incident-management#phishing+1 |
| 2025-03-01 | Panel | Nullcon |
Converging IT and OT Security: Unified strategies for protection, detection and response
| Burgess Cooper, Kuldeep Singh, Shailendra Fuloria, Rohit Sharma, Sachin Burman, Yask Sharma | #ics-security#cloud-workload-protection#security-strategy+1 |
| 2025-03-01 | Talk | Nullcon |
MacOS Lockdown Mode: A Forensic Deep Dive
| Bhargav Rathod | #macos#digital-forensics#endpoint-protection+3 |
| 2024-12-12 | Tool demo | Blackhat |
Cloud Offensive Breach and Risk Assessment (COBRA)
| Harsha Koushik, Anand Tiwari | #cloud-pentesting#cloud-workload-protection#security-testing+3 |
| 2024-12-11 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve, Paul Laine | #active-directory#incident-management#network-forensics+1 |
| 2024-11-21 | Talk | Securityfest |
Breaking Container Boundary Using Side Channel Attack
| Adhokshaj Mishra | #container-security#docker#security-testing+1 |
| 2024-11-16 | Talk | C0c0n |
Invisible Invaders: Bypassing Email Security with Legitimate Tools
| Dhruv Bisani | #bypassing#phishing#social-engineering+2 |
| 2024-11-16 | Panel | C0c0n |
When Falcon Strikes Back: The Defender’s Dilemma
| Burgess Cooper, Shivkumar Pandey, A Shiju Rawther, Padnya Manwar, Kishan Kendre | #incident-management#security-strategy#threat-modeling+2 |
| 2024-11-15 | Panel | C0c0n |
Intelligence led security
| Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A | #security-strategy#data-analytics#ai-security+1 |
| 2024-10-23 | Tool demo | Blackhat |
DarkWidow: Customizable Dropper Tool Targeting Windows
| Soumyanil Biswas | #darkwidow#windows#exploit-delivery+4 |
| 2024-08-29 | Talk | Hitbsecconf |
COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts
| Chetan Raghuprasad, Joey Chen | #reverse-engineering#security-assessment#incident-management |
| 2024-08-29 | Tool demo | Hitbsecconf |
eBPFShield
| Sagar Bhure | #ids#incident-management#network-monitoring+1 |
| 2024-08-08 | Tool demo | Blackhat |
Active Directory Cyber Deception using Huginn
| Rohan Durve, Paul Laine | #active-directory#incident-management#identity-governance+3 |
| 2024-05-07 | Talk | Rsac |
Anatomy of a Vulnerability Response - A View from the Inside
| Mohit Arora, Richard Tonry | #incident-management#risk-management#compliance-governance |
| 2024-04-18 | Tool demo | Blackhat |
Catching adversaries on Azure - Deception on Cloud
| Subhash Popuri | #azure#cloud-workload-protection#cloud-pentesting+4 |
| 2024-03-21 | Talk | Cansecwest |
Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server
| Arif Hussain, George Hughey | #security-assessment#architecture#incident-management |
| 2023-12-06 | Tool demo | Blackhat |
AndroCop: One Click Forensic Investigation & Data Extraction Tool
| Abhinand N, Aswin M Guptha, Varun Nair | #android#android-security#mobile-forensics+4 |
| 2023-09-24 | Panel | Nullcon |
ADVERSARY SIMULATION AND INCIDENT RESPONSE IMPACT
| Shomiron Das Gupta, Yogi Kapur, Manish Tiwari | #incident-management#incident-detection#forensics+3 |
| 2023-09-23 | Panel | Nullcon |
CRITICAL INFORMATION INFRASTRUCTURE(CII) PROTECTION: CHALLENGES AND OPPORTUNITIES- HOW CAN THE NULLCON COMMUNITY CONTRIBUTE
| Saikat Datta, M v Sheshadri, Madhavi Purandare, Mathan Babu Kasilingam, Navin Kumar Singh | #critical-infrastructure#cybersecurity-framework#security-strategy+4 |
| 2023-08-10 | Talk | Blackhat |
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs?
| Amit Deokar, Ali Ahmed, Brian Lee | #bug-hunting#incident-management#security-strategy+4 |
| 2023-08-09 | Tool demo | Blackhat |
ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections
| Ankit Anurag, Ashwath Kumar, Manikandan Rajappan | #cloud-access-security-broker#incident-management#security-tools+2 |
| 2023-08-09 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security.
| Sagar Bhure | #kernel#machine-learning#forensics+4 |
| 2023-08-07 | Talk | C0c0n |
Chinese APT against Government officials using G7 summit lure
| Niranjan Jayanand | #apt#incident-management#threat-hunting |
| 2023-08-07 | Talk | C0c0n |
Cyber Threats to Global Financial Systems
| Lince Lawrence | #incident-management#risk-management#cloud-monitoring+4 |
| 2023-08-07 | Talk | C0c0n |
Darkweb Investigations
| Amit Dubey | #threat-hunting#digital-forensics#incident-management+1 |
| 2023-08-07 | Talk | C0c0n |
Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs
| Sathwik RAM Prakki | #apt#reverse-engineering#incident-management |
| 2023-08-07 | Talk | C0c0n |
Tackling Advanced Threat Landscape with MDR - Best Practices
| Vijayakumar K M | #incident-management#threat-hunting#security-monitoring+1 |
| 2023-08-07 | Talk | C0c0n |
Trust Resiliency - A Lesson Learned from Russia Ukraine War
| Ajit Hatti | #incident-management#architecture#risk-management+1 |
| 2023-08-06 | Talk | C0c0n |
Cybercrimes Victim Compensation : Legal Remedies and Process
| Nisheeth Dixit | #security-compliance#security-governance#risk-management+1 |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | #threat-hunting#digital-forensics#network-forensics+3 |
| 2023-08-06 | Talk | C0c0n |
Insider Threats - Best Practices and Common Pitfalls
| Georgie Kurien | #insider-threats#risk-management#security-training+1 |
| 2023-08-06 | Talk | C0c0n |
Playing cat and mouse with the Adversary: Sometimes a breach is inevitable
| Abhijith B R | #incident-management#risk-management#security-strategy+1 |
| 2023-08-06 | Talk | C0c0n |
Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape
| Jaydev Joshi, Simran Kothari | #threat-landscape#incident-management#cyber-war+1 |
| 2023-08-06 | Talk | C0c0n |
Survivability in the Cyber World
| Sunil Varkey | #incident-management#risk-management#architecture |
| 2023-05-10 | Talk | Auscert |
Decentralised, multi-stakeholder and non-linear cyber incident response with the Incident Command System
| Pukhraj Singh | #incident-management#soc#threat-intelligence-analysis |
| 2023-05-10 | Talk | Auscert |
Insights into Deakin University’s Data Breach
| Dushyant Sattiraju | #incident-management#data-leak#digital-forensics |
| 2022-09-24 | Panel | C0c0n |
Ransom Trends in India
| Pardhasaradhi Ch, Srikanta Prasad, Jacxine Fernandez, Diwakar Sheoran | #ransomware#data-loss-prevention#incident-management+2 |
| 2022-09-23 | Talk | C0c0n |
A Tale of Credential Leak of a Popular Cloud Threat Actor
| Nitesh Surana | #security-assessment#cloud-pentesting#cloud-workload-protection+2 |
| 2022-09-23 | Talk | C0c0n |
Battle of 300 Crore - how they lost it and got most of it back
| Prashant Choudhary | #incident-management#risk-management#architecture |
| 2022-09-23 | Talk | C0c0n |
Ransomware: Prevention, Early Detection and Response
| Babitha Bp | #ransomware#incident-management#malware-prevention+2 |
| 2022-09-23 | Talk | C0c0n |
Tracking the Bad guys. An interesting story of how the criminal underground operates
| Aarushi Koolwal, Anjana Sathyan | #threat-hunting#incident-management#cyber-crime+4 |
| 2022-09-08 | Talk | Nullcon |
Handling A Bug Bounty program From A Blue Team Perspective
| Ashwath Kumar, Ankit Anurag | #blueteam#cloud-monitoring#cloud-pentesting+4 |
| 2022-09-06 | Panel | Nullcon |
Does your SOC sucks?
| Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan, Yogi Kapur | #security-training#incident-management#alert-fatigue+3 |
| 2022-09-06 | Panel | Nullcon |
Securing India The CERTIn Way
| Saikat Datta, Sanjay Bahl, Ajit Menon, Anuprita Daga | #security-strategy#cybersecurity-framework#incident-management+3 |
| 2022-09-06 | Panel | Nullcon |
Unlocking Security Collaboration With Cyber Threat Intelligence
| Avkash Kathiriya, Varun Singla, Mathan Babu Kasilingam, Amol Naik | #intelligence-sharing#attack-surface#cybersecurity-strategy+1 |
| 2022-08-13 | Panel | Defcon |
Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs
| Niru Ragupathy | #security-development-lifecycle#security-tools#incident-management+2 |
| 2022-05-18 | Panel | Phdays |
Challenges for cybersecurity conferences. Part II
| Aseem Jakhar, Timur Yunusov, Igor Lukic, Dhillon Andrew Kannabhiran | #security-training#cybersecurity-strategy#threat-modeling+3 |
| 2021-11-13 | Talk | C0c0n |
Decoding new age hackers and Criminal Investigation
| Amit Dubey | #incident-management#digital-forensics#reverse-engineering |
| 2021-11-13 | Talk | C0c0n |
A look into cyber-espionage activities targeting critical infrastructure in India
| Saurabh Sharma, Kurt Baumgartner | #ics-security#critical-infrastructure#threat-hunting+1 |
| 2021-11-13 | Talk | C0c0n |
Case Study - Cyber Heist in a Bank and Recovery of Systems and Money
| Prashant Choudhary | #incident-management#forensics#security-assessment |
| 2021-11-13 | Talk | C0c0n |
Case study - E-crime group targeting mobile users
| Rahul Sasi | #incident-management#mobile-hacking#phishing+4 |
| 2021-11-13 | Talk | C0c0n |
Changing Cyber Security Paradigm & Cyber Tsunami
| Sunil Varkey | #cybersecurity-strategy#threat-landscape#risk-management+3 |
| 2021-11-13 | Talk | C0c0n |
Connecting the dots between customers and security teams
| Shruthi Kamath | #incident-management#security-training#devsecops+1 |
| 2021-11-13 | Talk | C0c0n |
Crisis Capitalization in a Pandemic
| Greeshma M R | #risk-management#incident-management#security-training+2 |
| 2021-11-13 | Talk | C0c0n |
Cyber Warfare & Securing Critical Infrastructures
| Faruk Kazi | #critical-infrastructure#ics-security#incident-management+1 |
| 2021-11-13 | Talk | C0c0n |
Emerging trends in cyber crimes : Investigation tools & techniques
| Triveni Singh | #incident-management#digital-forensics#forensics+3 |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | #threat-hunting#threat-detection#threat-modeling+2 |
| 2021-11-13 | Talk | C0c0n |
Painting Your Organizations with Shades of Red, Blue & Purple
| Hidayath Khan | #red-teaming#ethical-hacking#threat-modeling+2 |
| 2021-11-12 | Talk | C0c0n |
2021 Supply Chain Attacks Analysis
| Ajit Hatti | #incident-management#risk-management#supply-chain+1 |
| 2021-11-12 | Panel | C0c0n |
Stopping Breaches with CrowdStrike
| Sandeep Rao | #endpoint-protection#incident-management#security-monitoring+2 |
| 2021-08-08 | Panel | Defcon |
Resilient cyber space: The role of hacker and security communities
| Manu Zacharia, Aseem Jakhar, Abhijith B R, Jay Turla, Omar Santos, Dave Lewis, Dhillon Kannabhiran | #security-training#threat-modeling#incident-management+3 |
| 2021-08-07 | Tool demo | Defcon |
Tenacity- An Adversary Emulation Tool for Persistence
| Atul Nair, Harshal Tupsamudre | #incident-management#security-testing#attack-surface |
| 2021-08-06 | Panel | Defcon |
Adversary simulation, emulation or purple teaming - How would you define it?
| Anant Shrivastava, Vincent Yiu, Martin Ingesen, Jean Marie Bourbon, Samuel Kimmons, Joe Vest | #security-testing#incident-management#red-teaming+3 |
| 2021-08-05 | Talk | Blackhat |
PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors
| Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen | #hardware-embedded#endpoint-protection#incident-management+1 |
| 2020-10-07 | Talk | Rootcon |
Automating Threat Hunting on the Dark Web and other nitty-gritty thingso
| Apurv Singh Gautam | #deep-web#red-teaming#threat-hunting+1 |
| 2020-10-07 | Talk | Rootcon |
Blockchain Based OT Monitoring Solution (BBOTMS)
| Asif Hameed Khan, Gagan Jattana | #ics#blueteam#decentralized-systems+4 |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey, Tal Catran, Yair Feldman | #incident-management#risk-management#cybersecurity-strategy+4 |
| 2020-09-18 | Talk | C0c0n |
Cyber Security Shifts During COVID-19
| Sunil Kanchi | #risk-management#security-training#compliance-governance+1 |
| 2020-08-22 | Talk | Thedianainitiative |
Deploying discreet infrastructure for targeted phishing campaigns
| Sreehari Haridas | #phishing#application-pentesting#social-engineering+3 |
| 2020-08-07 | Panel | Defcon |
D0 N0 H4RM: A Healthcare Security Conversation
| Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft | #data-protection#identity-management#security-training+3 |
| 2020-08-06 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Day 2
| Aanchal Gupta, Kymberlee Price, Rodrigo Rubira Branco, Stefano Zanero | #security-strategy#threat-modeling#cybersecurity-training+2 |
| 2020-08-06 | Tool demo | Blackhat |
MSTICpy: The Security Analysis Swiss Army Knife
| Ashwin Patil, Pete Bryan, Ian Hellen | #digital-forensics#incident-management#data-analytics+3 |
| 2020-07-26 | Talk | Hitbsecconf |
Swapping Asprin Formulas With MDMA While Red Teaming a Billion Dollar Company
| Himanshu Sharma, Aman Sachdev | #red-teaming#application-pentesting#incident-management+2 |
| 2020-03-06 | Tool demo | Nullcon |
Providence
| Swapnil Kumbhar, Akshay Shah | #incident-management#linux#macos+2 |
| 2019-12-04 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | #macos#secure-coding#forensics+1 |
| 2019-12-04 | Tool demo | Blackhat |
RTTM: Real Time Threat Monitoring Tool
| Naveen Rudrappa, Murali Krishna Segu | #blueteam#network-monitoring#security-analytics+2 |
| 2019-10-12 | Talk | Texascybersummit |
TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | #incident-management#threat-hunting#ioc+3 |
| 2019-09-27 | Talk | C0c0n |
RANSOMWARE - to pay or not to pay
| Seshaprakash Kusuma Sreenivasa | #ransomware#incident-management#risk-management |
| 2019-09-27 | Panel | C0c0n |
Shouldn’t Organization disclose breaches - The need for a shared platform
| Sunil Varkey, Jacxine Fernandez, Rahul Sasi, K K Chaudhary | #data-leak#data-protection#security-testing+4 |
| 2019-08-29 | Keynote | Hitbsecconf |
The CISO’s Dilemma
| Saumil Shah | #blueteam#compliance-governance#security-strategy+4 |
| 2019-08-08 | Talk | Blackhat |
Preventing Authentication Bypass: A Tale of Two Researchers
| Ravi Jaiswal, Terry Zhang, Ron Chan | #security-development-lifecycle#identity-management#authentication+4 |
| 2019-08-05 | Tool demo | Blackhat |
CertPivot: Infra-Chaining + Cert-Check
| Ajit Hatti | #incident-management#threat-hunting#ssl+1 |
| 2019-03-28 | Tool demo | Blackhat |
RTS: Real Time Scrapper
| Naveen Rudrappa | #blueteam#application-pentesting#security-monitoring+4 |
| 2019-03-02 | Panel | Nullcon |
Actionable Intelligence and Cyber Security
| Durga Dube, M v Sheshadri, Rahul Sasi, Shrikant Shitole, Alan White | #data-analytics#incident-management#security-analytics+4 |
| 2019-03-01 | Panel | Nullcon |
Breached? – Here is how I responded!
| Muslim Koser, Mrudul Uchil, Sachin Burman, Venkata Satish Guttula, Vijay K Verma | #incident-management#digital-forensics#forensics+1 |
| 2018-10-05 | Talk | C0c0n |
Defending Healthcare Base
| Jiggyasu Sharma | #blueteam#incident-management#security-monitoring+4 |
| 2018-10-04 | Talk | Brucon |
Disrupting the Kill Chain
| Vineet Bhatia | #incident-management#architecture#windows+3 |
| 2018-08-09 | Tool demo | Blackhat |
rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat, Ismael Valenzuela | #incident-management#rest-api#forensics |
| 2018-08-08 | Tool demo | Blackhat |
AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response
| Kshitij Kumar, Jai Musunuri | #macos#secure-coding#forensics+1 |
| 2018-03-03 | Panel | Nullcon |
Forensic Challenges and Road Ahead
| Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov | #data-leak#data-protection#forensics+4 |
| 2018-03-02 | Panel | Nullcon |
Should all ciso promote hall of fame” within their organizations
| Burgess Cooper, Durga Dube, Thom Langford, Harish Pillay | #security-training#cybersecurity-strategy#bug-bounty+1 |
| 2017-08-18 | Talk | C0c0n |
Call Centre Frauds
| Parry Aftab, Betsy Broder | #social-engineering#security-training#risk-management+1 |
| 2017-08-18 | Talk | C0c0n |
Cyber Security Threat Management – Model it, Collect Intelligence and Hunt them!
| Illyas Kooliyankal | #blueteam#cyber-crime#intelligence-sharing+3 |
| 2017-08-18 | Talk | C0c0n |
Hunting the Hunters – Fighting CyberCrime at the Source
| Valan Sivasubramanian | #red-teaming#cybersecurity-strategy#cyber-crime+2 |
| 2017-04-13 | Keynote | Hitbsecconf |
Redefining Defense
| Saumil Shah | #blueteam#security-strategy#incident-management+2 |
| 2017-03-31 | Talk | Blackhat |
WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION
| Monnappa K A | #code-injection#red-teaming#malware-research+4 |
| 2017-03-03 | Talk | Nullcon |
Breach Response - Time to shake up the status quo
| K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpal | #incident-management#risk-management#architecture+1 |
| 2017-03-03 | Talk | Nullcon |
Case Study on RFID (proximity cards) hacking
| Sarwar Jahan, Ashwath Kumar | #rfid#red-teaming#hardware-embedded+4 |
| 2016-10-19 | Talk | Hacklu |
2016: The Infosec Crossroads
| Saumil Shah | #philosophy#security-strategy#incident-management+3 |
| 2016-10-05 | Talk | Virusbulletin |
One-Click Fileless Infection
| Himanshu Anand, Chastine Menrige | #reverse-engineering#incident-management#endpoint-protection+3 |
| 2016-09-14 | Talk | 44con |
2016: The Infosec Crossroads
| Saumil Shah | #blueteam#security-strategy#threat-modeling+4 |
| 2016-08-19 | Talk | C0c0n |
SSD Forensics : A Nightmare for Forensic Investigators
| Santosh Khadsare | #forensics#memory-forensics#incident-management+2 |
| 2016-08-04 | Tool demo | Blackhat |
rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | #incident-management#threat-hunting#ioc+1 |
| 2016-05-17 | Talk | Phdays |
Fingerprinting and Attacking a Healthcare Infrastructure
| Anirudh Duggal | #red-teaming#fingerprinting#ransomware+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Cyber Security in Hospitals:Hospitals Under Seige
| Anirudh Duggal | #hl7#data-protection#incident-management |
| 2015-11-05 | Talk | Groundzerosummit |
Exposing Cyber Espionage: Hello from Pakistan- IIC Session
| Jiten Jain | #incident-management#reverse-engineering#security-assessment |
| 2015-11-05 | Talk | Groundzerosummit |
Authentication flaw in Automatic Bank Passbook printing machine.
| Indrajeet Bhuyan | #authentication#identity-management#application-pentesting+3 |
| 2015-11-05 | Talk | Groundzerosummit |
OSINT Black Magic: Listen who whispers your name in the dark!!!
| Sudhanshu Chauhan, Nutan Kumar Panda | #osint#deep-web#data-leak+4 |
| 2015-10-08 | Talk | Brucon |
The .11 Veil, Camouflage & Covert!!! Invisible Wifi, Revealed
| Rushikesh D Nandedkar, Amrita C Iyer | #wifi#network-pentesting#security-testing+2 |
| 2015-08-09 | Talk | Defcon |
802.11 Monitoring with PCAP2XML/SQLite
| Vivek Ramachandran | #network-forensics#packet-analysis#network-monitoring+3 |
| 2015-03-26 | Talk | Blackhat |
The underground Ecosystem of Credit Card frauds
| Abhinav Singh | #red-teaming#data-leak#identity-theft+1 |
| 2015-03-15 | Talk | Blackhat |
2015 State of Vulnerability Exploits
| Amol Sarwate | #automated-scanning#vulnerability-assessment#risk-management+1 |
| 2015-02-06 | Panel | Nullcon |
2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys
| Shomiron Das Gupta, K S Narayanan, Shantanu Ghosh, Subrahmanya Gupta Boda, Vishal Salvi, Benjamin Rivera | #cyber-crime#incident-management#attack-surface+1 |
| 2015-01-27 | Talk | Owaspappseccalifornia |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | #reverse-engineering#incident-management#architecture |
| 2014-09-28 | Talk | Blackhat |
Understanding IMSI Privacy
| Swapnil Udar, Ravishankar Borgaonkar | #imsi#red-teaming#android+4 |
| 2014-09-18 | Talk | Appsecusa |
Anatomy of memory scraping, credit card stealing POS malware
| Amol Sarwate | #reverse-engineering#memory-forensics#incident-management |
| 2014-08-22 | Talk | C0c0n |
APT: Case Study of attackers targeting public tendering
| Rahul Sasi | #red-teaming#apt#attack-surface+4 |
| 2014-08-22 | Talk | C0c0n |
Hacking Communication
| Akib Sayyed | #red-teaming#network-architecture#social-engineering+1 |
| 2014-08-22 | Talk | C0c0n |
Piracy Tracker
| Vargheese Babu | #blueteam#network-monitoring#security-analytics+3 |
| 2013-11-21 | Talk | Deepsec |
Europe In The Carna Botnet: Telnet’s Threat To The Largest Economy
| Parth Shukla | #botnet#telnet#network-architecture+3 |
| 2013-11-07 | Talk | Groundzerosummit |
Approach to containing the outbreak of malicious information in online social networks
| Sriniketh Vijayaraghavan | #incident-management#social-engineering#phishing+1 |
| 2013-11-07 | Talk | Groundzerosummit |
Setting the Data Center on fire
| Ajit Hatti | #red-teaming#incident-management#security-training+1 |
| 2013-08-01 | Talk | Blackhat |
Hot knives through butter: Bypassing automated analysis systems
| Abhishek Singh, Zheng Bu | #red-teaming#dynamic-analysis#malware-research+1 |
| 2013-03-01 | Talk | Nullcon |
Sensitive Campus Security with Network
| Aravind Sitaraman | #blueteam#network-monitoring#security-strategy+4 |
| 2012-12-01 | Talk | Clubhack |
Real Time Event Recording System, the tool for Digital Forensics Investigation
| Madhav Limaye | #digital-forensics#endpoint-protection#endpoint-hardening+4 |
| 2012-09-29 | Talk | Nullcon |
Next-gen Forensics
| K K Mookhey | #forensics#digital-forensics#incident-management+2 |
| 2012-09-26 | Talk | Nullcon |
Forensics Timeline Analysis
| Aashish Kunte | #forensics#blueteam#digital-forensics+3 |
| 2012-09-26 | Talk | Nullcon |
Nullcon_delhi_2012
| Prasanna Kanagasabai | #ethical-hacking#social-engineering#security-training+1 |
| 2012-07-14 | Talk | Hope |
Advancements in Botnet Attacks and Malware Distribution
| Aditya K Sood | #botnet#web-security#reverse-engineering+1 |
| 2012-02-15 | Talk | Nullcon |
Cyberspace: Global commons or a national asset
| Kamlesh Bajaj | #cyber-law#cybersecurity-framework#incident-management+1 |
| 2011-11-25 | Talk | Malcon |
Exploit the Exploit kits
| Dhruv Soi | #blueteam#exploit-kit#malware-detection+3 |
| 2011-10-07 | Talk | C0c0n |
Digital Evidence
| Sushanth Samudrala | #forensics#digital-forensics#incident-management+2 |
| 2011-09-06 | Talk | Securitybyte |
Using Data Analytics for Incident Response
| Samir Saklikar | #incident-management#data-analytics#security-analytics+3 |
| 2011-03-30 | Talk | Troopers |
Femtocell: Femtostep to the Holy Grail
| Ravishankar Borgaonkar, Kevin Redon | #red-teaming#application-pentesting#mobile-hacking+1 |
| 2011-02-25 | Talk | Nullcon |
Incident Management and Beyond
| Dinesh O Bareja | #incident-management#data-leak#phishing+2 |
| 2011-02-25 | Talk | Nullcon |
Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower
| Hari Krishna Prasad Vemuru | #evm#red-teaming#hardware-embedded+3 |
| 2010-12-04 | Talk | Clubhack |
Mantra – Free and Open Source security framework based on browser platform
| Abhi M Balakrishnan | #blueteam#endpoint-protection#application-pentesting+3 |
| 2010-12-04 | Talk | Clubhack |
Windows Memory Forensic Analysis
| Aashish Kunte | #windows#forensics#memory-forensics+3 |
| 2010-08-01 | Talk | C0c0n |
Concept, Methodology and Challenges in Computer Forensics
| Sebastian Edassery | #forensics#digital-forensics#incident-management+2 |
| 2010-07-01 | Talk | Hitbsecconf |
The Travelling Hacksmith 2009 – 2010
| Saumil Shah | #red-teaming#application-pentesting#phishing+2 |
| 2010-02-25 | Talk | Nullcon |
Botnet mitigation, monitoring and management.
| Harshad Patil | #botnet#blueteam#malware-detection+4 |
| 2009-12-05 | Talk | Clubhack |
Incident Handling and Log Analysis for Web Based Incidents
| Manindra Kishore | #incident-management#forensics#application-pentesting+2 |
| 2009-12-05 | Talk | Clubhack |
Risk Based Penetration Testing
| Nikhil Wagholikar, K K Mookhey | #security-assessment#incident-management#cybersecurity-strategy+1 |
| 2009-11-17 | Talk | Securitybyte |
Behind the scenes at the MSRC
| Suresh Venkateswaran, Dave Midturi | #incident-management#forensics#memory-forensics+1 |
| 2009-11-17 | Talk | Securitybyte |
Business Continuity Case Study
| Venkataram Arabolu | #business-continuity#risk-management#business-resilience+3 |
| 2009-08-06 | Talk | C0c0n |
Cyber Forensics
| Krishna Sastry Pendyal | #forensics#digital-forensics#data-leak+4 |
| 2009-08-06 | Talk | C0c0n |
Cyber Victimisation
| K Jaishankar | #cybersecurity-education#security-training#risk-management+1 |
| 2007-12-09 | Talk | Clubhack |
Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How?
| Chetan Gupta | #forensics#windows#data-loss-prevention+4 |
| 2007-08-02 | Talk | Blackhat |
Smoke ’em Out!
| Rohyt Belani | #forensics#incident-management#digital-forensics+4 |
| 2007-08-02 | Talk | Blackhat |
The Evolution Of Phishing To Organized Crime
| Rohyt Belani | #social-engineering#phishing#threat-modeling+2 |
| 2006-08-02 | Talk | Blackhat |
Web Application Incident Response & Forensics: A Whole New Ball Game!
| Rohyt Belani, Chuck Willis | #application-pentesting#code-review#incident-management+3 |
| 2005-09-29 | Talk | Hitbsecconf |
Trends in Real World Attacks: A Compilation of Case Studies
| Rohyt Belani | #red-teaming#application-pentesting#application-hardening+4 |
| 2004-04-21 | Talk | Cansecwest |
Cisco PSIRT TCP/BGP
| Sharad Ahlawat | #incident-management#forensics#network-forensics |