πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Incident Response

Focus Area: 🚨 Incident Response
68
Total Entries
66
Contributors

Top Contributors

Ajit Hatti(3) Amit Dubey(3) Amol Sarwate(3) Jai Musunuri(2) K K Mookhey(2)

All Entries (68 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat Q-TIP (QR Code Threat Inspection Platform) Rushikesh D Nandedkarincident-responseweb-securityvulnerability-management+2
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Varun Sharma, Ashish Kurmici-cdincident-responsedevsecops+3
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-26TalkBlackhat Critical Exposures: Lessons from a Decade of Vulnerability Research Nikhil Shrivastavavulnerability-managementsql-injectionpentesting+2
2024-08-29TalkHitb Sec Conf COMMSEC: CoralRaider Targets Victims Data and Social Media Accounts Presentation Video Chetan Raghuprasadreverse-engineeringpentestingincident-response
2024-08-29Tool demoHitb Sec Conf eBPFShield Source Code Sagar Bhureidsincident-responsenetwork-monitoring+1
2024-05-07TalkRsac Anatomy of a Vulnerability Response - A View from the Inside Video Mohit Aroravulnerability-managementincident-responserisk-management+1
2024-03-21TalkCan Sec West Rolling in the Dough: How Microsoft Identified and Remidiated a Baker’s Dozen of Security Threats in the Windows DNS Server Arif Hussainvulnerability-managementpentestingsecurity-architecture+1
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanandaptincident-responsethreat-hunting
2023-08-07TalkC0c0n Cyber Threats to Global Financial Systems Video Lince Lawrenceincident-responserisk-management
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubeythreat-huntingdigital-forensicsincident-response+1
2023-08-07TalkC0c0n Evasion Tactics of SideCopy & APT36: Persistently targeting Indian Defense Orgs Video Sathwik RAM Prakkiaptreverse-engineeringincident-response
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K Mincident-responsethreat-huntingsecurity-monitoring+1
2023-08-07TalkC0c0n Trust Resiliency - A Lesson Learned from Russia Ukraine War Video Ajit Hattiincident-responsesecurity-architecturerisk-management+2
2023-08-06TalkC0c0n Cybercrimes Victim Compensation : Legal Remedies and Process Nisheeth Dixitcompliancegovernancerisk-management+1
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhandethreat-huntingdigital-forensicsnetwork-forensics+3
2023-08-06TalkC0c0n Insider Threats - Best Practices and Common Pitfalls Video Georgie Kurieninsider-threatsrisk-managementsecurity-awareness+1
2023-08-06TalkC0c0n Playing cat and mouse with the Adversary: Sometimes a breach is inevitable Video Abhijith B Rincident-responsevulnerability-managementrisk-management
2023-08-06TalkC0c0n Russia-Ukraine Warfare – A Shift in Cyber Threat Landscape Video Jaydev Joshi, Simran Kotharithreat-landscapeincident-responsevulnerability-management
2023-08-06TalkC0c0n Survivability in the Cyber World Video Sunil Varkeyincident-responserisk-managementsecurity-architecture
2022-09-23TalkC0c0n Battle of 300 Crore - how they lost it and got most of it back Prashant Choudharyincident-responsevulnerability-managementrisk-management+1
2022-09-23TalkC0c0n Ransomware: Prevention, Early Detection and Response Babitha Bpransomwareincident-responsevulnerability-management
2022-09-23TalkC0c0n Tracking the Bad guys. An interesting story of how the criminal underground operates Aarushi Koolwal, Anjana Sathyanthreat-huntingincident-response
2021-11-13TalkC0c0n Decoding new age hackers and Criminal Investigation Amit Dubeyincident-responsedigital-forensicsreverse-engineering
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharmaindustrial-control-systems-securitycritical-infrastructurethreat-hunting+1
2021-11-13TalkC0c0n Case Study - Cyber Heist in a Bank and Recovery of Systems and Money Prashant Choudharyincident-responseforensicsrecovery+1
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasimobile-securityincident-responsevulnerability-management
2021-11-13TalkC0c0n Changing Cyber Security Paradigm & Cyber Tsunami Sunil Varkeycybersecurity-strategiesthreat-landscaperisk-management+4
2021-11-13TalkC0c0n Connecting the dots between customers and security teams Shruthi Kamathincident-responsesecurity-awarenessdevsecops+1
2021-11-13TalkC0c0n Crisis Capitalization in a Pandemic Greeshma M Rrisk-managementincident-responsesecurity-awareness+3
2021-11-13TalkC0c0n Cyber Warfare & Securing Critical Infrastructures Faruk Kazicritical-infrastructureindustrial-control-systems-securityincident-response+1
2021-11-13TalkC0c0n Emerging trends in cyber crimes : Investigation tools & techniques Triveni Singhincident-responsevulnerability-managementdigital-forensics
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyanithreat-huntingthreat-detectionthreat_modeling+2
2021-11-13TalkC0c0n Painting Your Organizations with Shades of Red, Blue & Purple Video Hidayath Khanred-teamingethical-hackingthreat_modeling+2
2021-11-12TalkC0c0n 2021 Supply Chain Attacks Analysis Ajit Hattivulnerability-managementincident-responserisk-management+2
2021-08-07Tool demoDefcon Tenacity- An Adversary Emulation Tool for Persistence Video Atul Nair, Harshal Tupsamudreincident-responsevulnerability-management
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubeyincident-responserisk-management
2020-09-18TalkC0c0n Cyber Security Shifts During COVID-19 Video Sunil Kanchirisk-managementsecurity-awarenesscompliance-governance+1
2020-08-06Tool demoBlackhat MSTICpy: The Security Analysis Swiss Army Knife Source Code Ashwin Patildata-forensicsincident-response
2020-03-06Tool demoNullcon Providence Source Code Swapnil Kumbhar, Akshay Shahincident-responselinuxmacos+2
2019-12-04Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Kshitij Kumar, Jai Musunurimacossecure-codingforensic+1
2019-10-12TalkTexas Cyber Summit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Sudheendra Bhatincident-responsethreat-huntingioc+3
2019-09-27TalkC0c0n RANSOMWARE - to pay or not to pay Seshaprakash Kusuma Sreenivasaransomwareincident-responserisk-management
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hattiincident-responsethreat-hunting
2018-10-04TalkBrucon Disrupting the Kill Chain Video Vineet Bhatiaincident-responsevulnerability-managementsecurity-architecture
2018-08-09Tool demoBlackhat rastrea2r (reloaded!): Collecting & Hunting for IOCs with Gusto and Style Presentation Source Code Sudheendra Bhatincident-responserest-apiforensic
2018-08-08Tool demoBlackhat AutoMacTC: Finding Worms in Apple Orchards - Using AutoMacTC for macOS Incident Response Kshitij Kumar, Jai Musunurimacossecure-codingforensic+1
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftabsocial-engineeringsecurity-awarenessrisk-management+1
2017-08-18TalkC0c0n Cyber bullying-Screen the Mean Nitin Awade, Surjata Awadesecurity-awarenessincident-responsedigital-forensics
2017-03-03TalkNullcon Breach Response - Time to shake up the status quo Video K K Mookhey, Pranesh Prakash, Sahir Hidayatullah, Shobha Jagathpalincident-responsevulnerability-managementrisk-management+2
2016-10-05TalkVirus Bulletin One-Click Fileless Infection Presentation Whitepaper Video Himanshu Anandreverse-engineeringincident-responsevulnerability-management
2015-11-05TalkGround Zero Summit Exposing Cyber Espionage: Hello from Pakistan- IIC Session Jiten Jainincident-responsereverse-engineeringpentesting
2015-08-09TalkDefcon 802.11 Monitoring with PCAP2XML/SQLite Video Vivek Ramachandrannetwork-forensicspacket-analysisnetwork-monitoring+3
2015-03-15TalkBlackhat 2015 State of Vulnerability Exploits Presentation Video Amol Sarwatevulnerability-managementautomated-scanningvulnerability-assessment+2
2015-01-27TalkOwasp App Sec California Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringvulnerability-managementincident-response+1
2014-09-18TalkApp Sec Usa Anatomy of memory scraping, credit card stealing POS malware Video Amol Sarwatereverse-engineeringmemory-forensicsincident-response+1
2013-11-07TalkGround Zero Summit Approach to containing the outbreak of malicious information in online social networks Sriniketh Vijayaraghavanincident-responsesocial-engineering
2012-09-29TalkNullcon Next-gen Forensics K K Mookheyforensicsdigital-forensicsincident-response+2
2012-07-14TalkHope Advancements in Botnet Attacks and Malware Distribution Video Aditya K Soodmalwarebotnetweb-security+2
2011-09-06TalkSecuritybyte Using Data Analytics for Incident Response Presentation Samir Saklikarincident-responsedata-analytics
2011-02-25TalkNullcon Incident Management and Beyond Dinesh O Barejaincident-responseincident-management
2009-12-05TalkClubhack Incident Handling and Log Analysis for Web Based Incidents Presentation Manindra Kishoreincident-responseforensic
2009-11-17TalkSecuritybyte Behind the scenes at the MSRC Presentation Suresh Venkateswaranincident-responseforensic
2009-11-17TalkSecuritybyte Business Continuity Case Study Venkataram Arabolubusiness-continuityrisk-managementbusiness-resilience+3
2009-08-06TalkC0c0n Cyber Victimisation K Jaishankarcybersecurity-educationsecurity-awarenessrisk-management+2
2007-08-02TalkBlackhat Smoke ’em Out! Presentation Whitepaper Rohyt Belaniforensicincident-response
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belanisocial-engineeringphishingthreat_modeling+2
2004-04-21TalkCan Sec West Cisco PSIRT TCP/BGP Sharad Ahlawatincident-responseforensic