| 2025-03-01 | Panel | Nullcon |
Bug Bounties 2.0 : AI, Automation, and the Future of Ethical Hacking
| Krishna Pandey | #ai-security#ai#ml+1 |
| 2025-03-01 | Panel | Nullcon |
Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense
| Ajit Hatti, Varun Singla | #ai-security#zero-trust#ai+3 |
| 2025-03-01 | Talk | Nullcon |
MLOps Under Attack: Threat Modeling Modern AI Systems
| Sandeep Singh | #ai#ml#ai-security+4 |
| 2024-10-29 | Talk | Blackhat |
Hacking Deepfake Image Detection System with White and Black Box Attacks
| Sagar Bhure | #deepfake#ai-security#deep-learning+4 |
| 2024-08-07 | Tool demo | Blackhat |
Hacking generative AI with PyRIT
| Raja Sekhar Rao Dheekonda | #ai#ai-security#machine-learning+4 |
| 2023-09-23 | Panel | Nullcon |
WEAPONIZATION OF AI WITH SPECIAL REFERENCE TO GEN-AI
| Rahul Neel Mani, Manish Tiwari, Yogesh Kulkarni, Ambarish Kumar Singh, Alan J White | #ai-security#deepfake#ml+1 |
| 2023-08-25 | Talk | Hitbsecconf |
Breaking ML Services: Finding 0-days in Azure Machine Learning
| Nitesh Surana | #machine-learning#cloud-access-security-broker#cloud-compliance+4 |
| 2022-08-10 | Tool demo | Blackhat |
ReconPal: Leveraging NLP for Infosec
| Jeswin Mathai, Shantanu Kale, Sherin Stephen | #reconnaissance#ai-security#nlp+3 |
| 2022-05-12 | Tool demo | Blackhat |
ReconPal: Leveraging NLP for Infosec
| Jeswin Mathai, Shantanu Kale, Sherin Stephen | #reconnaissance#ai-security#nlp+4 |
| 2021-10-08 | Keynote | Shellcon |
Keynote - Advanced Application of Adversarial AI for Scenario Based Hacking
| Tamaghna Basu | #ai#ai-security#deep-learning+4 |
| 2021-08-05 | Talk | Blackhat |
The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks
| Ambrish Rawat, Killian Levacher, Mathieu Sinn | #ai#ai-security#deep-learning+4 |
| 2021-08-04 | Tool demo | Blackhat |
Counterfit: Attacking Machine Learning in Blackbox Settings
| Raja Sekhar Rao Dheekonda, Will Pearce | #vulnerability-assessment#ai-security#machine-learning+2 |
| 2021-08-04 | Talk | Blackhat |
Siamese Neural Networks for Detecting Brand Impersonation
| Jugal Parikh, Nitin Kumar Goel, Justin Grana, Yuchao Dai | #impersonation#ai-security#deep-learning+4 |
| 2020-08-06 | Tool demo | Blackhat |
MSTICpy: The Security Analysis Swiss Army Knife
| Ashwin Patil, Pete Bryan, Ian Hellen | #digital-forensics#incident-management#data-analytics+3 |
| 2020-03-06 | Talk | Nullcon |
InfoSec Deep Learning in Action
| Satnam Singh | #ml#deep-learning#blueteam |
| 2019-03-28 | Tool demo | Blackhat |
MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research
| Nilaksh Das, Evan Yang, Li Chen | #machine-learning#blueteam#ai-security+4 |
| 2019-03-01 | Panel | Nullcon |
Cybersecurity: Is Machine Learning the Answer?
| Rahul Sasi, Sitesh Behera, Sumeet Khokhani, Rui Bastos | #ai-security#machine-learning#ml |
| 2018-11-27 | Talk | Hitbsecconf |
COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding
| Vikash Yadav | #deep-learning#blueteam#ai-security+3 |
| 2018-10-05 | Talk | C0c0n |
How can we use machine learning to prevent Frauds and password breaches
| Tamaghna Basu | #machine-learning#blueteam#ai-security+4 |
| 2018-10-05 | Talk | C0c0n |
Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security?
| Roshy John | #risk-management#architecture#ai-security+2 |
| 2018-08-09 | Talk | Blackhat |
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks
| Jugal Parikh, Randy Treit, Holly Stewart | #blueteam#ai-security#machine-learning+4 |
| 2017-08-18 | Talk | C0c0n |
Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis
| Furqan Khan, Siddharth Anbalahan | #machine-learning#security-assessment#nlp+4 |
| 2017-03-03 | Talk | Nullcon |
Tale of training a Web Terminator!
| Bharadwaj Machiraju | #ml#security-assessment#application-pentesting+4 |
| 2016-03-11 | Talk | Nullcon |
Making Machines think about security for fun and profit
| Rahul Sasi | #blueteam#ml#application-pentesting+4 |
| 2013-09-27 | Talk | C0c0n |
The Art and Science of Anamoly based Vulnerability Detection
| Lavakumar Kuppan | #blueteam#security-analytics#automated-scanning+2 |