| 2025-06-02 | Talk | Confidence |
Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures
| Himanshu Sharma, Rahul Vashista | #phishing#red-teaming#mfa+1 |
| 2025-03-02 | Panel | Nullcon |
How can organisations protect themselves against Advanced Cyber Threats
| Bithal Bhardwaj, Vishal Salvi | #security-strategy#incident-management#phishing+1 |
| 2024-11-16 | Talk | C0c0n |
Invisible Invaders: Bypassing Email Security with Legitimate Tools
| Dhruv Bisani | #bypassing#phishing#social-engineering+2 |
| 2024-11-16 | Talk | C0c0n |
Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers
| Nihar Sawant, Jaydev Joshi | #ransomware#phishing#supply-chain-security |
| 2024-11-16 | Talk | C0c0n |
Serverless Phishing Factory: Automate, Attack, Adapt
| Yash Bharadwaj, Manish Gupta | #phishing#serverless#cloud-workload-protection+2 |
| 2024-10-23 | Talk | Blackhat |
Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks
| Shruti Ranjit, Mangatas Tondang | #blueteam#oauth#application-pentesting+4 |
| 2023-09-28 | Talk | Rootcon |
Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation
| Raunak Parmar | #azure#cloud-pentesting#mfa+4 |
| 2023-08-09 | Tool demo | Blackhat |
AntiSquat - An AI-Powered Phishing Domain Finder
| Owais Shaikh, Umair Nehri | #ai#ai-security#phishing+2 |
| 2023-08-07 | Panel | C0c0n |
Frictionless Security…Experience Simplified.
| A Shiju Rawther, Maya R Nair, Suresh Sharma, Himanshu Das | #security-training#human-factor#behavior-change+3 |
| 2023-08-07 | Talk | C0c0n |
Smart Contract Phishing : Attack & Defense
| Tejaswa Rastogi | #smart-contracts#phishing#secure-coding+1 |
| 2022-09-23 | Panel | C0c0n |
Cybersecurity Dissonance: Perception vs Reality
| Dinesh O Bareja, George Eapen, Jairam Ramesh, Rajesh Hemrajani, Suresh Sharma | #cybersecurity-training#phishing#human-factor+1 |
| 2022-08-10 | Tool demo | Blackhat |
Vajra - Your Weapon To Cloud
| Raunak Parmar | #cloud-pentesting#cloud-security-posture-management#azure+3 |
| 2022-05-12 | Tool demo | Blackhat |
ThunderCloud: Attack Cloud Without Keys!
| Shivankar Madaan | #aws#cloud-pentesting#phishing |
| 2021-11-13 | Talk | C0c0n |
Case study - E-crime group targeting mobile users
| Rahul Sasi | #incident-management#mobile-hacking#phishing+4 |
| 2021-11-13 | Panel | C0c0n |
Human errors & system misconfigurations- We can handle it!
| Amit Dubey, Maninder Singh, Tulika Pandey, Tal Catran, Dunston Pereira, Angel Redoble | #human-factor#security-training#phishing+1 |
| 2021-11-12 | Panel | C0c0n |
Diversity and Inclusion
| Aarushi Koolwal, Hussaina Begum, Nehal Mehta, Shivani Sharma | #security-training#behavior-change#cybersecurity-education+3 |
| 2020-10-09 | Talk | Shellcon |
How I Created My Clone Using AI - Next-Gen Social Engineering
| Tamaghna Basu | #ai#social-engineering#ai-security+4 |
| 2020-10-02 | Tool demo | Blackhat |
Phishing Simulation Assessment
| Jyoti Raval | #phishing#blueteam#social-engineering+3 |
| 2020-09-18 | Talk | C0c0n |
Introducing SniperPhish: A Web-Email Spear Phishing Toolkit
| Sreehari Haridas, Gem George | #phishing#application-pentesting#security-development-lifecycle+4 |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey, Tal Catran, Yair Feldman | #incident-management#risk-management#cybersecurity-strategy+4 |
| 2020-08-22 | Talk | Thedianainitiative |
Deploying discreet infrastructure for targeted phishing campaigns
| Sreehari Haridas | #phishing#application-pentesting#social-engineering+3 |
| 2020-08-22 | Talk | Thedianainitiative |
Internal Red Team Operations Framework - Building your practical internal Red Team
| Abhijith B R | #red-teaming#cyber-war#phishing+3 |
| 2020-03-06 | Panel | Nullcon |
Complication in security practices
| Himanshu Das, Neelu Tripathy, Kushal Das, Ankur Bhargava, Vaibhav Gupta | #security-training#human-factor#behavior-change+3 |
| 2020-03-06 | Tool demo | Nullcon |
Phishing Simulation
| Jyoti Raval | #phishing#blueteam#security-training+2 |
| 2020-03-06 | Tool demo | Nullcon |
spike2kill
| Manish Singh | #web-scraping#ai-security#nlp+4 |
| 2019-09-28 | Talk | Romhack |
Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it
| Samit Anwer | #oauth#phishing#csrf+2 |
| 2019-08-08 | Talk | Defcon |
Phishing in the cloud era
| Ashwin Vamshi, Abhinav Singh | #phishing#api-security#web-security+2 |
| 2019-02-28 | Talk | Nullcon |
Dirty use of USSD Codes
| Ravishankar Borgaonkar | #ussd#red-teaming#social-engineering+3 |
| 2018-03-01 | Talk | Nullcon |
SpotPhish: Zero-Hour Phishing Protection
| Ganesh Varadarajan | #phishing#blueteam#anti-phishing+1 |
| 2017-08-18 | Talk | C0c0n |
Phishing threats to customers and mitigation
| Bhavin Bhansali | #phishing#anti-phishing#social-engineering+2 |
| 2017-07-26 | Talk | Blackhat |
Wire Me Through Machine Learning
| Ankit Singh, Vijay Thaware | #machine-learning#red-teaming#ai-security+3 |
| 2017-03-31 | Talk | Blackhat |
Mobile-Telephony Threats in Asia
| Payas Gupta, Marco Balduzzi, Lion Gu | #red-teaming#social-engineering#phishing+2 |
| 2016-08-19 | Talk | C0c0n |
Evading Corporate Security β Youβre as secure as the weakest link
| Prajwal Panchmahalkar | #red-teaming#employee-education#social-engineering+3 |
| 2016-08-19 | Talk | C0c0n |
The Art of Social Hacking
| Gaurav Trivedi, Rugved Mehta | #reconnaissance#social-engineering#phishing+4 |
| 2015-11-05 | Talk | Groundzerosummit |
Browser based Malware attacks
| Harsh Daftary | #red-teaming#keylogging#phishing |
| 2014-11-13 | Talk | Groundzerosummit |
Identity theft and its impact on Cyber - Warfare
| Tarun Wig | #identity-theft#phishing#social-engineering |
| 2014-09-16 | Talk | Deepsec |
Advanced Powershell Threat β Lethal Client Side Attacks
| Nikhil Mittal | #powershell#red-teaming#endpoint-protection+4 |
| 2014-02-14 | Talk | Nullcon |
In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective}
| Rushikesh D Nandedkar, Amrita C Iyer | #wifi#evil-twin-attack#phishing+1 |
| 2013-11-07 | Talk | Groundzerosummit |
Abusing Google Apps: Google is my command and control center
| Ajin Abraham | #android#red-teaming#cloud-pentesting+4 |
| 2013-11-07 | Talk | Groundzerosummit |
Approach to containing the outbreak of malicious information in online social networks
| Sriniketh Vijayaraghavan | #incident-management#social-engineering#phishing+1 |
| 2013-11-07 | Talk | Groundzerosummit |
The seven sins of Wi-Fi security
| Vivek Ramachandran | #wifi#network-architecture#phishing+1 |
| 2012-08-03 | Talk | C0c0n |
Security Incidents β Avoiding the Apocalypse in 2012
| Ashish Chandra Mishra | #blueteam#phishing#social-engineering+1 |
| 2011-12-04 | Talk | Clubhack |
Handle Exploitation of Remote System From Email Account
| Bhaumik Merchant | #red-teaming#phishing#social-engineering |
| 2011-12-04 | Talk | Clubhack |
One Link Facebook
| Anand Pandey | #red-teaming#application-pentesting#phishing+1 |
| 2011-05-19 | Talk | Hitbsecconf |
Spying on SpyEye β What Lies Beneath?
| Aditya K Sood | #blueteam#botnet#endpoint-protection+4 |
| 2011-02-25 | Talk | Nullcon |
Incident Management and Beyond
| Dinesh O Bareja | #incident-management#data-leak#phishing+2 |
| 2010-12-04 | Talk | Clubhack |
Ultimate Pen Test β Compromising a highly secure environment
| Nikhil Mittal | #security-assessment#social-engineering#application-pentesting+4 |
| 2010-07-01 | Talk | Hitbsecconf |
The Travelling Hacksmith 2009 β 2010
| Saumil Shah | #red-teaming#application-pentesting#phishing+2 |
| 2010-04-21 | Talk | Hitbsecconf |
Web Security β Going Nowhere?
| Saumil Shah | #red-teaming#application-hardening#application-pentesting+4 |
| 2010-02-25 | Talk | Nullcon |
Imposter ke karnamey: The Browser Phishing Tool.
| Lavakumar Kuppan | #phishing#red-teaming#security-testing+1 |
| 2009-12-05 | Talk | Clubhack |
India Cyber Crime Scene - Caught in the Crossfire
| Vinoo Thomas, Rahul Mohandas | #cyber-crime#data-leak#pdf+3 |
| 2009-12-05 | Talk | Clubhack |
Lust 2.0 β Desire for free WiFi and the threat of the Imposter
| Lavakumar Kuppan | #wifi#red-teaming#phishing+1 |
| 2009-11-17 | Talk | Securitybyte |
Lust 2.0 β Desire for free WiFi and the threat of the Imposter
| Lavakumar Kuppan | #wifi#phishing#social-engineering |
| 2009-08-02 | Talk | Defcon |
Wi-Fish Finder: Who Will Bite the Bait
| Md Sohail Ahmad, Prabhash Dhyani | #wifi#honeypot#phishing+1 |
| 2009-07-29 | Talk | Blackhat |
Psychotronica: Exposure, Control, and Deceit
| Nitesh Dhanjani | #red-teaming#reconnaissance#social-engineering+3 |
| 2008-12-06 | Talk | Clubhack |
AntiSpam - Understanding the good, the bad and the ugly
| Aseem Jakhar | #blueteam#phishing#anti-phishing+1 |
| 2008-08-06 | Talk | Blackhat |
Bad Sushi: Beating Phishers at Their Own Game
| Nitesh Dhanjani | #phishing#blueteam#network-forensics+2 |
| 2007-08-02 | Talk | Blackhat |
The Evolution Of Phishing To Organized Crime
| Rohyt Belani | #social-engineering#phishing#threat-modeling+2 |
| 2006-09-21 | Talk | Hitbsecconf |
Smashing the Stack for Profit - Period
| Rohyt Belani | #red-teaming#application-pentesting#code-review+3 |
| 2005-09-29 | Talk | Hitbsecconf |
Trends in Real World Attacks: A Compilation of Case Studies
| Rohyt Belani | #red-teaming#application-pentesting#application-hardening+4 |