πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Phishing

Focus Area: πŸ“š Security Awareness
60
Total Entries
74
Contributors

Top Contributors

Lavakumar Kuppan(3) Rohyt Belani(3) Amit Dubey(2) Dinesh O Bareja(2) Himanshu Das(2)

All Entries (60 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-06-02TalkConfidence Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures Video Himanshu Sharma, Rahul Vashista#phishing#red-teaming#mfa+1
2025-03-02PanelNullcon How can organisations protect themselves against Advanced Cyber Threats Bithal Bhardwaj, Vishal Salvi#security-strategy#incident-management#phishing+1
2024-11-16TalkC0c0n Invisible Invaders: Bypassing Email Security with Legitimate Tools Dhruv Bisani#bypassing#phishing#social-engineering+2
2024-11-16TalkC0c0n Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers Nihar Sawant, Jaydev Joshi#ransomware#phishing#supply-chain-security
2024-11-16TalkC0c0n Serverless Phishing Factory: Automate, Attack, Adapt Yash Bharadwaj, Manish Gupta#phishing#serverless#cloud-workload-protection+2
2024-10-23TalkBlackhat Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks Presentation Video Shruti Ranjit, Mangatas Tondang#blueteam#oauth#application-pentesting+4
2023-09-28TalkRootcon Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation Video Raunak Parmar#azure#cloud-pentesting#mfa+4
2023-08-09Tool demoBlackhat AntiSquat - An AI-Powered Phishing Domain Finder Source Code Owais Shaikh, Umair Nehri#ai#ai-security#phishing+2
2023-08-07PanelC0c0n Frictionless Security…Experience Simplified. Video A Shiju Rawther, Maya R Nair, Suresh Sharma, Himanshu Das#security-training#human-factor#behavior-change+3
2023-08-07TalkC0c0n Smart Contract Phishing : Attack & Defense Video Tejaswa Rastogi#smart-contracts#phishing#secure-coding+1
2022-09-23PanelC0c0n Cybersecurity Dissonance: Perception vs Reality Dinesh O Bareja, George Eapen, Jairam Ramesh, Rajesh Hemrajani, Suresh Sharma#cybersecurity-training#phishing#human-factor+1
2022-08-10Tool demoBlackhat Vajra - Your Weapon To Cloud Source Code Raunak Parmar#cloud-pentesting#cloud-security-posture-management#azure+3
2022-05-12Tool demoBlackhat ThunderCloud: Attack Cloud Without Keys! Source Code Shivankar Madaan#aws#cloud-pentesting#phishing
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasi#incident-management#mobile-hacking#phishing+4
2021-11-13PanelC0c0n Human errors & system misconfigurations- We can handle it! Amit Dubey, Maninder Singh, Tulika Pandey, Tal Catran, Dunston Pereira, Angel Redoble#human-factor#security-training#phishing+1
2021-11-12PanelC0c0n Diversity and Inclusion Aarushi Koolwal, Hussaina Begum, Nehal Mehta, Shivani Sharma#security-training#behavior-change#cybersecurity-education+3
2020-10-09TalkShellcon How I Created My Clone Using AI - Next-Gen Social Engineering Video Tamaghna Basu#ai#social-engineering#ai-security+4
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Raval#phishing#blueteam#social-engineering+3
2020-09-18TalkC0c0n Introducing SniperPhish: A Web-Email Spear Phishing Toolkit Source Code Video Sreehari Haridas, Gem George#phishing#application-pentesting#security-development-lifecycle+4
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubey, Tal Catran, Yair Feldman#incident-management#risk-management#cybersecurity-strategy+4
2020-08-22TalkThedianainitiative Deploying discreet infrastructure for targeted phishing campaigns Video Sreehari Haridas#phishing#application-pentesting#social-engineering+3
2020-08-22TalkThedianainitiative Internal Red Team Operations Framework - Building your practical internal Red Team Video Abhijith B R#red-teaming#cyber-war#phishing+3
2020-03-06PanelNullcon Complication in security practices Video Himanshu Das, Neelu Tripathy, Kushal Das, Ankur Bhargava, Vaibhav Gupta#security-training#human-factor#behavior-change+3
2020-03-06Tool demoNullcon Phishing Simulation Source Code Jyoti Raval#phishing#blueteam#security-training+2
2020-03-06Tool demoNullcon spike2kill Source Code Manish Singh#web-scraping#ai-security#nlp+4
2019-09-28TalkRomhack Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it Presentation Video Samit Anwer#oauth#phishing#csrf+2
2019-08-08TalkDefcon Phishing in the cloud era Presentation Ashwin Vamshi, Abhinav Singh#phishing#api-security#web-security+2
2019-02-28TalkNullcon Dirty use of USSD Codes Ravishankar Borgaonkar#ussd#red-teaming#social-engineering+3
2018-03-01TalkNullcon SpotPhish: Zero-Hour Phishing Protection Source Code Video Ganesh Varadarajan#phishing#blueteam#anti-phishing+1
2017-08-18TalkC0c0n Phishing threats to customers and mitigation Bhavin Bhansali#phishing#anti-phishing#social-engineering+2
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thaware#machine-learning#red-teaming#ai-security+3
2017-03-31TalkBlackhat Mobile-Telephony Threats in Asia Presentation Whitepaper Video Payas Gupta, Marco Balduzzi, Lion Gu#red-teaming#social-engineering#phishing+2
2016-08-19TalkC0c0n Evading Corporate Security – You’re as secure as the weakest link Prajwal Panchmahalkar#red-teaming#employee-education#social-engineering+3
2016-08-19TalkC0c0n The Art of Social Hacking Gaurav Trivedi, Rugved Mehta#reconnaissance#social-engineering#phishing+4
2015-11-05TalkGroundzerosummit Browser based Malware attacks Harsh Daftary#red-teaming#keylogging#phishing
2014-11-13TalkGroundzerosummit Identity theft and its impact on Cyber - Warfare Tarun Wig#identity-theft#phishing#social-engineering
2014-09-16TalkDeepsec Advanced Powershell Threat – Lethal Client Side Attacks Presentation Video Nikhil Mittal#powershell#red-teaming#endpoint-protection+4
2014-02-14TalkNullcon In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective} Presentation Video Rushikesh D Nandedkar, Amrita C Iyer#wifi#evil-twin-attack#phishing+1
2013-11-07TalkGroundzerosummit Abusing Google Apps: Google is my command and control center Presentation Ajin Abraham#android#red-teaming#cloud-pentesting+4
2013-11-07TalkGroundzerosummit Approach to containing the outbreak of malicious information in online social networks Sriniketh Vijayaraghavan#incident-management#social-engineering#phishing+1
2013-11-07TalkGroundzerosummit The seven sins of Wi-Fi security Vivek Ramachandran#wifi#network-architecture#phishing+1
2012-08-03TalkC0c0n Security Incidents – Avoiding the Apocalypse in 2012 Ashish Chandra Mishra#blueteam#phishing#social-engineering+1
2011-12-04TalkClubhack Handle Exploitation of Remote System From Email Account Presentation Bhaumik Merchant#red-teaming#phishing#social-engineering
2011-12-04TalkClubhack One Link Facebook Presentation Anand Pandey#red-teaming#application-pentesting#phishing+1
2011-05-19TalkHitbsecconf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Sood#blueteam#botnet#endpoint-protection+4
2011-02-25TalkNullcon Incident Management and Beyond Dinesh O Bareja#incident-management#data-leak#phishing+2
2010-12-04TalkClubhack Ultimate Pen Test – Compromising a highly secure environment Presentation Nikhil Mittal#security-assessment#social-engineering#application-pentesting+4
2010-07-01TalkHitbsecconf The Travelling Hacksmith 2009 – 2010 Saumil Shah#red-teaming#application-pentesting#phishing+2
2010-04-21TalkHitbsecconf Web Security – Going Nowhere? Presentation Saumil Shah#red-teaming#application-hardening#application-pentesting+4
2010-02-25TalkNullcon Imposter ke karnamey: The Browser Phishing Tool. Lavakumar Kuppan#phishing#red-teaming#security-testing+1
2009-12-05TalkClubhack India Cyber Crime Scene - Caught in the Crossfire Presentation Vinoo Thomas, Rahul Mohandas#cyber-crime#data-leak#pdf+3
2009-12-05TalkClubhack Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppan#wifi#red-teaming#phishing+1
2009-11-17TalkSecuritybyte Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppan#wifi#phishing#social-engineering
2009-08-02TalkDefcon Wi-Fish Finder: Who Will Bite the Bait Presentation Video Md Sohail Ahmad, Prabhash Dhyani#wifi#honeypot#phishing+1
2009-07-29TalkBlackhat Psychotronica: Exposure, Control, and Deceit Presentation Nitesh Dhanjani#red-teaming#reconnaissance#social-engineering+3
2008-12-06TalkClubhack AntiSpam - Understanding the good, the bad and the ugly Presentation Aseem Jakhar#blueteam#phishing#anti-phishing+1
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani#phishing#blueteam#network-forensics+2
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belani#social-engineering#phishing#threat-modeling+2
2006-09-21TalkHitbsecconf Smashing the Stack for Profit - Period Presentation Video Rohyt Belani#red-teaming#application-pentesting#code-review+3
2005-09-29TalkHitbsecconf Trends in Real World Attacks: A Compilation of Case Studies Video Rohyt Belani#red-teaming#application-pentesting#application-hardening+4