🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Social Engineering

Focus Areas: 🎯 Penetration Testing 📚 Security Awareness
62
Total Entries
83
Contributors

Top Contributors

Saumil Shah(4) Amit Dubey(3) Rahul Sasi(3) Tamaghna Basu(3) A Shiju Rawther(2)

All Entries (62 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-06-02TalkConfidence Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures Video Himanshu Sharma, Rahul Vashista#phishing#red-teaming#mfa+1
2025-03-02PanelNullcon How can organisations protect themselves against Advanced Cyber Threats Bithal Bhardwaj, Vishal Salvi#security-strategy#incident-management#phishing+1
2024-11-16TalkC0c0n Invisible Invaders: Bypassing Email Security with Legitimate Tools Dhruv Bisani#bypassing#phishing#social-engineering+2
2023-08-07PanelC0c0n Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair#security-strategy#threat-modeling#security-training+3
2023-08-07PanelC0c0n Frictionless Security…Experience Simplified. Video A Shiju Rawther, Maya R Nair, Suresh Sharma, Himanshu Das#security-training#human-factor#behavior-change+3
2023-08-06PanelC0c0n nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan#security-strategy#cybersecurity-framework#cyber-resilience+2
2022-12-08PanelBlackhat Locknote: Conclusions and Key Takeaways from Day 2 Anant Shrivastava, Jeff Moss, Jiska Classen, Leigh Anney Galloway, Federico Maggi#security-strategy#threat-modeling#cybersecurity-training+2
2022-09-24TalkC0c0n BEC, still the sure shot trap Georgie Kurien#social-engineering#security-assessment#security-training
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoor#social-engineering#security-training#threat-hunting+1
2022-09-23PanelC0c0n Cybersecurity Dissonance: Perception vs Reality Dinesh O Bareja, George Eapen, Jairam Ramesh, Rajesh Hemrajani, Suresh Sharma#cybersecurity-training#phishing#human-factor+1
2022-08-25TalkHitbsecconf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Video Rahul Sasi, Vishal Singh#social-engineering#security-assessment#botnet+1
2021-11-13TalkC0c0n Case study - E-crime group targeting mobile users Rahul Sasi#incident-management#mobile-hacking#phishing+4
2021-11-13PanelC0c0n Human errors & system misconfigurations- We can handle it! Amit Dubey, Maninder Singh, Tulika Pandey, Tal Catran, Dunston Pereira, Angel Redoble#human-factor#security-training#phishing+1
2021-11-12TalkC0c0n “Let’s Go Phishing”: Discerning the insidious nature of Social Engineering Ruchira Pokhriyal, Shashi Karhail#social-engineering#security-assessment#security-training
2021-11-12PanelC0c0n Diversity and Inclusion Aarushi Koolwal, Hussaina Begum, Nehal Mehta, Shivani Sharma#security-training#behavior-change#cybersecurity-education+3
2021-11-12TalkC0c0n Understanding the Psychology Behind Threats - adding Twists to your Turns Saman Fatima#threat-modeling#security-training#human-factor+1
2020-10-09TalkShellcon How I Created My Clone Using AI - Next-Gen Social Engineering Video Tamaghna Basu#ai#social-engineering#ai-security+4
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Raval#phishing#blueteam#social-engineering+3
2020-10-01TalkBlackhat Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community Presentation Video Vandana Verma Sehgal#security-training#cybersecurity-education#social-engineering+1
2020-09-18TalkC0c0n How I created my clone using AI - next-gen Social Engineering Video Tamaghna Basu#ai#impersonation#ai-security+3
2020-09-18TalkC0c0n COVID-19 Cyber impact on financial sector and remote employees Video Amit Dubey, Tal Catran, Yair Feldman#incident-management#risk-management#cybersecurity-strategy+4
2020-08-22TalkThedianainitiative Deploying discreet infrastructure for targeted phishing campaigns Video Sreehari Haridas#phishing#application-pentesting#social-engineering+3
2020-08-06TalkBlackhat How I Created My Clone Using AI - Next-Gen Social Engineering Presentation Video Tamaghna Basu#ai#social-engineering#impersonation
2020-08-06TalkBlackhat Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community Presentation Video Vandana Verma Sehgal#security-training#cybersecurity-strategy#social-engineering
2020-03-06PanelNullcon Complication in security practices Video Himanshu Das, Neelu Tripathy, Kushal Das, Ankur Bhargava, Vaibhav Gupta#security-training#human-factor#behavior-change+3
2020-03-06Tool demoNullcon Phishing Simulation Source Code Jyoti Raval#phishing#blueteam#security-training+2
2020-03-06PanelNullcon Securing the Human Factor Video Rahul Neel Mani, Phoram Mehta, Burgess Cooper, Manish Tiwari, Venkatesh Subramaniam#human-factor#security-training#social-engineering+3
2019-02-28TalkNullcon Dirty use of USSD Codes Ravishankar Borgaonkar#ussd#red-teaming#social-engineering+3
2018-10-05TalkC0c0n Artificial Intelligence and Social Media Analytics in Criminal Investigation Amit Dubey#ai#ai-security#nlp+3
2017-08-18TalkC0c0n Phishing threats to customers and mitigation Bhavin Bhansali#phishing#anti-phishing#social-engineering+2
2017-08-18TalkC0c0n Call Centre Frauds Parry Aftab, Betsy Broder#social-engineering#security-training#risk-management+1
2017-08-18TalkC0c0n OSINT and Privacy Rohit Srivastwa#osint#data-leak#surveillance+4
2017-07-26Tool demoBlackhat Datasploit - Automated Open Source Intelligence (OSINT) Tool Source Code Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan#osint#reconnaissance#social-engineering+4
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thaware#machine-learning#red-teaming#ai-security+3
2017-03-31TalkBlackhat Mobile-Telephony Threats in Asia Presentation Whitepaper Video Payas Gupta, Marco Balduzzi, Lion Gu#red-teaming#social-engineering#phishing+2
2016-08-19TalkC0c0n Evading Corporate Security – You’re as secure as the weakest link Prajwal Panchmahalkar#red-teaming#employee-education#social-engineering+3
2016-08-19TalkC0c0n The Art of Social Hacking Gaurav Trivedi, Rugved Mehta#reconnaissance#social-engineering#phishing+4
2014-11-13TalkGroundzerosummit Identity theft and its impact on Cyber - Warfare Tarun Wig#identity-theft#phishing#social-engineering
2014-08-22TalkC0c0n APT: Case Study of attackers targeting public tendering Rahul Sasi#red-teaming#apt#attack-surface+4
2014-08-22TalkC0c0n Hacking Communication Akib Sayyed#red-teaming#network-architecture#social-engineering+1
2014-08-07TalkBlackhat Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies Presentation Whitepaper Video Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun#reconnaissance#social-engineering#blueteam
2013-11-07TalkGroundzerosummit Abusing Google Apps: Google is my command and control center Presentation Ajin Abraham#android#red-teaming#cloud-pentesting+4
2013-11-07TalkGroundzerosummit Approach to containing the outbreak of malicious information in online social networks Sriniketh Vijayaraghavan#incident-management#social-engineering#phishing+1
2013-11-07TalkGroundzerosummit The seven sins of Wi-Fi security Vivek Ramachandran#wifi#network-architecture#phishing+1
2012-09-26TalkNullcon Nullcon_delhi_2012 Presentation Source Code Prasanna Kanagasabai#ethical-hacking#social-engineering#security-training+1
2012-08-03TalkC0c0n Layer 8 Exploitation: A threat to National Security Aakash Goel#social-engineering#security-assessment#security-training+1
2012-08-03TalkC0c0n Security Incidents – Avoiding the Apocalypse in 2012 Ashish Chandra Mishra#blueteam#phishing#social-engineering+1
2011-12-04TalkClubhack Handle Exploitation of Remote System From Email Account Presentation Bhaumik Merchant#red-teaming#phishing#social-engineering
2011-12-04TalkClubhack One Link Facebook Presentation Anand Pandey#red-teaming#application-pentesting#phishing+1
2011-09-06TalkSecuritybyte Security Threats on Social Networks Presentation Nithya Raman#social-engineering#web-security#security-training+1
2011-02-25TalkNullcon Hacking the Parliament – A classic Social Engineering attack Anurag Dhanda#social-engineering#reconnaissance#security-strategy+2
2011-02-25TalkNullcon Lessons Learned From 2010 Presentation Video Saumil Shah#red-teaming#exploit-delivery#social-engineering+2
2010-12-04TalkClubhack Ultimate Pen Test – Compromising a highly secure environment Presentation Nikhil Mittal#security-assessment#social-engineering#application-pentesting+4
2010-07-01TalkHitbsecconf The Travelling Hacksmith 2009 – 2010 Saumil Shah#red-teaming#application-pentesting#phishing+2
2010-04-21TalkHitbsecconf Web Security – Going Nowhere? Presentation Saumil Shah#red-teaming#application-hardening#application-pentesting+4
2009-11-17TalkSecuritybyte Lust 2.0 – Desire for free WiFi and the threat of the Imposter Presentation Lavakumar Kuppan#wifi#phishing#social-engineering
2009-10-07TalkHitbsecconf How to Own the World – One Desktop at a Time Presentation Video Saumil Shah#social-engineering#red-teaming#firewall
2009-07-29TalkBlackhat Psychotronica: Exposure, Control, and Deceit Presentation Nitesh Dhanjani#red-teaming#reconnaissance#social-engineering+3
2008-12-06TalkClubhack AntiSpam - Understanding the good, the bad and the ugly Presentation Aseem Jakhar#blueteam#phishing#anti-phishing+1
2008-08-06TalkBlackhat Bad Sushi: Beating Phishers at Their Own Game Presentation Video Nitesh Dhanjani#phishing#blueteam#network-forensics+2
2008-03-28TalkBlackhat Spam-Evolution Whitepaper Aseem Jakhar#social-engineering#malware-detection#anti-phishing
2007-08-02TalkBlackhat The Evolution Of Phishing To Organized Crime Video Rohyt Belani#social-engineering#phishing#threat-modeling+2