| 2025-06-02 | Talk | Confidence |
Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures
| Himanshu Sharma, Rahul Vashista | #phishing#red-teaming#mfa+1 |
| 2025-03-02 | Panel | Nullcon |
How can organisations protect themselves against Advanced Cyber Threats
| Bithal Bhardwaj, Vishal Salvi | #security-strategy#incident-management#phishing+1 |
| 2024-11-16 | Talk | C0c0n |
Invisible Invaders: Bypassing Email Security with Legitimate Tools
| Dhruv Bisani | #bypassing#phishing#social-engineering+2 |
| 2023-08-07 | Panel | C0c0n |
Evolving Threat Landscape: Strategies for Adapting and Innovating in Cybersecurity
| Vikas Arora, Sanjay Singh, Baidyanath Kumar, Saurabh Gugnani, Gokulavan Jayaraman, Vijay Nair | #security-strategy#threat-modeling#security-training+3 |
| 2023-08-07 | Panel | C0c0n |
Frictionless Security…Experience Simplified.
| A Shiju Rawther, Maya R Nair, Suresh Sharma, Himanshu Das | #security-training#human-factor#behavior-change+3 |
| 2023-08-06 | Panel | C0c0n |
nGen Cyber Threats - 2024 and Beyond: Embracing Chaos, Taking Charge
| Murli Nambiar, A Shiju Rawther, Jacxine Fernandez, Vishal Salvi, Sridhar Govardhan | #security-strategy#cybersecurity-framework#cyber-resilience+2 |
| 2022-12-08 | Panel | Blackhat |
Locknote: Conclusions and Key Takeaways from Day 2
| Anant Shrivastava, Jeff Moss, Jiska Classen, Leigh Anney Galloway, Federico Maggi | #security-strategy#threat-modeling#cybersecurity-training+2 |
| 2022-09-24 | Talk | C0c0n |
BEC, still the sure shot trap
| Georgie Kurien | #social-engineering#security-assessment#security-training |
| 2022-09-24 | Talk | C0c0n |
Weaponising Social Media for Psychological Operations
| A a Gafoor | #social-engineering#security-training#threat-hunting+1 |
| 2022-09-23 | Panel | C0c0n |
Cybersecurity Dissonance: Perception vs Reality
| Dinesh O Bareja, George Eapen, Jairam Ramesh, Rajesh Hemrajani, Suresh Sharma | #cybersecurity-training#phishing#human-factor+1 |
| 2022-08-25 | Talk | Hitbsecconf |
Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle
| Rahul Sasi, Vishal Singh | #social-engineering#security-assessment#botnet+1 |
| 2021-11-13 | Talk | C0c0n |
Case study - E-crime group targeting mobile users
| Rahul Sasi | #incident-management#mobile-hacking#phishing+4 |
| 2021-11-13 | Panel | C0c0n |
Human errors & system misconfigurations- We can handle it!
| Amit Dubey, Maninder Singh, Tulika Pandey, Tal Catran, Dunston Pereira, Angel Redoble | #human-factor#security-training#phishing+1 |
| 2021-11-12 | Talk | C0c0n |
“Let’s Go Phishing”: Discerning the insidious nature of Social Engineering
| Ruchira Pokhriyal, Shashi Karhail | #social-engineering#security-assessment#security-training |
| 2021-11-12 | Panel | C0c0n |
Diversity and Inclusion
| Aarushi Koolwal, Hussaina Begum, Nehal Mehta, Shivani Sharma | #security-training#behavior-change#cybersecurity-education+3 |
| 2021-11-12 | Talk | C0c0n |
Understanding the Psychology Behind Threats - adding Twists to your Turns
| Saman Fatima | #threat-modeling#security-training#human-factor+1 |
| 2020-10-09 | Talk | Shellcon |
How I Created My Clone Using AI - Next-Gen Social Engineering
| Tamaghna Basu | #ai#social-engineering#ai-security+4 |
| 2020-10-02 | Tool demo | Blackhat |
Phishing Simulation Assessment
| Jyoti Raval | #phishing#blueteam#social-engineering+3 |
| 2020-10-01 | Talk | Blackhat |
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community
| Vandana Verma Sehgal | #security-training#cybersecurity-education#social-engineering+1 |
| 2020-09-18 | Talk | C0c0n |
How I created my clone using AI - next-gen Social Engineering
| Tamaghna Basu | #ai#impersonation#ai-security+3 |
| 2020-09-18 | Talk | C0c0n |
COVID-19 Cyber impact on financial sector and remote employees
| Amit Dubey, Tal Catran, Yair Feldman | #incident-management#risk-management#cybersecurity-strategy+4 |
| 2020-08-22 | Talk | Thedianainitiative |
Deploying discreet infrastructure for targeted phishing campaigns
| Sreehari Haridas | #phishing#application-pentesting#social-engineering+3 |
| 2020-08-06 | Talk | Blackhat |
How I Created My Clone Using AI - Next-Gen Social Engineering
| Tamaghna Basu | #ai#social-engineering#impersonation |
| 2020-08-06 | Talk | Blackhat |
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community
| Vandana Verma Sehgal | #security-training#cybersecurity-strategy#social-engineering |
| 2020-03-06 | Panel | Nullcon |
Complication in security practices
| Himanshu Das, Neelu Tripathy, Kushal Das, Ankur Bhargava, Vaibhav Gupta | #security-training#human-factor#behavior-change+3 |
| 2020-03-06 | Tool demo | Nullcon |
Phishing Simulation
| Jyoti Raval | #phishing#blueteam#security-training+2 |
| 2020-03-06 | Panel | Nullcon |
Securing the Human Factor
| Rahul Neel Mani, Phoram Mehta, Burgess Cooper, Manish Tiwari, Venkatesh Subramaniam | #human-factor#security-training#social-engineering+3 |
| 2019-02-28 | Talk | Nullcon |
Dirty use of USSD Codes
| Ravishankar Borgaonkar | #ussd#red-teaming#social-engineering+3 |
| 2018-10-05 | Talk | C0c0n |
Artificial Intelligence and Social Media Analytics in Criminal Investigation
| Amit Dubey | #ai#ai-security#nlp+3 |
| 2017-08-18 | Talk | C0c0n |
Phishing threats to customers and mitigation
| Bhavin Bhansali | #phishing#anti-phishing#social-engineering+2 |
| 2017-08-18 | Talk | C0c0n |
Call Centre Frauds
| Parry Aftab, Betsy Broder | #social-engineering#security-training#risk-management+1 |
| 2017-08-18 | Talk | C0c0n |
OSINT and Privacy
| Rohit Srivastwa | #osint#data-leak#surveillance+4 |
| 2017-07-26 | Tool demo | Blackhat |
Datasploit - Automated Open Source Intelligence (OSINT) Tool
| Kunal Aggarwal, Shubham Mittal, Sudhanshu Chauhan | #osint#reconnaissance#social-engineering+4 |
| 2017-07-26 | Talk | Blackhat |
Wire Me Through Machine Learning
| Ankit Singh, Vijay Thaware | #machine-learning#red-teaming#ai-security+3 |
| 2017-03-31 | Talk | Blackhat |
Mobile-Telephony Threats in Asia
| Payas Gupta, Marco Balduzzi, Lion Gu | #red-teaming#social-engineering#phishing+2 |
| 2016-08-19 | Talk | C0c0n |
Evading Corporate Security – You’re as secure as the weakest link
| Prajwal Panchmahalkar | #red-teaming#employee-education#social-engineering+3 |
| 2016-08-19 | Talk | C0c0n |
The Art of Social Hacking
| Gaurav Trivedi, Rugved Mehta | #reconnaissance#social-engineering#phishing+4 |
| 2014-11-13 | Talk | Groundzerosummit |
Identity theft and its impact on Cyber - Warfare
| Tarun Wig | #identity-theft#phishing#social-engineering |
| 2014-08-22 | Talk | C0c0n |
APT: Case Study of attackers targeting public tendering
| Rahul Sasi | #red-teaming#apt#attack-surface+4 |
| 2014-08-22 | Talk | C0c0n |
Hacking Communication
| Akib Sayyed | #red-teaming#network-architecture#social-engineering+1 |
| 2014-08-07 | Talk | Blackhat |
Lifecycle of a phone fraudster: Exposing fraud activity from reconnaissance to takeover using graph analysis and acoustical anomalies
| Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun | #reconnaissance#social-engineering#blueteam |
| 2013-11-07 | Talk | Groundzerosummit |
Abusing Google Apps: Google is my command and control center
| Ajin Abraham | #android#red-teaming#cloud-pentesting+4 |
| 2013-11-07 | Talk | Groundzerosummit |
Approach to containing the outbreak of malicious information in online social networks
| Sriniketh Vijayaraghavan | #incident-management#social-engineering#phishing+1 |
| 2013-11-07 | Talk | Groundzerosummit |
The seven sins of Wi-Fi security
| Vivek Ramachandran | #wifi#network-architecture#phishing+1 |
| 2012-09-26 | Talk | Nullcon |
Nullcon_delhi_2012
| Prasanna Kanagasabai | #ethical-hacking#social-engineering#security-training+1 |
| 2012-08-03 | Talk | C0c0n |
Layer 8 Exploitation: A threat to National Security
| Aakash Goel | #social-engineering#security-assessment#security-training+1 |
| 2012-08-03 | Talk | C0c0n |
Security Incidents – Avoiding the Apocalypse in 2012
| Ashish Chandra Mishra | #blueteam#phishing#social-engineering+1 |
| 2011-12-04 | Talk | Clubhack |
Handle Exploitation of Remote System From Email Account
| Bhaumik Merchant | #red-teaming#phishing#social-engineering |
| 2011-12-04 | Talk | Clubhack |
One Link Facebook
| Anand Pandey | #red-teaming#application-pentesting#phishing+1 |
| 2011-09-06 | Talk | Securitybyte |
Security Threats on Social Networks
| Nithya Raman | #social-engineering#web-security#security-training+1 |
| 2011-02-25 | Talk | Nullcon |
Hacking the Parliament – A classic Social Engineering attack
| Anurag Dhanda | #social-engineering#reconnaissance#security-strategy+2 |
| 2011-02-25 | Talk | Nullcon |
Lessons Learned From 2010
| Saumil Shah | #red-teaming#exploit-delivery#social-engineering+2 |
| 2010-12-04 | Talk | Clubhack |
Ultimate Pen Test – Compromising a highly secure environment
| Nikhil Mittal | #security-assessment#social-engineering#application-pentesting+4 |
| 2010-07-01 | Talk | Hitbsecconf |
The Travelling Hacksmith 2009 – 2010
| Saumil Shah | #red-teaming#application-pentesting#phishing+2 |
| 2010-04-21 | Talk | Hitbsecconf |
Web Security – Going Nowhere?
| Saumil Shah | #red-teaming#application-hardening#application-pentesting+4 |
| 2009-11-17 | Talk | Securitybyte |
Lust 2.0 – Desire for free WiFi and the threat of the Imposter
| Lavakumar Kuppan | #wifi#phishing#social-engineering |
| 2009-10-07 | Talk | Hitbsecconf |
How to Own the World – One Desktop at a Time
| Saumil Shah | #social-engineering#red-teaming#firewall |
| 2009-07-29 | Talk | Blackhat |
Psychotronica: Exposure, Control, and Deceit
| Nitesh Dhanjani | #red-teaming#reconnaissance#social-engineering+3 |
| 2008-12-06 | Talk | Clubhack |
AntiSpam - Understanding the good, the bad and the ugly
| Aseem Jakhar | #blueteam#phishing#anti-phishing+1 |
| 2008-08-06 | Talk | Blackhat |
Bad Sushi: Beating Phishers at Their Own Game
| Nitesh Dhanjani | #phishing#blueteam#network-forensics+2 |
| 2008-03-28 | Talk | Blackhat |
Spam-Evolution
| Aseem Jakhar | #social-engineering#malware-detection#anti-phishing |
| 2007-08-02 | Talk | Blackhat |
The Evolution Of Phishing To Organized Crime
| Rohyt Belani | #social-engineering#phishing#threat-modeling+2 |