đŸ§Ē Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Threat Detection

Focus Area: đŸ›Ąī¸ Security Operations & Defense
19
Total Entries
17
Contributors

Top Contributors

Varun Kohli(2) Vijayakumar K M(2) Antony K M(1) Devdatta Akhawe(1) Dhiraj Mishra(1)

All Entries (19 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishra#web-security#malware-detection#browser-security+2
2025-06-02TalkConfidence Local LLMs in Action: Automating CTI to Connect the Dots Video Kai Iyer#threat-intelligence-analysis#machine-learning#threat-detection+1
2025-04-15TalkStackx Cybersecurity AI in Cybersecurity: Hype, Reality, and the Shift from Tools to Teammates Video Pawan Kinger#ai-security#threat-detection#security-operations-center
2024-10-23Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#endpoint-protection+2
2024-05-27TalkConfidence Beyond the Kernel: eBPF’s Trailblazing Role in Reinventing Cloud Security Dynamics Video Rohit Sehgal#cloud-monitoring#ebpf#linux+4
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Walia#soc#ics-security#threat-detection+1
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K M#incident-management#threat-hunting#security-monitoring+1
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K M#threat-hunting#security-monitoring#threat-detection+2
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Ritesh#threat-landscape#threat-modeling#threat-hunting+2
2023-05-10TalkAuscert Staying ahead of evolving threats from the get-go with proactive intelligence Video Tara Dharnikota#threat-intelligence-analysis#threat-hunting#threat-detection
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittal#red-teaming#active-directory#threat-detection
2022-09-24TalkC0c0n Deep Learning to detect Network Attacks Varun Kohli#ids#network-monitoring#threat-detection+2
2022-09-24TalkC0c0n Need for Advanced SOC Vijayakumar K M#soc#security-monitoring#security-analytics+2
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagatti#devsecops#architecture#threat-detection+2
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnani#threat-detection#security-monitoring#architecture
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohli#threat-detection#threat-hunting#malware-detection+2
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyani#threat-hunting#threat-detection#threat-modeling+2
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyan#threat-detection#architecture#machine-learning+1
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhawe, Adrienne Felt#web-security#security-training#architecture+2