🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Threat Detection

14
Total Entries
12
Contributors

Top Contributors

Varun Kohli(2) Vijayakumar K M(2) Antony K M(1) Devdatta Akhawe(1) Dhiraj Mishra(1)

All Entries (14 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-06Tool demoBlackhat SmuggleShield - Protection Against HTML Smuggling Source Code Dhiraj Mishraweb-securitymalware-detectionbrowser-security+2
2023-09-23TalkNullcon Journey in setting up OT SOC Presentation Ramandeep Singh Waliasocics-securityindustrial-control-systems-security+3
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K Mincident-responsethreat-huntingsecurity-monitoring+1
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K Mthreat-huntingsecurity-monitoringthreat-detection+2
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Riteshthreat-landscapethreat_modelingthreat-hunting+2
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittalred-teamingactive-directorythreat-detection
2022-09-24TalkC0c0n Deep Learning to detect Network Attacks Varun Kohliidsnetwork-monitoringthreat-detection+2
2022-09-24TalkC0c0n Need for Advanced SOC Vijayakumar K Msocsecurity-monitoringsecurity-analytics+3
2022-09-23TalkC0c0n Bridging the gap between Security and Operations Sujay Rajashekar Gundagattidevsecopssecurity-architecturethreat-detection+3
2021-11-13TalkC0c0n Introducing Free & Open Elastic Limitless XDR Ravindra Ramnanithreat-detectionsecurity-monitoringvulnerability-management+1
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohlithreat-detectionthreat-huntingmalware-detection+2
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyanithreat-huntingthreat-detectionthreat_modeling+2
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyanthreat-detectionsecurity-architecture
2013-08-15TalkUsenix Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Presentation Whitepaper Devdatta Akhaweweb-securitysecurity-awarenesssecurity-architecture+3