🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Threat Hunting

Focus Areas: 🛡️ Security Operations & Defense 🕵️ Threat Intelligence
36
Total Entries
46
Contributors

Top Contributors

A a Gafoor(2) Apurv Singh Gautam(2) Avkash Kathiriya(2) Brijesh Singh(2) Sudheendra Bhat(2)

All Entries (36 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-11-16TalkC0c0n Breach of the borderless: Cyber threat actors targeting India’s cyberspace Abhijith B R#threat-hunting#cybersecurity-strategy#cyber-war+2
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Surana#container-security#docker#threat-hunting+1
2023-09-24PanelNullcon INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey, Travis Carelock#threat-hunting#ai-security#blueteam
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanand#apt#incident-management#threat-hunting
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubey#threat-hunting#digital-forensics#incident-management+1
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregange#ics-security#operational-technology#threat-hunting+1
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singh#security-training#risk-management#threat-hunting
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K M#incident-management#threat-hunting#security-monitoring+1
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhande#threat-hunting#digital-forensics#network-forensics+3
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K M#threat-hunting#security-monitoring#threat-detection+2
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Ritesh#threat-landscape#threat-modeling#threat-hunting+2
2023-05-11Tool demoBlackhat ThreatSeeker - Threat Hunting via Windows Event Logs Source Code Ashish Bhangale, G Khartheesvar, Arafat Ansari#threat-hunting#windows#security-tools
2023-05-10TalkAuscert Staying ahead of evolving threats from the get-go with proactive intelligence Video Tara Dharnikota#threat-intelligence-analysis#threat-hunting#threat-detection
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singh#threat-hunting#intelligence-sharing#security-training
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoor#social-engineering#security-training#threat-hunting+1
2022-09-23TalkC0c0n Threats Landscape and Intelligence of API & Shield to protect Navaneethan M#api-security#threat-landscape#threat-hunting+1
2022-09-23TalkC0c0n Tracking the Bad guys. An interesting story of how the criminal underground operates Aarushi Koolwal, Anjana Sathyan#threat-hunting#incident-management#cyber-crime+4
2022-08-10TalkBlackhat The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting Presentation Source Code Sameer Koranne, John Dwyer, Neil Wyler#threat-hunting#security-strategy#threat-modeling
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharma, Kurt Baumgartner#ics-security#critical-infrastructure#threat-hunting+1
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohli#threat-detection#threat-hunting#malware-detection+2
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyani#threat-hunting#threat-detection#threat-modeling+2
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgal#threat-hunting#threat-modeling#architecture+1
2020-11-21TalkAppsecindonesia Threat Defense: Defending the ATT&CK with TTP’s Avkash Kathiriya#blueteam#threat-hunting#security-analytics
2020-10-07TalkRootcon Automating Threat Hunting on the Dark Web and other nitty-gritty thingso Presentation Video Apurv Singh Gautam#deep-web#red-teaming#threat-hunting+1
2020-08-22TalkThedianainitiative Automating Threat Hunting on the Dark Web and other nitty-gritty things Video Apurv Singh Gautam#threat-hunting#nlp#machine-learning+1
2019-10-12TalkTexascybersummit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Presentation Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+3
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hatti#incident-management#threat-hunting#ssl+1
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyar#threat-landscape#threat-hunting#risk-management
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akula#security-analytics#threat-hunting#osint+3
2018-08-08Tool demoBlackhat PA Toolkit: Wireshark Plugins for Pentesters Source Code Nishant Sharma, Jeswin Mathai#wireshark#security-assessment#network-architecture+2
2017-08-18TalkC0c0n Cyber Threat Intelligence - Are We There , Yet…? A Shiju Rawther#threat-hunting#threat-modeling#ioc+3
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddi#vulnerability-assessment#bug-bounty#network-pentesting+1
2016-08-04Tool demoBlackhat rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Source Code Sudheendra Bhat#incident-management#threat-hunting#ioc+1
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda#security-assessment#threat-hunting#osint+1
2015-02-06PanelNullcon Defender’s Diary: Who’s attacking? What are my options? Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla#blueteam#threat-hunting#cybersecurity-strategy
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishra#threat-hunting#threat-modeling#security-training+2