🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Threat Hunting

Focus Areas: 🛡️ Security Operations & Defense 🕵️ Threat Intelligence
30
Total Entries
35
Contributors

Top Contributors

A a Gafoor(2) Brijesh Singh(2) A Shiju Rawther(1) Aarushi Koolwal(1) Abhijeth Dugginapeddi(1)

All Entries (30 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-11-28TalkBlackhat From Breach to Blueprint: Building a Resilient Future Amit Ghodekarincident-responsevulnerability-managementpentesting+3
2024-11-16TalkC0c0n Breach of the borderless: Cyber threat actors targeting India’s cyberspace Abhijith B Rthreat-hunting
2023-09-29TalkHackinparis A Tale of Credential Leak of a Popular Cloud Threat Actor Nitesh Suranacontainer-securitydockerthreat-hunting+1
2023-08-07TalkC0c0n Chinese APT against Government officials using G7 summit lure Video Niranjan Jayanandaptincident-responsethreat-hunting
2023-08-07TalkC0c0n Darkweb Investigations Amit Dubeythreat-huntingdigital-forensicsincident-response+1
2023-08-07TalkC0c0n Exploring Threats in Operational Technology Manjunath Hiregangeics-securityindustrial-control-systems-securityoperational-technology+2
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2023-08-07TalkC0c0n Tackling Advanced Threat Landscape with MDR - Best Practices Video Vijayakumar K Mincident-responsethreat-huntingsecurity-monitoring+1
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhandethreat-huntingdigital-forensicsnetwork-forensics+3
2023-08-06TalkC0c0n Subduing Adversaries with Information Superiority Video Antony K Mthreat-huntingsecurity-monitoringthreat-detection+2
2023-08-06TalkC0c0n Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management Video Kumar Riteshthreat-landscapethreat_modelingthreat-hunting+2
2023-05-11Tool demoBlackhat ThreatSeeker - Threat Hunting via Windows Event Logs Source Code Ashish Bhangale, G Khartheesvar, Arafat Ansarithreat-hunting
2022-09-24TalkC0c0n OSINT Tools and Techniques Brijesh Singhthreat-huntingintelligence-sharingsecurity-awareness+1
2022-09-24TalkC0c0n Weaponising Social Media for Psychological Operations A a Gafoorsocial-engineeringsecurity-awarenessthreat-hunting+1
2022-09-23TalkC0c0n Threats Landscape and Intelligence of API & Shield to protect Navaneethan Mapi-securitythreat-landscapethreat-hunting+1
2022-09-23TalkC0c0n Tracking the Bad guys. An interesting story of how the criminal underground operates Aarushi Koolwal, Anjana Sathyanthreat-huntingincident-response
2022-08-10TalkBlackhat The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting Presentation Source Code Sameer Korannethreat-hunting
2021-11-13TalkC0c0n A look into cyber-espionage activities targeting critical infrastructure in India Saurabh Sharmaindustrial-control-systems-securitycritical-infrastructurethreat-hunting+1
2021-11-13TalkC0c0n Machine learning to detect Chia mining Varun Kohlithreat-detectionthreat-huntingmalware-detection+2
2021-11-13TalkC0c0n Mature Your Threat Hunting Program Neha Dhyanithreat-huntingthreat-detectionthreat_modeling+2
2021-08-07TalkDefcon The Curious Case of Knowing the Unknown Video Vandana Verma Sehgalthreat-huntingthreat_modelingsecurity-architecture+2
2020-08-22TalkThe Diana Initiative Automating Threat Hunting on the Dark Web and other nitty-gritty things Video Apurv Singh Gautamthreat-hunting
2019-10-12TalkTexas Cyber Summit TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Sudheendra Bhatincident-responsethreat-huntingioc+3
2019-08-05Tool demoBlackhat CertPivot: Infra-Chaining + Cert-Check Ajit Hattiincident-responsethreat-hunting
2018-10-05TalkC0c0n Dealing with Changing Threat Landscape Vijendra Katiyarthreat-landscapethreat-huntingrisk-management+1
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akulasecurity-analyticsthreat-hunting
2017-08-18TalkC0c0n Cyber Threat Intelligence - Are We There , Yet…? A Shiju Rawtherthreat-huntingthreat_modelingioc+3
2017-07-27TalkDefcon Recon and bug bounties what a great love story Video Abhijeth Dugginapeddivulnerability-assessmentbug-bountynetwork-pentesting+1
2016-08-03Tool demoBlackhat DataSploit Source Code Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Pandapentestingvulnerability-managementthreat-hunting
2009-08-06TalkC0c0n Information Warfare A a Gafoor, Vinayak Mishrathreat-huntingthreat_modelingsecurity-awareness+2