| 2024-11-28 | Talk | Blackhat |
From Breach to Blueprint: Building a Resilient Future
| Amit Ghodekar | incident-responsevulnerability-managementpentesting+3 |
| 2024-11-16 | Talk | C0c0n |
Breach of the borderless: Cyber threat actors targeting India’s cyberspace
| Abhijith B R | threat-hunting |
| 2023-09-29 | Talk | Hackinparis |
A Tale of Credential Leak of a Popular Cloud Threat Actor
| Nitesh Surana | container-securitydockerthreat-hunting+1 |
| 2023-08-07 | Talk | C0c0n |
Chinese APT against Government officials using G7 summit lure
| Niranjan Jayanand | aptincident-responsethreat-hunting |
| 2023-08-07 | Talk | C0c0n |
Darkweb Investigations
| Amit Dubey | threat-huntingdigital-forensicsincident-response+1 |
| 2023-08-07 | Talk | C0c0n |
Exploring Threats in Operational Technology
| Manjunath Hiregange | ics-securityindustrial-control-systems-securityoperational-technology+2 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | malwaresecurity-awarenessrisk-management+2 |
| 2023-08-07 | Talk | C0c0n |
Tackling Advanced Threat Landscape with MDR - Best Practices
| Vijayakumar K M | incident-responsethreat-huntingsecurity-monitoring+1 |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | threat-huntingdigital-forensicsnetwork-forensics+3 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | threat-huntingsecurity-monitoringthreat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management
| Kumar Ritesh | threat-landscapethreat_modelingthreat-hunting+2 |
| 2023-05-11 | Tool demo | Blackhat |
ThreatSeeker - Threat Hunting via Windows Event Logs
| Ashish Bhangale, G Khartheesvar, Arafat Ansari | threat-hunting |
| 2022-09-24 | Talk | C0c0n |
OSINT Tools and Techniques
| Brijesh Singh | threat-huntingintelligence-sharingsecurity-awareness+1 |
| 2022-09-24 | Talk | C0c0n |
Weaponising Social Media for Psychological Operations
| A a Gafoor | social-engineeringsecurity-awarenessthreat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Threats Landscape and Intelligence of API & Shield to protect
| Navaneethan M | api-securitythreat-landscapethreat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Tracking the Bad guys. An interesting story of how the criminal underground operates
| Aarushi Koolwal, Anjana Sathyan | threat-huntingincident-response |
| 2022-08-10 | Talk | Blackhat |
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting
| Sameer Koranne | threat-hunting |
| 2021-11-13 | Talk | C0c0n |
A look into cyber-espionage activities targeting critical infrastructure in India
| Saurabh Sharma | industrial-control-systems-securitycritical-infrastructurethreat-hunting+1 |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | threat-detectionthreat-huntingmalware-detection+2 |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | threat-huntingthreat-detectionthreat_modeling+2 |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | threat-huntingthreat_modelingsecurity-architecture+2 |
| 2020-08-22 | Talk | The Diana Initiative |
Automating Threat Hunting on the Dark Web and other nitty-gritty things
| Apurv Singh Gautam | threat-hunting |
| 2019-10-12 | Talk | Texas Cyber Summit |
TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | incident-responsethreat-huntingioc+3 |
| 2019-08-05 | Tool demo | Blackhat |
CertPivot: Infra-Chaining + Cert-Check
| Ajit Hatti | incident-responsethreat-hunting |
| 2018-10-05 | Talk | C0c0n |
Dealing with Changing Threat Landscape
| Vijendra Katiyar | threat-landscapethreat-huntingrisk-management+1 |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | security-analyticsthreat-hunting |
| 2017-08-18 | Talk | C0c0n |
Cyber Threat Intelligence - Are We There , Yet…?
| A Shiju Rawther | threat-huntingthreat_modelingioc+3 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | vulnerability-assessmentbug-bountynetwork-pentesting+1 |
| 2016-08-03 | Tool demo | Blackhat |
DataSploit
| Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda | pentestingvulnerability-managementthreat-hunting |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | threat-huntingthreat_modelingsecurity-awareness+2 |