| 2024-11-16 | Talk | C0c0n |
Breach of the borderless: Cyber threat actors targeting India’s cyberspace
| Abhijith B R | #threat-hunting#cybersecurity-strategy#cyber-war+2 |
| 2023-09-29 | Talk | Hackinparis |
A Tale of Credential Leak of a Popular Cloud Threat Actor
| Nitesh Surana | #container-security#docker#threat-hunting+1 |
| 2023-09-24 | Panel | Nullcon |
INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI
| Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey, Travis Carelock | #threat-hunting#ai-security#blueteam |
| 2023-08-07 | Talk | C0c0n |
Chinese APT against Government officials using G7 summit lure
| Niranjan Jayanand | #apt#incident-management#threat-hunting |
| 2023-08-07 | Talk | C0c0n |
Darkweb Investigations
| Amit Dubey | #threat-hunting#digital-forensics#incident-management+1 |
| 2023-08-07 | Talk | C0c0n |
Exploring Threats in Operational Technology
| Manjunath Hiregange | #ics-security#operational-technology#threat-hunting+1 |
| 2023-08-07 | Talk | C0c0n |
Generative AI and Cyber Crimes
| Brijesh Singh | #security-training#risk-management#threat-hunting |
| 2023-08-07 | Talk | C0c0n |
Tackling Advanced Threat Landscape with MDR - Best Practices
| Vijayakumar K M | #incident-management#threat-hunting#security-monitoring+1 |
| 2023-08-06 | Talk | C0c0n |
Dark web for investigations
| Amit Lokhande | #threat-hunting#digital-forensics#network-forensics+3 |
| 2023-08-06 | Talk | C0c0n |
Subduing Adversaries with Information Superiority
| Antony K M | #threat-hunting#security-monitoring#threat-detection+2 |
| 2023-08-06 | Talk | C0c0n |
Time To Choose - Conventional CTI Or NextGen External Threat Landscape Management
| Kumar Ritesh | #threat-landscape#threat-modeling#threat-hunting+2 |
| 2023-05-11 | Tool demo | Blackhat |
ThreatSeeker - Threat Hunting via Windows Event Logs
| Ashish Bhangale, G Khartheesvar, Arafat Ansari | #threat-hunting#windows#security-tools |
| 2023-05-10 | Talk | Auscert |
Staying ahead of evolving threats from the get-go with proactive intelligence
| Tara Dharnikota | #threat-intelligence-analysis#threat-hunting#threat-detection |
| 2022-09-24 | Talk | C0c0n |
OSINT Tools and Techniques
| Brijesh Singh | #threat-hunting#intelligence-sharing#security-training |
| 2022-09-24 | Talk | C0c0n |
Weaponising Social Media for Psychological Operations
| A a Gafoor | #social-engineering#security-training#threat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Threats Landscape and Intelligence of API & Shield to protect
| Navaneethan M | #api-security#threat-landscape#threat-hunting+1 |
| 2022-09-23 | Talk | C0c0n |
Tracking the Bad guys. An interesting story of how the criminal underground operates
| Aarushi Koolwal, Anjana Sathyan | #threat-hunting#incident-management#cyber-crime+4 |
| 2022-08-10 | Talk | Blackhat |
The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting
| Sameer Koranne, John Dwyer, Neil Wyler | #threat-hunting#security-strategy#threat-modeling |
| 2021-11-13 | Talk | C0c0n |
A look into cyber-espionage activities targeting critical infrastructure in India
| Saurabh Sharma, Kurt Baumgartner | #ics-security#critical-infrastructure#threat-hunting+1 |
| 2021-11-13 | Talk | C0c0n |
Machine learning to detect Chia mining
| Varun Kohli | #threat-detection#threat-hunting#malware-detection+2 |
| 2021-11-13 | Talk | C0c0n |
Mature Your Threat Hunting Program
| Neha Dhyani | #threat-hunting#threat-detection#threat-modeling+2 |
| 2021-08-07 | Talk | Defcon |
The Curious Case of Knowing the Unknown
| Vandana Verma Sehgal | #threat-hunting#threat-modeling#architecture+1 |
| 2020-11-21 | Talk | Appsecindonesia |
Threat Defense: Defending the ATT&CK with TTP’s
| Avkash Kathiriya | #blueteam#threat-hunting#security-analytics |
| 2020-10-07 | Talk | Rootcon |
Automating Threat Hunting on the Dark Web and other nitty-gritty thingso
| Apurv Singh Gautam | #deep-web#red-teaming#threat-hunting+1 |
| 2020-08-22 | Talk | Thedianainitiative |
Automating Threat Hunting on the Dark Web and other nitty-gritty things
| Apurv Singh Gautam | #threat-hunting#nlp#machine-learning+1 |
| 2019-10-12 | Talk | Texascybersummit |
TH-2020 Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | #incident-management#threat-hunting#ioc+3 |
| 2019-08-05 | Tool demo | Blackhat |
CertPivot: Infra-Chaining + Cert-Check
| Ajit Hatti | #incident-management#threat-hunting#ssl+1 |
| 2018-10-05 | Talk | C0c0n |
Dealing with Changing Threat Landscape
| Vijendra Katiyar | #threat-landscape#threat-hunting#risk-management |
| 2018-08-10 | Talk | Defcon |
Building visualisation platforms for OSINT data using open source solutions
| Bharath Kumar, Madhu Akula | #security-analytics#threat-hunting#osint+3 |
| 2018-08-08 | Tool demo | Blackhat |
PA Toolkit: Wireshark Plugins for Pentesters
| Nishant Sharma, Jeswin Mathai | #wireshark#security-assessment#network-architecture+2 |
| 2017-08-18 | Talk | C0c0n |
Cyber Threat Intelligence - Are We There , Yet…?
| A Shiju Rawther | #threat-hunting#threat-modeling#ioc+3 |
| 2017-07-27 | Talk | Defcon |
Recon and bug bounties what a great love story
| Abhijeth Dugginapeddi | #vulnerability-assessment#bug-bounty#network-pentesting+1 |
| 2016-08-04 | Tool demo | Blackhat |
rastrea2r: Collecting & Hunting for IOCs with Gusto and Style
| Sudheendra Bhat | #incident-management#threat-hunting#ioc+1 |
| 2016-08-03 | Tool demo | Blackhat |
DataSploit
| Sudhanshu Chauhan, Shubham Mittal, Nutan Kumar Panda | #security-assessment#threat-hunting#osint+1 |
| 2015-02-06 | Panel | Nullcon |
Defender’s Diary: Who’s attacking? What are my options?
| Sastry Tumuluri, Amit Sharma, Venkatesh Subramaniam, Sachin Burman, Deepak Singla | #blueteam#threat-hunting#cybersecurity-strategy |
| 2009-08-06 | Talk | C0c0n |
Information Warfare
| A a Gafoor, Vinayak Mishra | #threat-hunting#threat-modeling#security-training+2 |