Products
EXPLIoT CloudFuzz

Payatu | Media

Explore latest talks from Payatu.

Payatu | Media

Explore latest talks from Payatu.

Close the overlay

I am looking for
Please click one!

Webinar: Gaining Access to Protected Components In Android | Payatu | by- Amit Prajapati

🕐 29 Apr 2022

In this webinar, our speaker Amit Prajapati covered, the basics of application components, getting hands dirty with intent attack vectors, and exploitation of intent-based attack vectors in the real world.

Webinar: Introduction to Automotive Security from an attackers point of view | Payatu | by- Kartheek Lade

🕐 04 Mar 2022

In this webinar, our speaker Kartheek Lade covered, Automotive landscape, Vehicle attack surface, the History of car hacking, and In-vehicle networks.

Webinar: All you need to know about OT Security | Payatu | by- Amit Musale

🕐 11 Feb 2022

In this webinar, our speaker Amit Musale, Director at Payatu, covered OT Security from basic to advance. Topics covered ICS Concepts, ICS Protocols, OT Visibility, ICS Honeypots, and much more.

Webinar: Fundamentals of Fault Injection | Payatu | by- Bartek Gedrojc PhD

🕐 28 Jan 2022

In this webinar Bartek Gedrojc, Ph.D., VP Sales Products at Riscure covered the Fundamentals of Fault Injection and impart his knowledge and expertise on the subject.

Webinar: Medical Device Security: The Good, The Bad, The Ugly | Payatu | by- Appar Thusoo

🕐 26 Nov 2021

In this webinar, our speaker Appar Thusso covered attacks on medical devices and infrastructure, case studies, demonstration (based on issued CVEs) and recommendations for management and engineering teams.

Webinar: Getting Started with DFIR | Payatu | by- Kumar Ashwin

🕐 30 Oct 2021

In this webinar, our speaker Kumar Ashwin covered the basics of DFIR, different data sources, chain of custody, browser forensics, metadata forensics and challenges in the field of DFIR.

Webinar: An Introduction to Wifi Penetration Testing | Payatu | by- Gaurav Bhosale

🕐 30 Sep 2021

In this webinar, our speaker Gaurav Bhosale covered, setting up the LAB, network Basics, and pre-Connection Attack.

Webinar: DevSecOps 101: Integrating Security into Devops | Payatu | by- Nandhakumar

🕐 27 Aug 2021

In this webinar, our speaker Nandhakumar covered, devops - essential components, moving from traditional devops to DevSecOps, and best ways to implement security into existing pipelines.

Webinar: Privileges Escalation and Sensitive Data Exposure | Payatu | by- Arjun Singh

🕐 23 Jul 2021

In this webinar,speaker Arjun Singh covered, types of Privileges Escalation, Automating the approach, and Jwt manipulating Example & how to find sensitive data exposure under the admin and user roles.

Confrence: Red Team Assessments: Setting up Phishing Campaigns | Payatu | by- Hrushikesh Kakade & Samaksh Kaushik

🕐 25 Jun 2021

In this webinar, our speakers Hrushikesh Kakade & Samaksh Kaushik covered setting up a Live Phishing campaign and investigating how attackers steal credentials to log into the victim's accounts.

Webinar: An Introduction to Red Team Assessments: Enumeration | by- Hrushikesh Kakade

🕐 28 May 2021

The objective of this webinar is to discuss the first phase of Red Teaming: Enumeration. This webinar covers, Phases of Red Team, What is Enumeration, Scope of Enumeration in Red Team, and Enumeration Techniques.

Webinar: Securing your IoT Products with Security Compliance Standards | by- Yashodhan Mandke

🕐 30 Apr 2021

The objective of this webinar is to discuss IoT security compliances that will help IoT developers, manufacturers, and testers achieve better security for their IoT products.

Webinar: An Introduction To AI Security Assessment | Payatu | by- Nikhil Joshi

🕐 31 Mar 2021

The objective of this webinar is to discuss a proven approach to perform a security assessment on AI applications.

Webinar: An Introduction to Red Team Assessments | by- Hrushikesh Kakade

🕐 24 Feb 2021

In this webinar, we talked about how an organized attack can be performed and how one can defend themselves from one.

Webinar: Under The Air: Introduction to Software Defined Radio | by- Appar Thusoo

🕐 15 Jan 2021

The objective of this webinar is to get you started with introduction to radio frequency, signal processing and maths, tools of the trade, demonstration for beginners and wireless security and popular hacks.

Webinar: Introduction to IoT Security Assessment | by- Asmita Jha

🕐 28 Oct 2020

This webinar aims to cover various aspects, including IoT pen-testing tools, attack surfaces, conducting an assessment, and much more.

Webinar: Compromising Organizational System through Chaining Attacks | by- Rewanth Cool

🕐 29 Sep 2020

This webinar focuses on a detailed analysis of how we chained multiple simplest mistakes made by humans to save time or as a temporary fix that led to complete company compromise of one of our multi-million dollar clients.

Webinar: Exploiting ARM-based IoT Devices | by- Munawwar Hussain Shelia

🕐 11 Jul 2020

This webinar aims to cover various aspects, inlcuding ARM assembly prime, stack base buffer overflow, shellcoding tips & tricks and return oriented programming.

Webinar: Introduction to IoT Reversing - Firmware | by- Arun Magesh

🕐 21 May 2020

In this webinar, we talked about how to get started with IoT pentesting and a hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.

Workshop: Android Kernel Exploitation | by- Ashfaq Ansari

🕐 25 Apr 2020

The objective of this workshop is to get you started with kernel vulnerability analysis and exploitation in the Android platform.

Busting the IoT security assessment blues with super powers | by- Aseem Jakhar

🕐 15 Apr 2020

This talk discusses IoT attack surface, security issues, the problems IoT security teams face and tries to address some of them with super powers that all IoT security teams already have within them, but have not explored yet.

Webinar: How secure are ML applications | by- Nikhil Joshi

🕐 09 Apr 2020

This webinar will take a look at a few ML specific vulnerabilities like Adversarial learning, Model stealing, Model skewing, etc and discuss possible mitigations.

Webinar: Introduction to ML and DL for security | by- Nikhil Joshi

🕐 02 Apr 2020

In this webinar, the presenter talked about the very fundamentals of ML and DL and its implementation in security-specific use cases.

Conference: CXO Interview Series: Manish Tiwari, Nullcon, Goa | by- Manish Tiwari

🕐 05 Mar 2020

In the conversation with Manish Tiwari, Sr VP & Global CISO, Bharti Airtel, Manish shed light on cybersecurity priorities, 100% security, shared business-aligned for cybersecurity initiatives, and much more.

Conference: CXO Interview Series: Phoram Mehta, Nullcon, Goa | by- Phoram Mehta

🕐 05 Mar 2020

In the conversation with Phoram Mehta, Chief Infosec Officer at PayPal APAC, Phoram shed light on cybersecurity priorities, 100% security, shared business-aligned for cybersecurity initiatives, and much more.

Conference: CXO Interview: Suchit Mishra: Nullcon, Goa 2020 | by- Suchit Mishra

🕐 04 Mar 2020

In the conversation with Suchit Mishra, Chief Information Security Officer at Autonomous Intelligent Driving, Suchit shed light on cybersecurity priorities, 100% security, shared business-aligned messages for cybersecurity initiatives, and much more.

Conference: CXO Interview: Venkatesh Subramaniam: Nullcon, Goa 2020 | by- Venkatesh Subramaniam

🕐 03 Mar 2020

In conversation with Venkatesh Subramaniam, Global Chief Information Security Officer, Venkatesh shed light on cybersecurity priorities, business-aligned message for cybersecurity initiatives, 100% security, and many more.

Talk: Breaking Microsoft Edge Extensions Security Policies | by- Nikhil Mittal

🕐 28 Dec 2019

Elevation of privilege vulnerability discovered by Payatu researcher in Microsoft Edge extension has been submitted responsibly to the Microsoft Security Team; as a result, CVE-2019-0678 was assigned. This talk was presented at 36c3 Germany.

Talk: Breaking Microsoft Edge extensions security policies | by- Nikhil Mittal

🕐 05 Sep 2019

This talk was presented at PHDays 2019 conference in Russia.

Talk: Duplicating Black Box Machine Learning Models | by- Nikhil Joshi and Rewanth Tammana

🕐 05 Sep 2019

Models deployed on cloud could be vulnerable to Model Duplication attacks. Payatu researchers found a way to exploit these services and clone the functionalities of the black box models hidden in the cloud by making continuous requests to the APIs. This talk was presented at the HITBSecConf2019 Amsterdam.

Interview: Community Building | by- Aseem Jakhar

🕐 07 Jun 2019

In Conversation with Arun Sukumar, Head Cyber Initiative, ORF and Aseem Jakhar, Director R&D, Payatu Software Labs at #CyFyAfrica

Talk: GDALR: an efficient model duplication attack on black-box machine learning models | by- Nikhil Joshi

🕐 21 May 2019

This talk was presented at PHDays 2019 conference in Russia.

Talk: How to fail in hardware hacking | by- Arun Magesh

🕐 09 May 2019

We have seen a lot of amazing talks on reversing hardware and how people succeeded in pwning it, but it is not a one-hour process. Payatu researcher spoke about all of his failures in hardware hacking for the past 15 months and talk about how he evolved to make better mistakes. This talk was presented at PHDays 2019 conference in Russia.

Webinar: Guide on setting up IoT testing lab | by- Arun Magesh

🕐 27 Dec 2018

This webinar is an entry guide on how to get started with IoT pentest, Do you really need expensive tools for it? & Some of the common misconceptions about IoT pentesting.

Talk: Creating Browser Extensions To Hunt For Low-Hanging Fruit | by- Rewanth Tammana

🕐 25 Dec 2018

This talk was presented at HITBSecConf 2018 in Dubai.

Talk: Expl(IoT): Hacking IoT like a boss | by- Aseem Jakhar

🕐 27 Sep 2018

This talk was presented at ROOTCON Hacking Conference 2018 in Philippines.

Talk: Your friendly neighborhood expliot | by- Aseem Jakhar

🕐 18 Aug 2017

This talk was presented at c0c0n conferecne 2017 in India.

Talk: Exploiting Bluetooth Low Energy | by- Arun Magesh

🕐 12 Jul 2017

This talk was presented at Global IoT DevFest 2017.

Talk: IoT Hacking Simplified | by- Aseem Jakhar

🕐 14 Apr 2017

IoT is an emerging field and exploding with new products and innovation. The security of IoT products is still lagging behind for various reasons. Payatu research director talks about EXPLIoT – IoT Exploit development Framework.This talk was presented at HITBSecConf 2017 in the Netherlands.

Talk: Jugaad - Linux Thread Injection Kit | by- Aseem Jakhar

🕐 05 Aug 2011

This talk was presented at DEF CON 19.

Director of Engineering at Medly
Card image
Director at Philips
Card image
Director - Information Security at Make My Trip
Card image