☷ All News › ⚑ Latest News
Talk, Online
28-May-2022
28-May-2022
Workshop, Online
13-May-2022
13-May-2022
Webinar, Online
29-April-2022
29-April-2022
Explore latest talks from Payatu.
Explore latest talks from Payatu.
In this webinar, our speaker Amit Musale, Director at Payatu, covered OT Security from basic to advance. Topics covered ICS Concepts, ICS Protocols, OT Visibility, ICS Honeypots, and much more.
In this webinar Bartek Gedrojc, Ph.D., VP Sales Products at Riscure covered the Fundamentals of Fault Injection and impart his knowledge and expertise on the subject.
In this webinar, our speaker Appar Thusso covered attacks on medical devices and infrastructure, case studies, demonstration (based on issued CVEs) and recommendations for management and engineering teams.
In this webinar, our speaker Kumar Ashwin covered the basics of DFIR, different data sources, chain of custody, browser forensics, metadata forensics and challenges in the field of DFIR.
In this webinar, our speaker Gaurav Bhosale covered, setting up the LAB, network Basics, and pre-Connection Attack.
In this webinar, our speaker Nandhakumar covered, devops - essential components, moving from traditional devops to DevSecOps, and best ways to implement security into existing pipelines.
In this webinar,speaker Arjun Singh covered, types of Privileges Escalation, Automating the approach, and Jwt manipulating Example & how to find sensitive data exposure under the admin and user roles.
In this webinar, our speakers Hrushikesh Kakade & Samaksh Kaushik covered setting up a Live Phishing campaign and investigating how attackers steal credentials to log into the victim's accounts.
The objective of this webinar is to discuss the first phase of Red Teaming: Enumeration. This webinar covers, Phases of Red Team, What is Enumeration, Scope of Enumeration in Red Team, and Enumeration Techniques.
The objective of this webinar is to discuss IoT security compliances that will help IoT developers, manufacturers, and testers achieve better security for their IoT products.
The objective of this webinar is to discuss a proven approach to perform a security assessment on AI applications.
In this webinar, we talked about how an organized attack can be performed and how one can defend themselves from one.
The objective of this webinar is to get you started with introduction to radio frequency, signal processing and maths, tools of the trade, demonstration for beginners and wireless security and popular hacks.
This webinar aims to cover various aspects, including IoT pen-testing tools, attack surfaces, conducting an assessment, and much more.
This webinar focuses on a detailed analysis of how we chained multiple simplest mistakes made by humans to save time or as a temporary fix that led to complete company compromise of one of our multi-million dollar clients.
This webinar aims to cover various aspects, inlcuding ARM assembly prime, stack base buffer overflow, shellcoding tips & tricks and return oriented programming.
In this webinar, we talked about how to get started with IoT pentesting and a hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.
The objective of this workshop is to get you started with kernel vulnerability analysis and exploitation in the Android platform.
This talk discusses IoT attack surface, security issues, the problems IoT security teams face and tries to address some of them with super powers that all IoT security teams already have within them, but have not explored yet.
This webinar will take a look at a few ML specific vulnerabilities like Adversarial learning, Model stealing, Model skewing, etc and discuss possible mitigations.
In this webinar, the presenter talked about the very fundamentals of ML and DL and its implementation in security-specific use cases.
In the conversation with Phoram Mehta, Chief Infosec Officer at PayPal APAC, Phoram shed light on cybersecurity priorities, 100% security, shared business-aligned for cybersecurity initiatives, and much more.
In the conversation with Manish Tiwari, Sr VP & Global CISO, Bharti Airtel, Manish shed light on cybersecurity priorities, 100% security, shared business-aligned for cybersecurity initiatives, and much more.
In the conversation with Suchit Mishra, Chief Information Security Officer at Autonomous Intelligent Driving, Suchit shed light on cybersecurity priorities, 100% security, shared business-aligned messages for cybersecurity initiatives, and much more.
In conversation with Venkatesh Subramaniam, Global Chief Information Security Officer, Venkatesh shed light on cybersecurity priorities, business-aligned message for cybersecurity initiatives, 100% security, and many more.
Elevation of privilege vulnerability discovered by Payatu researcher in Microsoft Edge extension has been submitted responsibly to the Microsoft Security Team; as a result, CVE-2019-0678 was assigned. This talk was presented at 36c3 Germany.
This talk was presented at PHDays 2019 conference in Russia.
Models deployed on cloud could be vulnerable to Model Duplication attacks. Payatu researchers found a way to exploit these services and clone the functionalities of the black box models hidden in the cloud by making continuous requests to the APIs. This talk was presented at the HITBSecConf2019 Amsterdam.
In Conversation with Arun Sukumar, Head Cyber Initiative, ORF and Aseem Jakhar, Director R&D, Payatu Software Labs at #CyFyAfrica
This talk was presented at PHDays 2019 conference in Russia.
We have seen a lot of amazing talks on reversing hardware and how people succeeded in pwning it, but it is not a one-hour process. Payatu researcher spoke about all of his failures in hardware hacking for the past 15 months and talk about how he evolved to make better mistakes. This talk was presented at PHDays 2019 conference in Russia.
This webinar is an entry guide on how to get started with IoT pentest, Do you really need expensive tools for it? & Some of the common misconceptions about IoT pentesting.
This talk was presented at HITBSecConf 2018 in Dubai.
This talk was presented at ROOTCON Hacking Conference 2018 in Philippines.
This talk was presented at c0c0n conferecne 2017 in India.
This talk was presented at Global IoT DevFest 2017.
IoT is an emerging field and exploding with new products and innovation. The security of IoT products is still lagging behind for various reasons. Payatu research director talks about EXPLIoT – IoT Exploit development Framework.This talk was presented at HITBSecConf 2017 in the Netherlands.
This talk was presented at DEF CON 19.
Research Powered Cybersecurity Services and Training. Eliminate security threats through our innovative and extensive security assessments.
Subscribe to our newsletter
Research Powered Cybersecurity Services and Training. Eliminate security threats through our innovative and extensive security assessments.
Subscribe to our newsletter
Services