by
Gain an understanding of Android malware & establish an analysis environment to identify malicious software targeting Android devices.
by
Gain an understanding of the various techniques and agents related to Mythic C2 and how it is helpful in Red Teaming.
by
Gain a high-level understanding of the latest iteration of OWASP Mobile top 10 risks with this webinar by Akshay Khilari.
by
Explore the essentials of Active Directory Delegation Attacks, exploiting Kerberos delegation within Active Directory with this webinar.
by
In this webinar, we will demonstrate how AWS Cognito works and how an adversary can attack misconfigurations within Cognito.
by
Get an introduction to OT(ICS/SCADA), Red Teaming Activities, Blue Teaming Activities with this webinar by Amit Musale.
by
Explore how misconfiguration in Active Directory Certificate service templates can be abused with Sandeep Sharma.
by
Unlock the secrets of automated code analysis for firmware like never before with Jan Albert from Riscure.
by
Unravel the concept of Prompt Injection Attacks and discover its implications on AI language models with this webinar.
by
Web exploit writing is a specialized cybersecurity skill that involves developing code to exploit vulnerabilities in web applications. This goes beyond identifying and reporting vulnerabilities to taking advantage of them to gain unauthorized access or control of a web application.
by
This webinar will look at the Matter Smart Home protocol and explore the security and privacy considerations that it offers for IoT Products.
by
Learn about using Manual Source Code Review on WordPress Plugins with this Webinar by Sanjay Das.
by
Learn about using semgrep to discover vulnerabilities in Android apps with Payatu’s Webinar by Amit Kumar.
by
Kapil Gurav (Hackersden) is a Security consultant at Payatu, who is responsible for the security assessment of Web, API, Mobile, and Hardware. He also loves to hunt on bug bounty programs and achieved more than 50 Hall of fame in the same—also an achiever of the most valuable player tag on bug bounty platforms.
by
In this Webinar, our bandit Rohit will explain how an EtherNet/IP protocol works and demonstrate how we can leverage the same to perform an attack in a real life OT Environment.
by
Don’t know how to get started with electron application penetration testing? Here is a webinar by our Security Consultant, Hari Prasad who specializes in the web app, API, and mobile app penetration testing.
by
In this webinar, our speaker Amit Prajapati covered, the basics of application components, getting hands dirty with intent attack vectors, and exploitation of intent-based attack vectors in the real world.
by
In this webinar, our speaker Kartheek Lade covered, Automotive landscape, Vehicle attack surface, the History of car hacking, and In-vehicle networks.
by
In this webinar, our speaker Amit Musale, Director at Payatu, covered OT Security from basic to advance. Topics covered ICS Concepts, ICS Protocols, OT Visibility, ICS Honeypots, and much more.
by
In this webinar Bartek Gedrojc, Ph.D., VP Sales Products at Riscure covered the Fundamentals of Fault Injection and impart his knowledge and expertise on the subject.
by
In this webinar, our speaker Appar Thusso covered attacks on medical devices and infrastructure, case studies, demonstration (based on issued CVEs) and recommendations for management and engineering teams.
by
In this webinar, our speaker Kumar Ashwin covered the basics of DFIR, different data sources, chain of custody, browser forensics, metadata forensics and challenges in the field of DFIR.
by
In this webinar, our speaker Gaurav Bhosale covered, setting up the LAB, network Basics, and pre-Connection Attack.
by
In this webinar, our speaker Nandhakumar covered, devops – essential components, moving from traditional devops to DevSecOps, and best ways to implement security into existing pipelines.
by
In this webinar,speaker Arjun Singh covered, types of Privileges Escalation, Automating the approach, and Jwt manipulating Example \u0026 how to find sensitive data exposure under the admin and user roles.
by
In this webinar, our speakers Hrushikesh Kakade \u0026 Samaksh Kaushik covered setting up a Live Phishing campaign and investigating how attackers steal credentials to log into the victim’s accounts.
by
The objective of this webinar is to discuss the first phase of Red Teaming: Enumeration. This webinar covers, Phases of Red Team, What is Enumeration, Scope of Enumeration in Red Team, and Enumeration Techniques.
by
The objective of this webinar is to discuss IoT security compliances that will help IoT developers, manufacturers, and testers achieve better security for their IoT products.
by
The objective of this webinar is to discuss a proven approach to perform a security assessment on AI applications.
by
In this webinar, we talked about how an organized attack can be performed and how one can defend themselves from one.
by
The objective of this webinar is to get you started with introduction to radio frequency, signal processing and maths, tools of the trade, demonstration for beginners and wireless security and popular hacks.
by
This webinar aims to cover various aspects, including IoT pen-testing tools, attack surfaces, conducting an assessment, and much more.
by
This webinar focuses on a detailed analysis of how we chained multiple simplest mistakes made by humans to save time or as a temporary fix that led to complete company compromise of one of our multi-million dollar clients.
by
This webinar aims to cover various aspects, inlcuding ARM assembly prime, stack base buffer overflow, shellcoding tips \u0026 tricks and return oriented programming.
by
In this webinar, we talked about how to get started with IoT pentesting and a hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.
by
The objective of this workshop is to get you started with kernel vulnerability analysis and exploitation in the Android platform.
by
This talk discusses IoT attack surface, security issues, the problems IoT security teams face and tries to address some of them with super powers that all IoT security teams already have within them, but have not explored yet.\n\t\t
by
This webinar will take a look at a few ML specific vulnerabilities like Adversarial learning, Model stealing, Model skewing, etc and discuss possible mitigations.
by
In this webinar, the presenter talked about the very fundamentals of ML and DL and its implementation in security-specific use cases.
by
In the conversation with Phoram Mehta, Chief Infosec Officer at PayPal APAC, Phoram shed light on cybersecurity priorities, 100% security, shared business-aligned for cybersecurity initiatives, and much more.
by
In the conversation with Manish Tiwari, Sr VP \u0026 Global CISO, Bharti Airtel, Manish shed light on cybersecurity priorities, 100% security, shared business-aligned for cybersecurity initiatives, and much more.
by
In the conversation with Suchit Mishra, Chief Information Security Officer at Autonomous Intelligent Driving, Suchit shed light on cybersecurity priorities, 100% security, shared business-aligned messages for cybersecurity initiatives, and much more.
by
In conversation with Venkatesh Subramaniam, Global Chief Information Security Officer, Venkatesh shed light on cybersecurity priorities, business-aligned message for cybersecurity initiatives, 100% security, and many more.
by
Elevation of privilege vulnerability discovered by Payatu researcher in Microsoft Edge extension has been submitted responsibly to the Microsoft Security Team; as a result, CVE-2019-0678 was assigned. This talk was presented at 36c3 Germany.
by
This talk was presented at PHDays 2019 conference in Russia.
by
Models deployed on cloud could be vulnerable to Model Duplication attacks. Payatu researchers found a way to exploit these services and clone the functionalities of the black box models hidden in the cloud by making continuous requests to the APIs. This talk was presented at the HITBSecConf2019 Amsterdam.
by
In Conversation with Arun Sukumar, Head Cyber Initiative, ORF and Aseem Jakhar, Director R\u0026D, Payatu Software Labs at #CyFyAfrica
by
This talk was presented at PHDays 2019 conference in Russia.
by
We have seen a lot of amazing talks on reversing hardware and how people succeeded in pwning it, but it is not a one-hour process. Payatu researcher spoke about all of his failures in hardware hacking for the past 15 months and talk about how he evolved to make better mistakes. This talk was presented at PHDays 2019 conference in Russia.
by
This webinar is an entry guide on how to get started with IoT pentest, Do you really need expensive tools for it? \u0026 Some of the common misconceptions about IoT pentesting.
Let’s make cyberspace secure together!
Requirements
What our clients are saying!
Trusted by
Fill in your details and get your copy of the datasheet in few seconds
Fill in your details and get your copy of the ebook in your inbox
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds
Fill in your details and get your copy of sample report in few seconds