14th Quarterly Meetup – Detecting Bad Apples: Understanding macOS Malware TTPs
In this meet, Surya Teja presented on “Detecting Bad Apples: Understanding macOS Malware TTPs”
In this meet, Surya Teja presented on “Detecting Bad Apples: Understanding macOS Malware TTPs”
The Garuda Threat Hunting Framework, released at DEF CON 2025, is a PowerShell-based framework designed to simplify manual threat hunting. It allows you to correlate, filter, and investigate Sysmon events efficiently. In this video, I demonstrate how to install Garuda, explore its key features, and perform a step-by-step hunt of a Living-off-the-Land (LoLbin) attack using […]
We’re thrilled to announce the upcoming Cysinfo Cybersecurity Community Meetup, scheduled on Saturday, 15th November 2025, at Vemana Institute of Technology, Bangalore. The meetup will start at 9:30 AM IST and is completely free and open to everyone — students, professionals, and enthusiasts alike. All you need to do is register below to attend. Cysinfo […]
In this video, we explore how AI enhances threat hunting by integrating Large Language Models (LLMs) with the Garuda Threat Hunting Framework. Garuda is a manual, PowerShell-based threat hunting and investigation framework designed to transform raw Sysmon telemetry into structured, actionable intelligence for Windows environments. It allows you to correlate, filter, and analyze sysmon events […]
In this meet, Ashwin Shenoi presented on “Closer look at PHP Unserialization” , Monnappa K A presented on “Understanding Malware Persistence Techniques” , Shruti Dixit & Geethna TK presented on “Getting started with cybersecurity through CTFs” , Akul Pillai presented on “A look into the sanitizer family (ASAN & UBSAN)” , Vikram Kharvi presented on “Understanding & […]
In this meet, Ashwin Shenoi delivered presentation on “GCloser look at PHP Unserialization” Video Demo
In this meet, Monnappa K A delivered presentation on “Understanding Malware Persistence Techniques” Demo 1 – Understanding the IFEO Technique Demo 2 – Malware Using IFEO (Trojan.Zusy) Demo 3 – Simple Anti-Analysis Using IFEO (Trojan.Small) Demo 4 – Simple Anti-Analysis using IFEO (Brontok Worm) Demo 5 – Winlogon Persistence (Turla gazer backdoor) Demo 6 – […]
In this meet, Shruti Dixit & Geethna TK delivered presentation on “Getting started with cybersecurity through CTFs”
In this meet, Akul Pillai delivered presentation on “A look into the sanitizer family (ASAN & UBSAN)” Demo 1 Demo 2:
In this meet, Vikram Kharvi delivered presentation on “Understanding & analyzing obfuscated malicious web scripts”