-
Continue reading →: Reinventing Access Control: Fingerprinting for Credential ProtectionIn the evolving landscape of cybersecurity, traditional credential-based security is increasingly viewed as fundamentally broken. At VULNCON 2025, Aditya Singh, a cyber security analyst and independent researcher, presented a compelling talk on how we can move beyond passwords by leveraging something we already leak every day: our digital fingerprint. What…
-
Continue reading →: AI-Powered Threats vs. AI-Powered Defenses: Who Wins the Cyber Arms Race?The intersection of Artificial Intelligence (AI) and cybersecurity is rapidly changing the threat landscape. At VULNCON 2025, a panel of CXOs explored the tension inherent in this shift: AI-Powered Threats versus AI-Powered Defenses, delving into topics like autonomous malware, deep fake phishing, and associated ethical challenges. Here are the critical…
-
Continue reading →: Exposing the Unseen: Malware Hunting from the Dark Corners of MemoryMonnappa K A, an independent researcher, delivered a Tech Talk on “Exposing the Unseen: Malware Hunting from the Dark Corners of Memory, at VULNCON 2025. As the author of Learning Malware Analysis, and a former incident responder and threat hunter for major corporations like Microsoft and Cisco, he shared a…


