Rahul Sasi

Founder and CTO at CloudSEK

Rahul Sasi 's biography

Rahul's past and future talks

Hacker's Live: A Session by Hacker(s)

Dynamic CISO Summit 2020

28 February, 2020 • 1k people in the audience

A Session by Hacker. Cybersecurity professionals should create a robust “Defense Mechanism” for a stronger, better, cybersecurity posture.

Shouldn't organization disclose breaches

c0c0n XII

27 September, 2019 • 50 people in the audience

Art of Hacking

TEDxGCT

9 July, 2016 • 1k people in the audience

Hacking has become a very frequent phenomenon. But the extent a person can do legally brings the question of introspection. With the word "privacy" becoming a mockery, the art of white ha...

Security vulnerabilities in DVB C networks; Hacking Cable TV network

Ekoparty 2015

22 October, 2015 • 500 people in the audience

DVB-C stands for "Digital Video Broadcasting - Cable" and it is the DVB European consortium standard for the broadcast transmission of digital television over cable. This system transmits...

Pentesting a DVB-C network .Hacking your cable TV, Die Hard Style

Ekoparty 2014

29 October, 2014 • 2k people in the audience

So in our talks, we cover the various attacks we can do on DVB-C infrastructure. That will include the following topics. 1) Security Vulnerabilities in DVB-C middleware servers. [Hijacki...

Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis

Hacker in the Box (HITB) Security Conference 2013

17 October, 2013 • 500 people in the audience

With the rise in the number of targeted attacks against government and private companies, there is a certain requirement for automated exploit analysis and filtering document file formats...

Rahul talks about

4
Hacking
2
Cybersecurity
2
Man in the midd...
2
Hacker
1
Breaches
1
Tv hacking
1
Exploit
1
Backdoor
1
Drone hacking
1
Drone
1
Vulnerability d...
1
Cxml/vxml hacking
1
Dvb hacking
1
Exploit analysis
1
Intrusion detec...
1
Threat detection
1
Cyberdefence
1
Pentesting
1
Security testing
1
Vulnerabilities
Digital risk ma...
Artificial inte...
Penetration tes...
Computer forensics
Malware analysis
Security