About
*Security R&D*:
Building security products, identifying critical use-cases, designing…
Articles by Abhinav
Contributions
Activity
-
Hackmiami Conference XII Welcomes Secure Ideas, LLC Thank you for making this event possible!. Join us May 13th - 16th (Training), May 17th (Talks &…
Hackmiami Conference XII Welcomes Secure Ideas, LLC Thank you for making this event possible!. Join us May 13th - 16th (Training), May 17th (Talks &…
Liked by Abhinav Singh
-
2025 incoming! Narrowing focus of the AI safety meetup I've been running (away from superficial influencer hype, distanced from AGI kooks).…
2025 incoming! Narrowing focus of the AI safety meetup I've been running (away from superficial influencer hype, distanced from AGI kooks).…
Liked by Abhinav Singh
-
Thank you to our remarkable community who joined Vision Weekend USA this December across the Internet Archive, Lighthaven, and Future House. These…
Thank you to our remarkable community who joined Vision Weekend USA this December across the Internet Archive, Lighthaven, and Future House. These…
Liked by Abhinav Singh
Experience
Education
-
Noida institute of engineering and technology
-
Licenses & Certifications
-
Securitytube Python Scripting Expert (SPSE)
Securitytube
-
AWS Certified Solutions Architect - Associate
Amazon Web Services (AWS)
Issued ExpiresCredential ID YL81DJY1FMF11YSG -
-
Volunteer Experience
-
Technical Reviewer: LLM Security Datasets and Benchmarks Track
NeurIPS
- Present 9 months
Education
NeurIPS 2024 Datasets and Benchmarks Track Submission
-
Program Committee Member
RSA Conference
- Present 5 years 6 months
Education
Review board member for RSA conference San Francisco, Hackers & Threats track and Inclusive Security track.
-
Editorial Advisory Board Member
Information Systems Security Association (ISSA)
- 3 years 1 month
Science and Technology
Serving as the EAD member. Responsible for journal article review and content planning.
https://www.members.issa.org/page/JournalBoard -
AI Organizational Responsibilities Review
Cloud Security Alliance
- Present 1 year
Science and Technology
-
-
Cyber Security Instructor
Udacity
- 2 years 9 months
Education
Instructor for the Cybersecurity Engineering Nano-degree Program.
-
-
Technical Program Committee Member
1st International Conference on Advances in CyberSecurity 2019
- 6 months
Education
-
Cybersecurity Mentor
AnitaB.org
- 4 months
Education
Mentoring students undertaking ISACA cybersecurity essentials program.
Publications
-
How subdomain takeovers can punch holes in cloud data security
Normalyze Blog
See publicationSubdomain takeover continues to be a major security threat for organizations using cloud to deliver public services.
-
Old Scams Getting New Life in the Cloud
Netskope Blog
See publicationNetskope Threat Research Labs has recently discovered a new technique being used by scammers to reach potential victims: send emails and SMS messages that include links to common services, such as AWS, Azure, Alibaba cloud, and Google Docs.
-
Technical Blog: Cryptojackers on the hunt for your IaaS resources
https://www.netskope.com/blog/cryptojackers-iaas-resources/
-
International Book: Metasploit Penetration Testing Cookbook, Third Edition
Packt Publishing Co, UK.
See publicationThird edition of the widely popular series on Metasploit.
-
Symantec Official Blog- Malvertising and Dynamic DNS: A Never Ending Story
Symantec
See publicationA descriptive blog post describing one of the biggest malvertising campaigns of 2012.
-
Ebook - Metasploit Framework Guide For Pen-testers
PentestMag
See publicationSubmitted a detailed chapter on "Advance Meterpreter with API, Mixins and Railgun".
-
International Book - Metasploit Penetration Testing Cookbook, 1st Edition
Packt Publishing Co, UK.
See publicationA Penetration testing guide using Metasploit for Professionals. Sold over 5000 copies worldwide.
This book will help readers in thinking from a hacker’s perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level. -
White paper - Case study of Rihanna FacebookSpam
PacketStorm Security
See publicationA case study of the recent spam that hit Facebook. A detailed study.
-
White paper - Vulnerable Facebook Applications
PacketStorm Security
See publicationA withe paper dealing with Vulnerable Facebook applications.
-
Articles - Data Security , Art of ARP spoofing , Web 2.0 the new playground for hackers , Hacking Windows Admin passwords
HACKER5 Magazine
See publicationVarious articles published by HACKER5 monthly magazine dealing with several issues related to Hacking and Network Security.
Patents
-
Efficient Scanning for threat detection using In-Doc Markers
Issued US 10621346
See patentThe disclosed technology teaches reducing threat detection processing, including recognizing that a file is an edited version of a previously processed file and retrieving, from an archive, metadata values, hashes for property groups and an entropy measure of the previously processed file. Also included is parsing the file into metadata values and property groups and calculating hashes of the property groups and entropy measure for the file. The method further includes applying similarity…
The disclosed technology teaches reducing threat detection processing, including recognizing that a file is an edited version of a previously processed file and retrieving, from an archive, metadata values, hashes for property groups and an entropy measure of the previously processed file. Also included is parsing the file into metadata values and property groups and calculating hashes of the property groups and entropy measure for the file. The method further includes applying similarity measures to compare the metadata values, the entropy measures, and the hashes on the property groups, for the edited version and the previously processed file. When any similarity measure or combination of similarity measures reaches a trigger, the technology teaches processing the file by using a threat detection module to detect malware. Property groups include core properties, application properties, document content and programming scripts for the edited version of the file and the previously processed file.
Projects
-
Clara: Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets
- Present
See projectClara is Python based project used to scan your S3 bucket files with ClamAV and Yara signatures. Clara combines the two functionalities into a single project with some additional improvements:
Yara and ClamAV Scanning feature with signature updates.
Slack/Email SNS alerts.
DynamoDB storage support.
Python 3.7 support. -
Threat Intelligence Hunter - Github
- Present
See projectTIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own set of indicators.
-
Google Maps API extension to build a Click-2-Reach application
-
This project is a web application that helps the user to locate various important landmarks with features such as path locator, minimum distance, show route on map. The project's main focus was to build some extensions to present features of Google maps api like social sharing , shortest path calculator etc.
Honors & Awards
-
32 influential Malware Researchers to Follow
Peerlyst
-
Media Mention - Attackers Add a New Spin to Old Scams
Darkreading
https://www.darkreading.com/cloud/attackers-add-a-new-spin-to-old-scams-/d/d-id/1334626
For cybercriminals, cloud infrastructure services such as AWS and Azure provide a cheap, dynamic hosting option, says Abhinav Singh, threat researcher at Netskope. These services provide all of the native features of the Web, including Web hosting. -
Media Interview: Cloud-Based Malware Is The New Battlefront
LifeHacker
https://www.lifehacker.com.au/2017/08/cloud-based-malware-is-the-new-battlefront/
Security researcher Abhinav Singh works with security firm Netskope and is the author of the Metasploit Penetration Testing Cookbook and Instant Wireshark. I spoke with him at the recent RSA Conference Held in Singapore about how the cloud is the new vector being exploited by threat actors.
-
Media Mention - Malware menaces poison ads as Google, Yahoo! look away
The Register
http://www.theregister.co.uk/2015/08/27/malvertising_feature/?page=5
-
Media Interview : Cyber Resilience in Financial Institutions
Cyber Resilience in Financial Institutions
http://www.me-uk.com/summit/newsletter.asp?eventid=21663&RecID=8260
-
“literary” star of the compendium - Hakin9
Hakin9 Magazine
Winner of Metasploit Compendium contest based on public choice for my articles provided to Hakin9 magazine.
http://hakin9.org/metasploit-contest/
Recommendations received
4 people have recommended Abhinav
Join now to viewMore activity by Abhinav
-
Woke up to an amazing milestone from Maven! 🎉 I’m honored to share the incredible impact of my journey with Maven this year! Together, we reached…
Woke up to an amazing milestone from Maven! 🎉 I’m honored to share the incredible impact of my journey with Maven this year! Together, we reached…
Liked by Abhinav Singh
-
Throwback to Outliers Builders Summit, where, for the first time, we brought the builders community together for a day of meaningful content and…
Throwback to Outliers Builders Summit, where, for the first time, we brought the builders community together for a day of meaningful content and…
Liked by Abhinav Singh
-
I recently started learning Ruby, and while performing a source code audit for Maybe (The OS for your personal finances), I discovered two…
I recently started learning Ruby, and while performing a source code audit for Maybe (The OS for your personal finances), I discovered two…
Liked by Abhinav Singh
-
Vision Weekend USA brought together diverse perspectives and expertise under one mission: exploring paths to progress. Across three days in the Bay…
Vision Weekend USA brought together diverse perspectives and expertise under one mission: exploring paths to progress. Across three days in the Bay…
Liked by Abhinav Singh
-
Excited to see Letta in TechCrunch's most disruptive startups of 2024 list 👀 Memory is the most important problem in AI today. LLMs are the new…
Excited to see Letta in TechCrunch's most disruptive startups of 2024 list 👀 Memory is the most important problem in AI today. LLMs are the new…
Liked by Abhinav Singh
-
🚀 We're Hiring a Frontend JavaScript Hacker at c/side!! At c/side (cside.dev), we build tools that analyze the modern web. To strengthen our team,…
🚀 We're Hiring a Frontend JavaScript Hacker at c/side!! At c/side (cside.dev), we build tools that analyze the modern web. To strengthen our team,…
Liked by Abhinav Singh
-
Sales for the Workshops Insomni'hack are open! Gain hands-on experience with Abhinav Singh in GenAI and LLM security through CTF-style training…
Sales for the Workshops Insomni'hack are open! Gain hands-on experience with Abhinav Singh in GenAI and LLM security through CTF-style training…
Liked by Abhinav Singh
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Abhinav Singh in United States
-
Abhinav Singh
-
Abhinav S.
Director Cloud Analytics Services - Modern Data Platform - Advocate Health
-
Abhinav S.
-
Abhinav Singh
Executive Director @ Pride Global | Lean Six Sigma Black Belt
131 others named Abhinav Singh in United States are on LinkedIn
See others named Abhinav Singh