Chairman Address

Allan Dyer

10:00 AM to 10:10 AM - SGT

Welcome Address

J. Kesavardhanan

10:10 AM to 10:20 AM - SGT


10:50 AM to 10:55 AM - SGT

Arm'd & Dangerous: Analyzing arm64 Malware Targeting macOS

Patrick Wardle


10:55 AM to 11:25 AM - SGT

Cobalt Counter Strike

Lokesh J

K7 Computing pvt ltd

11:25 AM to 11:55 AM - SGT


11:55 AM to 12:00 PM - SGT

XMRIG MINER – Taking stealth to a new level!

Tejaswini Sandapolla

Quick Heal Technologies Limited

12:00 PM to 12:30 PM - SGT

GhostEmperor: From ProxyLogon to Kernel Mode, Story of a Modern Day Rootkit

Mark Lechtik, Aseel Kayal, Paul Rascagnères, Vasiliy Berdnikov


12:30 PM to 01:00 PM - SGT


01:00 PM to 01:05 PM - SGT


01:45 PM to 01:50 PM - SGT


Gil Mansharov, Ben Herzog

Check Point

01:50 PM to 02:20 PM - SGT

Using third-party SDKs to detect repackaged malicious Android applications

Catalin-Valeriu Lita , Doina Cosovan


02:20 PM to 02:50 PM - SGT

Closing Address

02:50 PM to 02:55 PM - SGT

Welcome to Day2


10:00 AM to 10:05 AM - SGT

Modern World Android Malware and Sandbox Evasion Techniques

Shivang Desai

Zscaler Inc

10:05 AM to 10:35 AM - SGT

Attacking Apple: Mac Malware and Zero-Day Threats in 2021

Joshua A. Long


10:35 AM to 11:05 AM - SGT


11:05 AM to 11:10 AM - SGT

Auto classification Web Attack and model to detect authorization bypass exploit

Giang Hoang Nguyen, Tai Anh Nguyen

CMC CyberSecurity

11:10 AM to 11:40 AM - SGT

Dissecting the Exchange Server Saga: A Practical Deep Dive into the Vulnerabilities

P Mohith Kalyan, Anurag Shandilya

K7 Computing pvt ltd

11:40 AM to 12:10 PM - SGT


12:10 PM to 12:15 PM - SGT

Meet Indra: Uncovering the Hackers Behind Attacks on Iran Railways

Itay Cohen, Alexandra Gofman

Check Point

12:55 PM to 01:25 PM - SGT


01:25 PM to 01:30 PM - SGT

Transparent Tribe VBA code and its Sidewinder mimicry

Vanja Svajcer


01:30 PM to 02:00 PM - SGT


Vladislav Hrčka


02:00 PM to 02:30 PM - SGT

Award Ceremony

02:30 PM to 02:40 PM - SGT

Closing Address

02:40 PM to 02:45 PM - SGT

Qbot & IcedID Loader are the Dons Given Don Emotet Sleeps with the Fishes

Arun Kumar S, Rajeshkumar R

K7 Computing pvt ltd

Abusing Excel 4.0 Macro to Distribute Malware

Prashant Tilekar, Anjali Raut

Quick Heal Technologies

The (R)Evil Within

Janus Agcaoili

Trend Micro

The DarkSide of ransomware (Colonial Pipeline attack and other threats)

Rohit bankoti, Souhardya Sardar

Cyberstanc corp

Old and Bold: DDoS Advancing the Gameplay of Ransomwares

Felissa Mariz D. Marasigan , Arabelle Mae F. Ebora

Verizon, MERALCO

Latest Sandbox Evasion Techniques

Ramesh Dhanalakota, Mary Silviya


Death by a thousand cuts: the rise and rise of information stealers

Dmitry Bestuzhev, Santiago Martin Pontiroli


Tales From The DarkSide

Christopher Elisan


Hunting in the Field of Cybersecurity: The Microsoft Exchange Fiasco

Earle Maui Earnshaw, Arianne Dela Cruz

Trend Micro Inc.

Note: There are possibilities of changes in the program timing and slots till the conference date, keep visiting our website to keep track of the latest updates.