About
*Security R&D*:
Building security products, identifying critical use-cases, designing…
Articles by Abhinav
Activity
-
After nearly a decade, I’m closing my chapter at Netskope — and what a chapter it has been. From those early days in a small downtown Los Altos…
After nearly a decade, I’m closing my chapter at Netskope — and what a chapter it has been. From those early days in a small downtown Los Altos…
Liked by Abhinav Singh
-
Had an amazing time at DEF CON Singapore last week attending the "AI SecureOps: Attacking & Defending AI Applications & Agents" training. Learned a…
Had an amazing time at DEF CON Singapore last week attending the "AI SecureOps: Attacking & Defending AI Applications & Agents" training. Learned a…
Liked by Abhinav Singh
-
This reminds me of the shadow binary installation era on Windows(you install WinZip, suddenly your browser has an ask.com plugin installed). we have…
This reminds me of the shadow binary installation era on Windows(you install WinZip, suddenly your browser has an ask.com plugin installed). we have…
Shared by Abhinav Singh
Experience
Licenses & Certifications
-
-
Securitytube Python Scripting Expert (SPSE)
Securitytube
-
AWS Certified Solutions Architect - Associate
Amazon Web Services (AWS)
Issued ExpiresCredential ID YL81DJY1FMF11YSG -
-
Volunteer Experience
-
Technical Reviewer: LLM Security Datasets and Benchmarks Track
NeurIPS
- Present 2 years 1 month
Education
NeurIPS 2024 Datasets and Benchmarks Track Submission
-
Program Committee Member
RSA Conference
- Present 6 years 10 months
Education
Review board member for RSA conference San Francisco, Hackers & Threats track and Inclusive Security track.
-
Editorial Advisory Board Member
Information Systems Security Association (ISSA)
- 3 years 1 month
Science and Technology
Serving as the EAD member. Responsible for journal article review and content planning.
https://www.members.issa.org/page/JournalBoard -
AI Organizational Responsibilities Review
Cloud Security Alliance
- Present 2 years 4 months
Science and Technology
-
-
Cyber Security Instructor
Udacity
- 2 years 9 months
Education
Instructor for the Cybersecurity Engineering Nano-degree Program.
-
-
Technical Program Committee Member
1st International Conference on Advances in CyberSecurity 2019
- 6 months
Education
-
Cybersecurity Mentor
AnitaB.org
- 4 months
Education
Mentoring students undertaking ISACA cybersecurity essentials program.
Publications
-
Symantec Official Blog- Malvertising and Dynamic DNS: A Never Ending Story
Symantec
See publicationA descriptive blog post describing one of the biggest malvertising campaigns of 2012.
-
Ebook - Metasploit Framework Guide For Pen-testers
PentestMag
See publicationSubmitted a detailed chapter on "Advance Meterpreter with API, Mixins and Railgun".
-
International Book - Metasploit Penetration Testing Cookbook, 1st Edition
Packt Publishing Co, UK.
See publicationA Penetration testing guide using Metasploit for Professionals. Sold over 5000 copies worldwide.
This book will help readers in thinking from a hacker’s perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level. -
White paper - Case study of Rihanna FacebookSpam
PacketStorm Security
See publicationA case study of the recent spam that hit Facebook. A detailed study.
-
White paper - Vulnerable Facebook Applications
PacketStorm Security
See publicationA withe paper dealing with Vulnerable Facebook applications.
-
Articles - Data Security , Art of ARP spoofing , Web 2.0 the new playground for hackers , Hacking Windows Admin passwords
HACKER5 Magazine
See publicationVarious articles published by HACKER5 monthly magazine dealing with several issues related to Hacking and Network Security.
Patents
-
Efficient Scanning for threat detection using In-Doc Markers
Issued US 10621346
See patentThe disclosed technology teaches reducing threat detection processing, including recognizing that a file is an edited version of a previously processed file and retrieving, from an archive, metadata values, hashes for property groups and an entropy measure of the previously processed file. Also included is parsing the file into metadata values and property groups and calculating hashes of the property groups and entropy measure for the file. The method further includes applying similarity…
The disclosed technology teaches reducing threat detection processing, including recognizing that a file is an edited version of a previously processed file and retrieving, from an archive, metadata values, hashes for property groups and an entropy measure of the previously processed file. Also included is parsing the file into metadata values and property groups and calculating hashes of the property groups and entropy measure for the file. The method further includes applying similarity measures to compare the metadata values, the entropy measures, and the hashes on the property groups, for the edited version and the previously processed file. When any similarity measure or combination of similarity measures reaches a trigger, the technology teaches processing the file by using a threat detection module to detect malware. Property groups include core properties, application properties, document content and programming scripts for the edited version of the file and the previously processed file.
Projects
-
AI Security in Action: Attacking & Defending AI Application & Services - Course Instructor
Link: https://maven.com/ai-secureops/ai-security-cohort
Master AI & LLM security through CTF-style cohort, tackling real-world attacks, defenses, adversarial threats, and Responsible AI principles -
Metasploit Penetration Testing Cookbook - 1st, 2nd, 3rd Editions
-
Third Edition 2018:
https://searchworks.stanford.edu/view/13217751
Second Edition: 2015
https://searchworks.stanford.edu/view/13217751
First Edition: 2012
https://searchworks.stanford.edu/view/13015903 -
Wireshark Starter Book - 1st Edition
-
https://www.amazon.in/Instant-Wireshark-Starter-Abhinav-Singh/dp/1849695644
-
Clara: Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets
-
See projectClara is Python based project used to scan your S3 bucket files with ClamAV and Yara signatures. Clara combines the two functionalities into a single project with some additional improvements:
Yara and ClamAV Scanning feature with signature updates.
Slack/Email SNS alerts.
DynamoDB storage support.
Python 3.7 support. -
Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit- Book
-
Jul 2019
712 pages
1st Edition
Key benefits
Gain insights into the latest antivirus evasion techniques
Set up a complete pentesting environment using Metasploit and virtual machines
Discover a variety of tools and techniques that can be used with Kali Linux -
Threat Intelligence Hunter - Github
-
See projectTIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own set of indicators.
Honors & Awards
-
32 influential Malware Researchers to Follow
Peerlyst
-
Media Mention - Attackers Add a New Spin to Old Scams
Darkreading
https://www.darkreading.com/cloud/attackers-add-a-new-spin-to-old-scams-/d/d-id/1334626
For cybercriminals, cloud infrastructure services such as AWS and Azure provide a cheap, dynamic hosting option, says Abhinav Singh, threat researcher at Netskope. These services provide all of the native features of the Web, including Web hosting. -
Media Interview: Cloud-Based Malware Is The New Battlefront
LifeHacker
https://www.lifehacker.com.au/2017/08/cloud-based-malware-is-the-new-battlefront/
Security researcher Abhinav Singh works with security firm Netskope and is the author of the Metasploit Penetration Testing Cookbook and Instant Wireshark. I spoke with him at the recent RSA Conference Held in Singapore about how the cloud is the new vector being exploited by threat actors.
-
Media Mention - Malware menaces poison ads as Google, Yahoo! look away
The Register
http://www.theregister.co.uk/2015/08/27/malvertising_feature/?page=5
-
Media Interview : Cyber Resilience in Financial Institutions
Cyber Resilience in Financial Institutions
http://www.me-uk.com/summit/newsletter.asp?eventid=21663&RecID=8260
-
“literary” star of the compendium - Hakin9
Hakin9 Magazine
Winner of Metasploit Compendium contest based on public choice for my articles provided to Hakin9 magazine.
http://hakin9.org/metasploit-contest/
Recommendations received
4 people have recommended Abhinav
Join now to viewMore activity by Abhinav
-
Excited to share that Unosecur will be at My Security Event organised by mysecurityevent Community für eine digital sichere Welt in Berlin on May…
Excited to share that Unosecur will be at My Security Event organised by mysecurityevent Community für eine digital sichere Welt in Berlin on May…
Liked by Abhinav Singh
-
Great energy at the OWASP AppSec Days Singapore x SecTalks Singapore meetup this week! 🚀 thanks to our sponsors for making this possible: Dexian…
Great energy at the OWASP AppSec Days Singapore x SecTalks Singapore meetup this week! 🚀 thanks to our sponsors for making this possible: Dexian…
Liked by Abhinav Singh
-
Your executives want Microsoft Copilot yesterday. Your security team wants six months more. Both are right. Both are stuck. The good news: Zscaler…
Your executives want Microsoft Copilot yesterday. Your security team wants six months more. Both are right. Both are stuck. The good news: Zscaler…
Liked by Abhinav Singh
-
On 27 April, the OWASP Singapore Chapter, together with SecTalks Singapore, hosted our first security meetup of 2026 and the energy in the room said…
On 27 April, the OWASP Singapore Chapter, together with SecTalks Singapore, hosted our first security meetup of 2026 and the energy in the room said…
Liked by Abhinav Singh
-
Well, that escalated quickly (h/t Gadi Evron) https://lnkd.in/gnQrkbdX Will be interesting to see if the Streisand Effect inspires more adversaries…
Well, that escalated quickly (h/t Gadi Evron) https://lnkd.in/gnQrkbdX Will be interesting to see if the Streisand Effect inspires more adversaries…
Liked by Abhinav Singh
-
Hi everyone, our meet up OWASP Singapore Chapter x SecTalks Singapore is next week Monday :) We’ve got a surprise lined up for attendees our event…
Hi everyone, our meet up OWASP Singapore Chapter x SecTalks Singapore is next week Monday :) We’ve got a surprise lined up for attendees our event…
Liked by Abhinav Singh
-
It was a pleasure meeting Tracey Davies (Byers), President of Money20/20 in Bangkok. Money20/20 has consistently been at the forefront of bringing…
It was a pleasure meeting Tracey Davies (Byers), President of Money20/20 in Bangkok. Money20/20 has consistently been at the forefront of bringing…
Liked by Abhinav Singh
-
Matt Johansen hits it out of the park, as usual. https://lnkd.in/gw_xNme5
Matt Johansen hits it out of the park, as usual. https://lnkd.in/gw_xNme5
Liked by Abhinav Singh
-
Great experience attending Security BSides Mussoorie this year! ⛰️ It was an incredible opportunity to connect with fellow Cybersecurity leaders and…
Great experience attending Security BSides Mussoorie this year! ⛰️ It was an incredible opportunity to connect with fellow Cybersecurity leaders and…
Liked by Abhinav Singh
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content