Security Wall — Founder & CEO
Babar Khan Akhunzada is a 25-year-old cyber wizard, Founder & CEO of SecurityWall - Stacked on AI & Big Data technology to help enterprises and individuals enhance security capabilities through capability building, risk management and hybrid security audit.
Babar have helped numerous enterprises to tackle financial cyber crime issues on business application and infrastructure scale. Enterprises improved 95% of their security alignments and protected against cyber criminals for zero-paid orders leading to financial crisis. Babar is acknowledged by well-known tech companies for contributing to their products' security including Adobe, eBay, Apple, Nokia, Microsoft, Oracle, Sony, Redhat, Yahoo, DuckDuckGo, StackOverflow, NextCloud, and a 100+ more. Babar have many years of experience of bug bounty hunting and ethical work, which make him unique in all at such young age. Babar has served as a Security Consultant for Directorate of Information Technology and was responsible for security matters of Government Data Center during his tenure. Recently, Babar has been featured in 25-Under-25 as a young high achiever. Babar have been to many conferences and events including BlackHatMEA, OWASP, BSides, High Technology Crime Investigation Association, UC EXPO, OWASP Romania, Cyber Security Indonesia, EC-Council for Annual Halted Conference, HITCON Taiwan and many more. 演講議程
Hunting Sophisticated Droid Malwares - Battlefield of EspionageCybercrime cartels are engineering pernicious Android spyware, fueling a world of corporate espionage driven by weaponized malware. In this talk, we unpack real-world trojans and equip you with battle tactics to outsmart Android attackers. Android devices contain a trove of sensitive data, making them prime targets for cyber espionage. We will embark on an expedition, tracking the evolution of Android spyware used for targeted surveillance and extraction of sensitive data. Through an analysis of real-world examples, we will dissect sophisticated trojans developed by threat actors such as the Hamas group, who notably targeted Israeli IDF soldiers through weaponized Android malware. By exploring the tradecraft behind these invasive Android trojans, attendees will learn how such spyware camouflages itself to evade detection, reverse engineers and analyzes malicious code, and extracts sensitive data like messages, calls, files, and credentials. We will uncover the infrastructure and techniques employed in recent cyber espionage campaigns aimed at compromising Android devices on a mass scale. This talk will provide unprecedented insights into the growth of the commercial spyware industry and the shadowy cyber arms race fueling it. Attendees will gain a deep understanding of the methodologies and motivations driving these nefarious actors, enabling them to stay ahead of emerging threats. Moreover, we will delve into strategies for detection, investigation, and securing mobile app security, equipping attendees with the knowledge to outsmart Android threats lurking in the shadows. Attendees will leave armed with actionable tactics to identify and mitigate the risks posed by sophisticated Android spyware, safeguarding their organizations from the pernicious activities of cybercrime cartels. Through this immersive exploration of the Android spyware landscape, attendees will gain a comprehensive understanding of the evolving threat landscape and acquire the skills necessary to protect their organizations from the insidious consequences of corporate espionage and data breaches facilitated by these malicious tools. |