Aditya K Sood (Ph.D) is a security practitioner, researcher, and consultant. With more than 17 years of experience, he provides strategic leadership in information security, covering products and infrastructure. He is experienced in propelling the business by making security a salable business trait. He directs the development and implementation of application security policies, procedures, and guidelines to ensure security controls are deployed in line with business strategies. He works effectively with cross-functional teams to execute information security plans, including compliance, risk, secure development, penetration testing, vulnerability assessments, and threat modeling. Dr. Sood is interested in cloud security, malware automation and analysis, application security, and secure software design. He has worked on several projects related to product/appliance security, networks, mobile, and web applications while serving Fortune 500 clients for IOActive, KPMG, and others. He is also a founder of SecNiche Security Labs, an independent web portal for sharing research with the security community. He has authored several papers for various magazines and journals, including IEEE, Elsevier, CrossTalk, ISACA, Virus Bulletin, and Usenix. His work has been featured in several media outlets, including the Associated Press, Fox News, The Register, Guardian, Business Insider, and CBC. He has been an active speaker at industry conferences and presented at Blackhat, DEFCON, HackInTheBox, RSA, Virus Bulletin, OWASP, and many others. Dr. Sood obtained his Ph.D. in Computer Sciences from Michigan State University. Dr. Sood is also the author of "Targeted Cyber Attacks," “Empirical Cloud Security,” and "Combating Cyberattacks Targeting the AI Ecosystem" books. He obtained his GC under EB-1A (Alien of Extraordinary Ability) criteria.
He held positions such as Senior Director of Threat Research and Security Strategy, Head (Director) of Cloud Security, Chief Architect of Cloud Threat Labs, Lead Architect and Researcher, Senior Consultant, and others while working for companies such as F5 Networks, Symantec, Blue Coat, Elastica, IOActive, Coseinc, and KPMG.
At present, he is Vice Preseident of Security Engineering and AI Strategy at Aryaka.
• DeGruyter, Mercury Learning, November 2024
This book explores in detail the AI-driven cyber threat landscape, including inherent AI threats and risks that exist in Large Language Models (LLMs), Generative AI applications, and the AI infrastructure. The book highlights hands-on technical approaches to detect security flaws in AI systems and applications utilizing the intelligence gathered from real-world case studies. Lastly, the book presents a very detailed discussion of the defense mechanisms and practical solutions to secure LLMs, GenAI applications, and the AI infrastructure. The chapters are structured with a granular framework, starting with AI concepts, followed by practical assessment techniques based on real-world intelligence, and concluding with required security defenses. Artificial Intelligence (AI) and cybersecurity are deeply intertwined and increasingly essential to modern digital defense strategies. The book is a comprehensive resource for IT professionals, business leaders, and cybersecurity experts for understanding and defending against AI-driven cyberattacks.
• DeGruyter, Mercury Learning, July 2023
This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hand-on assessment techniques based on real-world studies, and concluding with recommendations including best practices.
• DeGruyter, Mercury Learning, April 2021
This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hand-on assessment techniques based on real-world studies, and concluding with recommendations including best practices.
• Syngress, April 2014
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
Syngress published this book (ISBN-10: 0128006048 | ISBN-13: 978-0128006047) and it is available at : Amazon, Elsevier Store, Barnes and Nobles and others. Third-party reviews about the book is available at : Help Net Security and RSA Conference Blog. Search Security Techtarget has displayed a one chapter of the book here : Bookshelf. The book is also hosted in the Toronto Public Library. The book is also available through Google Play.
Chinese transaltion is available at Amazon Bookstore.
A number of vulnerabilities have been disclosed under the hood of "Responsible Disclosure" and cannot be disclosed due to business and legal constraints. A number of disclosed vulnerabilities are listed below but not limited to:
Reported many vulnerabilities to vendors as a part of bug bounties (entirely fun). The list of vendors are presented below but are not limited to:
Hacking Botnet Command and Control Panels
Conference TalkDissecting the Design of SCADA Web HMIs: Hunting Vulnerabilities
Conference TalkHacking Botnets Die Hard: Owned and Operated
Conference TalkThe Government Can See EVERYTHING?! - Fact or Fictional
Conference TalkScammers taking advantage of Gmail, Google Drive users’ trust
Conference TalkThe Realm of 3rd Generation Botnet Attacks.
Conference TalkAdvancements in Botnet Attacks.
Conference TalkMangling with Botnets.
Conference Talk