Niraj Mahajan (@niraj1mahajan) 's Twitter Profile
Niraj Mahajan

@niraj1mahajan

Microsoft 2024 MVR | #BugBounty Hunter | Application Security | Discovered 11x CVEs

ID: 162688452

linkhttps://www.linkedin.com/in/niraj1mahajan/ calendar_today04-07-2010 11:54:32

498 Tweet

1,1K Followers

656 Following

Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

Vaibhav Deshmukh and Sudhir Devkar, Senior Security Researchers at Microsoft, broke down the operations of Black Basta, a ransomware group that’s extorted over $100M targeting critical infrastructure. The talk covered: • Human-operated ransomware: Customized attacks across

Vaibhav Deshmukh and Sudhir Devkar, Senior Security Researchers at Microsoft, broke down the operations of Black Basta, a ransomware group that’s extorted over $100M targeting critical infrastructure.

The talk covered:
• Human-operated ransomware: Customized attacks across
Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

At #BlueHatIndia, Ali Abdollahi, Application and Offensive Security Manager, Canon EMEA, delivered a deep dive into the evolving landscape of mobile network security with his talk, “Breaking the Signal: Red Teaming Mobile Networks in 2025.” Drawing on recent real-world events

At #BlueHatIndia, Ali Abdollahi, Application and Offensive Security Manager, Canon EMEA, delivered a deep dive into the evolving landscape of mobile network security with his talk, “Breaking the Signal: Red Teaming Mobile Networks in 2025.” Drawing on recent real-world events
Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

Anurag Bohra and Anant Pulgam, Senior Security Researchers at Microsoft, discussed how the XCSSET macOS malware has evolved to become stealthier and more dangerous than ever. Now armed with advanced obfuscation and persistence, XCSSET infects Xcode projects using randomly chosen

Anurag Bohra and Anant Pulgam, Senior Security Researchers at Microsoft, discussed how the XCSSET macOS malware has evolved to become stealthier and more dangerous than ever. 
Now armed with advanced obfuscation and persistence, XCSSET infects Xcode projects using randomly chosen
Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

Sathwik Ram Prakki (Sathwik Ram Prakki), Senior Security Researcher at (SEQRITE) / (Quick Heal) discussed how APT group SideCopy (linked to APT36) is evolving its tactics across platforms at BlueHat india. His talk revealed a shift from HTA-based attacks to MSI stagers, targeting

Sathwik Ram Prakki (<a href="/PrakkiSathwik/">Sathwik Ram Prakki</a>), Senior Security Researcher at (<a href="/Seqrite/">SEQRITE</a>) / (<a href="/quickheal/">Quick Heal</a>) discussed how APT group SideCopy (linked to APT36) is evolving its tactics across platforms at BlueHat india.

His talk revealed a shift from HTA-based attacks to MSI stagers, targeting
Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

At BlueHat India, Joshua Bahirvani and Shaleen Dev PK, Senior Security Researchers, Microsoft, took us into the world of dormant and orphaned cloud identities (aka zombie apps) and how attackers exploit them for persistent, stealthy access. Their talk broke down how Non-Human

At BlueHat India, Joshua Bahirvani and Shaleen Dev PK, Senior Security Researchers, Microsoft, took us into the world of dormant and orphaned cloud identities (aka zombie apps) and how attackers exploit them for persistent, stealthy access.

Their talk broke down how Non-Human
Sravan Akkaram (@sravanakkaram) 's Twitter Profile Photo

Day 1 of #BlueHatIndia was absolutely electrifying with Tom Gallagher opening remarks David Weston (DWIZZZLE) keynote & insightful sessions🙌Best part? Connecting with Security Response fellow researchers & security pros 🫶Excited for Day 2-let’s meet up and make it awesome! Ashish Dhone

Day 1 of #BlueHatIndia was absolutely electrifying with <a href="/secbughunter/">Tom Gallagher</a> opening remarks <a href="/dwizzzleMSFT/">David Weston (DWIZZZLE)</a> keynote &amp; insightful sessions🙌Best part? Connecting with <a href="/msftsecresponse/">Security Response</a> fellow researchers &amp; security pros 🫶Excited for Day 2-let’s meet up and make it awesome! <a href="/ashketchum_16/">Ashish Dhone</a>
Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

Day 1 of BlueHat India brought together a passionate, global community of security professionals, from seasoned defenders to up-and-coming researchers, who came to learn, share, and connect. We kicked off with keynotes from Tom Gallagher (Tom Gallagher) and David "DWIZZZLE"

Day 1 of BlueHat India brought together a passionate, global community of security professionals, from seasoned defenders to up-and-coming researchers, who came to learn, share, and connect.
 
We kicked off with keynotes from Tom Gallagher (<a href="/secbughunter/">Tom Gallagher</a>) and David "DWIZZZLE"
Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

At BlueHat India Day 2, Ram Shankar Siva Kumar (Ram Shankar Siva Kumar), Microsoft’s resident Data Cowboy and Head of the AI Red Team, took the stage for a keynote that was equal parts eye-opening and unsettling. Ram unpacked what happens when adversarial machine learning meets generative AI.

At BlueHat India Day 2, Ram Shankar Siva Kumar (<a href="/ram_ssk/">Ram Shankar Siva Kumar</a>), Microsoft’s resident Data Cowboy and Head of the AI Red Team, took the stage for a keynote that was equal parts eye-opening and unsettling. Ram unpacked what happens when adversarial machine learning meets generative AI.
Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

Thank you to everyone who joined us this week. BlueHat is more than just a conference, it’s a community. One where the security community from inside and outside Microsoft come together as peers to share, challenge, and learn from one another. From deep technical talks to

Thank you to everyone who joined us this week. BlueHat is more than just a conference, it’s a community. One where the security community from inside and outside Microsoft come together as peers to share, challenge, and learn from one another.

From deep technical talks to
Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

Missed BlueHat India 2025? Catch up now! Talks from Microsoft & global security experts are live on the Security Response YouTube channel: youtube.com/@msftsecrespon… From AI threats to ransomware ops, mobile red teaming and more, don’t miss these deep-dive sessions. #BlueHatIndia

Missed BlueHat India 2025? Catch up now!
Talks from Microsoft &amp; global security experts are live on the <a href="/msftsecresponse/">Security Response</a> YouTube channel: youtube.com/@msftsecrespon…

From AI threats to ransomware ops, mobile red teaming and more, don’t miss these deep-dive sessions.

#BlueHatIndia
Niraj Mahajan (@niraj1mahajan) 's Twitter Profile Photo

✨ Honoured to be recognised as a Microsoft Most Valuable Researcher (MVR) for 2025! A heartfelt thank you to the Microsoft Security Response Center for this recognition and for their continued support in fostering a vibrant security research community.

✨ Honoured to be recognised as a Microsoft Most Valuable Researcher (MVR) for 2025!

A heartfelt thank you to the <a href="/msftsecresponse/">Microsoft Security Response Center</a> for this recognition and for their continued support in fostering a vibrant security research community.
Tom Gallagher (@secbughunter) 's Twitter Profile Photo

The MSRC team and I are excited up to connect and learn from security researchers and the community at Black Hat & DEF CON this week! If you spot me, I might have a shirt with your name on it. #blackhat2025 #blackhat #defcon Microsoft Security Response Center

The MSRC team and I are excited up to connect and learn from security researchers and the community at Black Hat &amp; DEF CON this week! If you spot me, I might have a shirt with your name on it. #blackhat2025 #blackhat #defcon <a href="/msftsecresponse/">Microsoft Security Response Center</a>