Jonathan Claudius is a Security Researcher at Trustwave. He is a member of Trustwave's SpiderLabs -the advanced security team focused on penetration testing, incident response, and application security. His weapon of choice is Ruby but also familiar with Perl, Python, C, C++ and the like. He is a A regular presenter at various information security conferences including B-Sides, THOTCON, SOURCE, DEFCON, BlackHat and others.
Alban Diquet is a security researcher whose interest include web and mobile security as well as SSL and PKI. He released an open source SSL scanner written in Python called SSLyze which was also added to the Backtrack Linux distribution.
Mark Vincent Yason is a security researcher on IBM's X-Force Advanced Research team. He authored the paper "The Art of Unpacking" and co-authored the papers "Reversing C++" and "Playing In The Reader X Sandbox", all of which were previously presented at BlackHat.
Paul Sabanal is a Filipino security researcher on IBM ISS's X-Force Advanced Research Team. He has spent most of his career as a reverse engineer, initially as a malware researcher and now focusing mainly on vulnerability analysis and exploit development. He has presented at Blackhat with Mark Yason on the subject of C++ reversing and Adobe Reader's Protected Mode Sandbox.
Ehraz Ahmed is a bug bounty hunter and self-proclaimed security analyst and security expert at the age of 17 as of this writing(circa September 2013). He has been listed in the Hall of Fames of most companies listed in Bugcrowd and Bugsheet. Recently, he claims that he filed a bug to Facebook that would allow an attacker to delete any Facebook account. Ahmed said he sent a video to demonstrate the critical flaw, but Facebook has again refused to pay the bug bounty because he tested the flaw on his friend’s account. He’s not happy, and wrote that he really needed the bounty. However, Facebook has fixed the flaw.
But the truth about this incident is that Ahmed's claim is actually a hoax. He manually used facebook.com/deactivate.php to deactivate the account that was used in his PoC.
Christopher C. Elisan is the author of "Malware, Rootkits and Botnets: A Beginner’s Guide". He is currently the Principal Malware Scientist at RSA. Elisan is one of the pioneers of Trend Micro’s TrendLabs where he held multiple technical and managerial positions. After Trend Micro, he led and established F-Secure's Asia R&D where he spearheaded multiple security research projects. He then joined Damballa where he specialized in malware research, analysis and reversing.
Collin Mulliner's main interest is in the area of security and privacy of mobile and embedded devices with an emphasis on mobile and smart phones. Since 1997 Collin has developed software and did security work for Palm OS, J2ME, Linux, Symbian OS, Windows Mobile, Android, and the iPhone. In 2006 he published the first remote code execution exploit based on the multimedia messaging service (MMS).
Prakhar Prasad is an Indian web app security researcher who has been acknowledged and credited by Facebook, Whitehat, Google, Paypal, Dropbox, Adobe, etc. His first bug bounty reward was from Google for finding a clickjacking bug in Google Website Translator Toolkit, that allowed him to add arbitrary "Admin/Editor" on someone's account by redressing page.
Lukas Reschke is a security researcher and developer who has responsibly disclosed vulnerabilities and exploits to Google, Apple, GitHub, Microsoft, Owncloud, Tiki Wiki, Facebook, Adobe, Dropbox, Swisscom, svg-edit, etc.
fin1te is a UK based Security Researcher who has discovered valid bug vulnerabilities and exploits for PayPal, Etsy, eBay, Google, Facebook, Netflix, etc. and has been rewarded / credited by these companies.