Главная
Study mode:
on
1
Intro
2
Franks background
3
Information vs Intelligence
4
Three Principles
5
Exploit Kit
6
Destroy Developer Value
7
Anomaly Bumps
8
User Agents
9
BlackSpider Tool
10
Crawl Walk Run
11
Building Custom Alerts
12
Tactical Actions
13
Question Thoughts
14
Artificial Intelligence Machine Learning
15
Use your own tools
16
Blacklists
17
Questions
Description:
Explore threat intelligence principles and practical techniques in this 42-minute conference talk from BSidesSTL 2019. Learn about the distinction between information and intelligence, three key principles of threat intelligence, and strategies for exploiting kits and destroying developer value. Discover how to identify anomalies, analyze user agents, and utilize tools like BlackSpider. Gain insights into building custom alerts, implementing tactical actions, and leveraging artificial intelligence and machine learning for cybersecurity. Understand the importance of using your own tools and managing blacklists effectively. Engage with thought-provoking questions and discussions on modern threat intelligence practices.

Judo Threat Intelligence - Frank Angiolelli

Add to list