Explore the concept of Big Dark Data and its implications for cybersecurity in this 23-minute talk by Federico Charosky from Quorum Cyber. Delve into DNS tunneling, examining its mechanics and potential threats. Learn about various analysis techniques, including Bearfruit, NetFlow, and ATP, to detect and mitigate DNS-based attacks. Investigate real-world examples of DNS hijacking and internal IP address exploitation. Gain insights into Microsoft's TCL and machine learning applications in cybersecurity, including potential misfires. Conclude with a comprehensive understanding of Big Dark Data's role in modern cyber threats and defense strategies.
Big Dark Data - Federico Charosky, Quorum Cyber - Update