2023-01-01 |
2022 CTI-EU Talk: Threat Landscape and Defences Against Mobile Surveillance Implants |
conferences/trainings ‧ xorl |
|
2022-12-23 |
OSINT: A Summary of SIDEWINDER Operations in 2022 |
threat intelligence ‧ xorl |
|
2022-12-22 |
BSides Cyprus: Cloud… Just somebody else’s computer |
conferences/trainings ‧ xorl |
|
2022-07-07 |
Why the Equation Group (EQGRP) is NOT the NSA |
threat intelligence ‧ xorl |
|
2022-06-22 |
The forgotten SUAVEEYEFUL FreeBSD software implant of the EQUATION GROUP |
reverse engineering ‧ xorl |
|
2022-04-07 |
Ideas for Software Supply-Chain Attacks Simulation by Red Teams |
security ‧ xorl |
|
2021-12-28 |
Guide on Offensive Operations for Companies |
security ‧ xorl |
|
2021-10-27 |
Predict 21: Tradecraft Tips for Unusual Recorded Future Uses |
conferences/trainings ‧ xorl |
|
2021-10-19 |
Overview of 0days seen in the wild the last 7 years |
security ‧ xorl |
|
2021-10-18 |
Offensive Security Private Companies Inventory |
threat intelligence ‧ xorl |
|
2021-08-16 |
x33fcon: In nation-state actor’s shoes |
conferences/trainings ‧ xorl |
|
2021-07-19 |
My ICCH talk on DE-59 cipher machine |
conferences/trainings ‧ xorl |
|
2021-07-07 |
BSides Athens 2021: .GR TLD hijacking |
conferences/trainings ‧ xorl |
|
2021-05-13 |
Exploitation of the Swarmshop data leak |
threat intelligence ‧ xorl |
|
2021-05-06 |
Iran Cyber Operations Groups |
threat intelligence ‧ xorl |
|
2021-05-03 |
Exploitation of data breaches for executive protection |
threat intelligence ‧ xorl |
|
2021-04-28 |
EU Cyber Operations Groups |
threat intelligence ‧ xorl |
|
2021-04-27 |
OSAC NL Chapter: Cyber Threat Briefing |
conferences/trainings ‧ xorl |
|
2021-04-24 |
North Korea (DPRK) Cyber Operations Groups |
threat intelligence ‧ xorl |
|
2021-04-23 |
Analysis of the CardingMafia March 2021 data breach |
threat intelligence ‧ xorl |
|
2021-04-23 |
BSidesBUD 2020: A gentle introduction to building a threat intelligence team |
conferences/trainings ‧ xorl |
|
2021-04-21 |
Chinese Cyber Operations Groups |
threat intelligence ‧ xorl |
|
2021-04-18 |
US Cyber Operations Groups |
threat intelligence ‧ xorl |
|
2021-04-16 |
Russia’s Cyber Operations Groups |
threat intelligence ‧ xorl |
|
2021-04-02 |
BSides Athens 2020: Threat Landscape: Greece |
conferences/trainings ‧ xorl |
|
2021-04-01 |
HUMINT in the age of cyber |
conferences/trainings ‧ xorl |
|
2021-03-30 |
PrivSec Global: Mastering the use of Cyber Threat Intelligence |
conferences/trainings ‧ xorl |
|
2021-03-29 |
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things |
books ‧ xorl |
|
2021-03-25 |
Why tasking is important in a threat intelligence team (using NSA’s UTT as example) |
threat intelligence ‧ xorl |
|
2021-03-25 |
Passive collection of satellite traffic for threat intelligence |
threat intelligence ‧ xorl |
|
2021-03-25 |
On attribution: APT28, APT29…Turla: No, they are NOT the same |
threat intelligence ‧ xorl |
|
2021-03-25 |
DeepINTEL 2020 |
conferences/trainings ‧ xorl |
|
2021-03-25 |
Example of SIGINT-enabled cyber attribution from the NSA |
threat intelligence ‧ xorl |
|
2021-03-25 |
How much is unauthorized access sold for? |
threat intelligence ‧ xorl |
|
2021-03-25 |
The role of linguists in threat intelligence teams |
threat intelligence ‧ xorl |
|
2021-03-25 |
Dumpster diving is still alive |
security ‧ xorl |
|
2021-03-25 |
Lessons from the Twitter Saudi espionage case |
threat intelligence ‧ xorl |
|
2021-03-25 |
FIRST Cyber Threat Intelligence Webinar Series: Building an intelligence-driven organization |
conferences/trainings ‧ xorl |
|