Skip to content

ch33r10/BSidesSF2023

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

BSidesSF2023 header

     

✨THE EXPANDING UNIVERSE OF CYBER THREATS✨

"Somewhere, something incredible is waiting to be known." - Carl Sagan

Security programs are responsible for keeping up with and getting ahead of the rapid growth of cyber threats. Enterprise organizations must monitor for changes in threat actor TTPs, keep track of emerging vulnerabilities, assess gaps related to technological advances that outpace security solutions, and the list goes on. A solution that some organizations are deploying to help manage the expanding threat landscape is cyber threat intelligence. Some enterprise security teams rely on cyber threat intelligence to: prioritize and provide context to threats, dispel FUD (fear, uncertainty, and doubt), and share actionable, relevant, timely, and accurate insights with decision-makers. Join me in exploring cyber threat intelligence and the expanding universe of cyber threats.

👨‍🚀🚀👽DISCOVER SOMETHING INCREDIBLE🛰️🔭🪐

  • Bluehat 2022 - Andrew Morris - Staying Ahead of Internet Background Exploitation - Link
  • Bot Conf 2022 - Carlos Rubio Ricote & Markel Picado Ortiz - Qbot Code Evolution - Link
  • Cyberwarcon - Link
    • Focus: "specter of destruction, disruption, and malicious influence on our society through cyber capabilities"
      • Cyberwarcon YouTube Videos - Link
  • Mandiant - This is not a test: APT41 initiates global intrusion campaign using multiple exploits - Link
  • Mandiant - M-Trends 2023 - Link
  • Proofpoint - TA423/Red Ladon: Espionage in South China Sea - Link
  • Red Team Blogs
    • Red Team Notes - Link
    • Awesome Red Teaming - (No Longer Updated) - Link
  • ReliaQuest - WannaCry: An Analysis of Competing Hypotheses - Link
  • Sleuthcon - Link
    • Focus: "cybercrime and financially-motivated cyber threats"
      • Sleuthcon YouTube Videos - Link
  • Structured Analytic Techniques for Intelligence Analysis by Randolph H. Pherson and Richards J. Heuer - Link
  • Target's Security Team ROCKS!!!
    • SANS CTI Summit 2021: Riding the WAVE to Better Collaboration and Security by Kelsey Helms and Nate Icart - Link
    • SANS Threat Hunting Summit 2019: Evolving the Hunt: A Case Study in Improving a Mature Hunt Program by David J. Bianco and Cat Self - Link
  • Verizon - DBIR (Data Breach Investigations Report) - Link
  • VirusTotal Sample - Link

FOR THE LAWYERS
"The opinions expressed in this Github repo are those of the individual account, in their individual capacity, and not necessarily those of the employers. Mention of any vendors, services, products, or otherwise does not endorse them as a vendor. This content and any related discussions are solely the views, opinions, and experiences of the participants and should not be presumed to reflect the opinion or the official position of any employers of the participants. Examples and views provided herein, including strategies, goals, targets, and indicators are for illustrative purposes only and should not be regarded as representative of the participants' employers or respective portfolios. To the extent that this participation, discussion, and interview outlines a general technology direction, the participants' employers have no obligation to pursue any such approach or to develop or use any functionality mentioned herein. Any suggested technology strategy or possible future developments are subject to change at the employers' sole discretion without notice. Content in this presentation is the intellectual property of the applicable creators and may be protected under the copyright laws of the United States and/or other countries. All trademarks are the property of their respective owners and are used for informational purposes only."

About

BSidesSF Keynote 2023 - The Expanding Universe of Cyber Threats

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published