24 Techniques to Gather Threat Intel and Track Actors

Поделиться
HTML-код
  • Опубликовано: 3 окт 2024
  • In recent years, we delivered many talks detailing threat actors, their operations, and their tools. How did we conduct such research and gather such intel? In this talk, we share 24 techniques for gathering threat intel and tracking actors, or example: crimeware (undisclosed) vulnerabilities, C&C misconfig, and underground marketplaces. We explain our use of these techniques using 30 real cases.
    by Sun Huang and Wayne Huang
    Full Abstract & Presentation Materials:
    www.blackhat.c...

Комментарии • 2