via @lawrenceabrams.bsky.social & @bleepingcomputer.com
via @lawrenceabrams.bsky.social & @bleepingcomputer.com
#BSidesPyongyang25 #BSPY25
https://www.twitch.tv/bsidespyongyang
https://www.youtube.com/@BSidesPyongyang
#BSidesPyongyang25 #BSPY25
https://www.twitch.tv/bsidespyongyang
https://www.youtube.com/@BSidesPyongyang
The CFP closes soon — submit your proposal by Nov 15 to participate in the only conference dedicated to advancing Attack Path Management.
📝 Submit: ghst.ly/socon26-cfp
The CFP closes soon — submit your proposal by Nov 15 to participate in the only conference dedicated to advancing Attack Path Management.
📝 Submit: ghst.ly/socon26-cfp
It converts thousands records in seconds and automatically generates a Base that you can use to explore and edit the data.
It converts thousands records in seconds and automatically generates a Base that you can use to explore and edit the data.
google cloud / mandiant blogged about a cool investigation that I got to pitch in on & had a small verse to contribute in the broader context of it. these are the things that remind me how much I enjoy what I do.
google cloud / mandiant blogged about a cool investigation that I got to pitch in on & had a small verse to contribute in the broader context of it. these are the things that remind me how much I enjoy what I do.
Slides and videos from ATT&CKcon 6.0 are now posted in an easy to find way. Check out attack.mitre.org/resources/at... to check out our great talks (and Couch Talks) from October, or even check out past ATT&CKcons from that same page.
Slides and videos from ATT&CKcon 6.0 are now posted in an easy to find way. Check out attack.mitre.org/resources/at... to check out our great talks (and Couch Talks) from October, or even check out past ATT&CKcons from that same page.
@huntress.com
📢💫
✨Do you love doing correlations between different incidents, sometimes digging into them, or doing malware analysis?
✨Do you like doing data analysis, and using this to make threat reports? 👇
@huntress.com
📢💫
✨Do you love doing correlations between different incidents, sometimes digging into them, or doing malware analysis?
✨Do you like doing data analysis, and using this to make threat reports? 👇
If you'd like to speak at CYBERWARCON this year, get your talk submission in ASAP to be considered!
Submit your talk here >> www.cyberwarcon.com/cfp2025
#CYBERWARCON #CFP
If you'd like to speak at CYBERWARCON this year, get your talk submission in ASAP to be considered!
Submit your talk here >> www.cyberwarcon.com/cfp2025
#CYBERWARCON #CFP
We’re publishing his story today: www.bloomberg.com/news/feature...
We’re publishing his story today: www.bloomberg.com/news/feature...