BLUE
Profile banner
S
SLEUTHCON
@sleuthcon.bsky.social
SLEUTHCON will return in 2024. Visit www.youtube.com/@cyberwarcon to catch up on this years presentations!
112 followers92 following7 posts
Ssleuthcon.bsky.social

Learn more about the top threats currently used to gain initial victim access! This talk provides an analysis of TTP overlaps & differences among them plus a link analysis of the later-stage crimeware payloads these threats are frequently used to deliver. https://youtu.be/JHN3izIUC48

0
Ssleuthcon.bsky.social

After international sanctions were brought against Rus in the wake of their full-scale invasion of UA, ordinary Russian consumers resorted to various “workarounds” to obtain goods produced abroad. Learn more https://youtube.com/watch?v=ZX0d85ciuUs&list=PL_ru_VvzvvT-sZHPSQaOMGdzFU1jqg4w0&index=8…

0
Ssleuthcon.bsky.social

Watch Squiblydoo share lessons learned from studying & documenting 50 Authenticode Certificates used by the SolarMarker malware actor over the course of 2 years. https://youtu.be/gkS0PU1mc7U

0
Ssleuthcon.bsky.social

Hear more from Greg Lesnewich on the rapidly evolving initial access methods employed by one of North Korea's cybercriminal groups, TA444, and the context for why North Korea must resort to cybercrime. https://youtu.be/LYHmTjFW-nY

0
Ssleuthcon.bsky.social

The legal cannabis industry has grown exponentially. And, like any business, they’re not immune to cybersecurity & physical security threats. Watch @infosecsherpa.bsky.socialhttps://youtu.be/E9rnK8hswZg

0
Ssleuthcon.bsky.social

Using a comprehensive dataset of activity on Breached– from its emergence in March ‘22 to seizure in ‘23 - Megan Miller, Rhys Leahy, & Olivia Kantor, show how and why Breached became the largest criminal forum for hacked & leaked data. Watch now: https://youtube.com/watch?v=A7HvCx1oz2Y

0
Profile banner
S
SLEUTHCON
@sleuthcon.bsky.social
SLEUTHCON will return in 2024. Visit www.youtube.com/@cyberwarcon to catch up on this years presentations!
112 followers92 following7 posts