Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Threat Intelligence and Beyond

Threat Intelligence and Beyond

Threat Intelligence: Hands-on Learning (NFSU Goa)
This presentation summarizes a threat intelligence workshop conducted at NFSU Goa. It focused on practical application through interactive exercises and case studies. Due to the live nature of these case studies, they are not included in the slides.

The presentation covers key concepts in threat intelligence, including:

Threat actors and motivations
Threat intelligence gathering and analysis
Utilizing threat intelligence for proactive defense
This session aimed to equip participants with the skills to identify and mitigate cyber threats.

For any questions or to learn more about the specific case studies, feel free to reach out.

Rishika Desai

May 07, 2024
Tweet

Other Decks in Research

Transcript

  1. Threat intelligence, also known as cyber threat intelligence (CTI) or

    threat intel, is data collected and analyzed to understand cyber attacks and how to prevent and fight them. WHY DO YOU NEED THREAT INTELLIGENCE LIFECYCLE ?
  2. Profiles, emails, repositories, dorks, PII, exposed databases, cloud environments, API

    endpoints, archives, exposed ports. Databreaches, forums, shoutboxes, communication channels, TOR, Telegram and other social anonymous platforms HUNTING VIA OSINT HUNTING VIA DARKINT
  3. cve.circl.lu ai fOR CODE- SET UP MALWARE SANDBOXES OPENCTI INTERNET

    collection of vulnerabilities set up a collection inventory to collect and correlate new IOCs sharing across stakeholder osint is the key