2024-05-30 | Xavier Mertens | Feeding MISP with OSSEC |
2024-04-11 | Yee Ching Tok | Evolution of Artificial Intelligence Systems and Ensuring Trustworthiness |
2022-11-10 | Xavier Mertens | Do you collect "Observables" or "IOCs"? |
2018-11-11 | Pasquale Stirparo | Community contribution: joining forces or multiply solutions? |
2018-10-17 | Russ McRee | RedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence |
2018-07-29 | Guy Bruneau | Using RITA for Threat Analysis |
2017-09-18 | Xavier Mertens | Getting some intelligence from malspam |
2017-05-31 | Pasquale Stirparo | Analysis of Competing Hypotheses, WCry and Lazarus (ACH part 2) |
2017-05-28 | Pasquale Stirparo | Analysis of Competing Hypotheses (ACH part 1) |
2016-09-25 | Pasquale Stirparo | Defining Threat Intelligence Requirements |
2016-07-31 | Pasquale Stirparo | Sharing (intel) is caring... or not? |
2016-05-02 | Rick Wanner | Lean Threat Intelligence |
2016-03-21 | Xavier Mertens | IP Addresses Triage |
2015-08-16 | Guy Bruneau | Are you a "Hunter"? |
2014-12-23 | John Bambenek | How I learned to stop worrying and love malware DGAs.... |
2014-08-04 | Russ McRee | Threats & Indicators: A Security Intelligence Lifecycle |
2013-10-30 | Russ McRee | SIR v15: Five good reasons to leave Windows XP behind |
2013-07-19 | Stephen Hall | Cyber Intelligence Tsunami |
2013-07-18 | Chris Mohan | Blog Spam - annoying junk or a source of intelligence? |
2013-04-23 | Russ McRee | Microsoft's Security Intelligence Report (SIRv14) released |
2012-12-20 | Daniel Wesemann | White House strategy on security information sharing and safeguarding |
2009-06-16 | John Bambenek | Iran Internet Blackout: Using Twitter for Operational Intelligence |
2009-01-31 | John Bambenek | Google Search Engine's Malware Detection Broken |
2008-11-12 | John Bambenek | Thoughts on Security Intelligence (McColo Corp alleged spam/malware host knocked offline) |
2008-10-30 | Kevin Liston | Making Intelligence Actionable: Part 2 |