Threat Intel Strategies Against Malware Threats
This presentation details the use of cyber threat intelligence (CTI) to track and mitigate malware campaigns, specifically focusing on SEO poisoning and malicious file distribution. The speakers demonstrate how to automate the collection and analysis of malware samples, C2 infrastructure, and infection vectors using tools like n8n and custom scripts. A key takeaway is the importance of proactive threat hunting by correlating external intelligence with internal telemetry to identify and block emerging threats before they impact the organization. The talk highlights the use of automated workflows to enrich security incident data and improve incident response efficiency.
Vulnerability Classes
Target Technologies
Attack Techniques
OWASP Categories
All Tags
🔒 BSides Mumbai 2024 - The Ultimate Cybersecurity Talks & Discussions Playlist! 🔒
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web




