How threat actors are using artificial intelligence
Artificial intelligence is a red-hot mess, filled with contradicting predictions over whether it will bring vast benefits. In this Studio 471, Ashley Jess shares her insight into how AI will shape the threat landscape.
The Art of the Hunt: Turning Intel into Action
In this episode, "The Art of the Hunt: Turning Intel into Action," our expert team explores the nuances of threat intelligence, including behavioral and indicator-based approaches, and how to effectively leverage them for superior outcomes.
Collecting Useful CTI From Underground Markets
Extracting cyber threat intelligence on emerging threats and novel threat actors is challenging. Michele Campobasso completed his doctoral thesis in 2024 at Eindhoven University of Technology, and in Studio 471, he shares insights on these markets and maximizing CTI collection.
Cybercrime Exposed Podcast: Raccoon Stealer
Information stealing malware is one of the most common ways that organizations end up infiltrated by malicious hackers. For several years, one type of infostealer called Raccoon Stealer ruled them all.
Using CTI in Realistic Attack Simulations
In this Studio 471, two experts from the cybersecurity consultancy CyberCX discuss how these exercises are developed and executed.
![The Ideal Outcome: The Gift of a Well-Crafted Threat Hunt](https://intel-website.transforms.svdcdn.com/production/Webinar-listing-thumbnail.png?w=570&h=420&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1736865826&s=004d8d5048fcb5fbfcb32cd83ddc5fb9 570w)
The Ideal Outcome: The Gift of a Well-Crafted Threat Hunt
In this episode, "The Ideal Outcome: The Gift of a Well-Crafted Threat Hunt", our expert team dives into what it means to reach the “ideal outcome” as a threat hunter, offering actionable insights to help you build an effective and enduring approach.
![Will Processing CTI Become Legally Risky?](https://intel-website.transforms.svdcdn.com/production/Webinar-listing-thumbnail.png?w=570&h=420&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1736865826&s=004d8d5048fcb5fbfcb32cd83ddc5fb9 570w)
Will Processing CTI Become Legally Risky?
In this Studio 471, Peter Swire discusses the regulatory environment, how it could impact the use of cyber threat intelligence and what could be done to ensure attackers don’t leverage these changes to their advantage.
![Why Russia is a Hotbed of Cybercrime](https://intel-website.transforms.svdcdn.com/production/Webinar-listing-thumbnail.png?w=570&h=420&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1736865826&s=004d8d5048fcb5fbfcb32cd83ddc5fb9 570w)
Why Russia is a Hotbed of Cybercrime
In this Studio 471, Alec Jackson discusses how deep, institutional corruption ties Russian IT professionals, organized criminal groups and the state together and how Russia leverages this to its advantage.
![Blood, Sweat, and Threats: Carving the Perfect Threat Hunter](https://intel-website.transforms.svdcdn.com/production/Webinar-listing-thumbnail.png?w=570&h=420&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1736865826&s=004d8d5048fcb5fbfcb32cd83ddc5fb9 570w)
Blood, Sweat, and Threats: Carving the Perfect Threat Hunter
In this LIVE episode, “Blood, Sweat, and Threats: Carving the Perfect Threat Hunter,” we’ll explore the full journey of a threat hunter, from their first steps into the field to mastering the tools of the trade.
![How to Comfortably Share Threat Intel with ISACs](https://intel-website.transforms.svdcdn.com/production/Webinar-listing-thumbnail.png?w=570&h=420&q=80&fm=webp&fit=crop&crop=focalpoint&fp-x=0.5&fp-y=0.5&dm=1736865826&s=004d8d5048fcb5fbfcb32cd83ddc5fb9 570w)
How to Comfortably Share Threat Intel with ISACs
In this Studio 471, Sydney Jones, Head of Threat Intelligence at CLS Group, discusses how she has set up several productive programs to share threat intelligence with Information Sharing and Analysis Centers (ISACs), helping the community reduce risk.