Parent directory/ | - | - |
0-day In-the-Wild Exploitation in 2022so far.mp4 | 50.4 MiB | 2022 Sep 08 01:06 |
0-day In-the-Wild Exploitation in 2022so far.srt | 64.8 KiB | 2022 Sep 05 02:06 |
A Diamond is an Analysts Best Friend Introducing the Diamond Model for Influence Operations Analysis.mp4 | 33.1 MiB | 2022 Sep 08 01:06 |
A Diamond is an Analysts Best Friend Introducing the Diamond Model for Influence Operations Analysis.srt | 48.0 KiB | 2022 Sep 05 02:06 |
Attack Flow - Beyond Atomic Behaviors.mp4 | 46.5 MiB | 2022 Sep 08 01:06 |
Attack Flow - Beyond Atomic Behaviors.srt | 65.4 KiB | 2022 Sep 05 02:06 |
Being A Better Defender By Channeling Your Worst Adversary.mp4 | 37.3 MiB | 2022 Sep 08 01:06 |
Being A Better Defender By Channeling Your Worst Adversary.srt | 83.4 KiB | 2022 Sep 05 02:06 |
Beyond Incident Reporting - An Analysis of Structured Representations for Incident Response.mp4 | 23.2 MiB | 2022 Sep 08 01:06 |
Beyond Incident Reporting - An Analysis of Structured Representations for Incident Response.srt | 46.1 KiB | 2022 Sep 05 02:06 |
Bridging Together Independent Islands - STIX Custom Objects and Matching Mechanisms to Correlate.mp4 | 31.3 MiB | 2022 Sep 08 01:06 |
Bridging Together Independent Islands - STIX Custom Objects and Matching Mechanisms to Correlate.srt | 43.5 KiB | 2022 Sep 05 02:06 |
Build Automated Malware Lab with CERT.pl Open-Source Software.mp4 | 36.4 MiB | 2022 Sep 08 01:06 |
Build Automated Malware Lab with CERT.pl Open-Source Software.srt | 62.1 KiB | 2022 Sep 05 02:07 |
CERT-UA Research and Technical Analysis of Large-Scale Cyber Attacks in Ukraine in 2021.mp4 | 54.1 MiB | 2022 Sep 08 01:06 |
CERT-UA Research and Technical Analysis of Large-Scale Cyber Attacks in Ukraine in 2021.srt | 57.9 KiB | 2022 Sep 05 02:10 |
CSAF - the Magic Potion for Vulnerability Handling in Industrial Environments.mp4 | 43.3 MiB | 2022 Sep 08 01:06 |
CSAF - the Magic Potion for Vulnerability Handling in Industrial Environments.srt | 67.8 KiB | 2022 Sep 05 02:18 |
CSIRT and SOC Modernization Practices.mp4 | 34.3 MiB | 2022 Sep 08 01:06 |
CSIRT and SOC Modernization Practices.srt | 60.8 KiB | 2022 Sep 05 02:19 |
Community Management and Tool Orchestration the Open-Source Way via Cerebrate.mp4 | 42.5 MiB | 2022 Sep 08 01:06 |
Community Management and Tool Orchestration the Open-Source Way via Cerebrate.srt | 68.4 KiB | 2022 Sep 05 02:16 |
Creating an Information Security Information Assurance Program - Lessons Learned.mp4 | 32.1 MiB | 2022 Sep 08 01:06 |
Creating an Information Security Information Assurance Program - Lessons Learned.srt | 49.3 KiB | 2022 Sep 05 02:16 |
Cyber Ireland - Addressing Cyber Crime Through Industry-Academia-Government Collaboration.mp4 | 34.2 MiB | 2022 Sep 08 01:06 |
Cyber Ireland - Addressing Cyber Crime Through Industry-Academia-Government Collaboration.srt | 77.4 KiB | 2022 Sep 05 02:21 |
Cybersecurity Maturity in the Pacific Islands - Integrating CERT Services in a Regional Framework.mp4 | 23.9 MiB | 2022 Sep 08 01:06 |
Cybersecurity Maturity in the Pacific Islands - Integrating CERT Services in a Regional Framework.srt | 59.3 KiB | 2022 Sep 05 02:22 |
DNS as Added Security Against Ransomware Attacks.mp4 | 32.0 MiB | 2022 Sep 08 01:06 |
DNS as Added Security Against Ransomware Attacks.srt | 55.0 KiB | 2022 Sep 05 02:25 |
Decoding the Diversity Discussion.mp4 | 46.3 MiB | 2022 Sep 08 01:06 |
Decoding the Diversity Discussion.srt | 63.1 KiB | 2022 Sep 05 02:25 |
Don't Blame the User Stop the Phish Before it is Even Sent.mp4 | 31.7 MiB | 2022 Sep 08 01:06 |
Don't Blame the User Stop the Phish Before it is Even Sent.srt | 48.8 KiB | 2022 Sep 05 02:28 |
EDR Internals From a Defenders Perspective.mp4 | 38.2 MiB | 2022 Sep 08 01:06 |
EDR Internals From a Defenders Perspective.srt | 69.8 KiB | 2022 Sep 05 02:30 |
Endorsing the New Rules.mp4 | 57.4 MiB | 2022 Sep 08 01:06 |
Endorsing the New Rules.srt | 72.5 KiB | 2022 Sep 05 02:32 |
Enhancing Operations Through the Tracking of Interactive Linux-based Intrusion Campaigns.mp4 | 47.1 MiB | 2022 Sep 08 01:06 |
Enhancing Operations Through the Tracking of Interactive Linux-based Intrusion Campaigns.srt | 73.3 KiB | 2022 Sep 05 02:32 |
FIRST SIG Updates.mp4 | 53.1 MiB | 2022 Sep 08 01:06 |
FIRST SIG Updates.srt | 102.1 KiB | 2022 Sep 05 02:06 |
Follow the Dynamite Commemorating TeamTNT's Cloud Attacks.mp4 | 36.4 MiB | 2022 Sep 08 01:06 |
Follow the Dynamite Commemorating TeamTNT's Cloud Attacks.srt | 58.2 KiB | 2022 Sep 05 02:35 |
Formulating An Intelligence-Driven Threat Hunting Methodology.mp4 | 37.4 MiB | 2022 Sep 08 01:06 |
Formulating An Intelligence-Driven Threat Hunting Methodology.srt | 71.9 KiB | 2022 Sep 05 02:36 |
Global IR in a Fragmented World.mp4 | 40.2 MiB | 2022 Sep 08 01:06 |
Global IR in a Fragmented World.srt | 55.3 KiB | 2022 Sep 05 02:36 |
Going with the (work)flow Incident Response for Vicious Workflows.mp4 | 29.3 MiB | 2022 Sep 08 01:06 |
Going with the (work)flow Incident Response for Vicious Workflows.srt | 47.8 KiB | 2022 Sep 05 02:38 |
How I Handled One of the Biggest Banking Fraud Incidents of 2020.mp4 | 44.9 MiB | 2022 Sep 08 01:06 |
How I Handled One of the Biggest Banking Fraud Incidents of 2020.srt | 55.5 KiB | 2022 Sep 05 02:39 |
How to Secure Your Software Supply Chain and Speed-Up DFIR with Hashlookup.mp4 | 45.8 MiB | 2022 Sep 08 01:06 |
How to Secure Your Software Supply Chain and Speed-Up DFIR with Hashlookup.srt | 54.5 KiB | 2022 Sep 05 02:41 |
How to Talk to a Board so the Board Will Talk Back.mp4 | 32.4 MiB | 2022 Sep 08 01:06 |
How to Talk to a Board so the Board Will Talk Back.srt | 57.4 KiB | 2022 Sep 05 02:42 |
Improving Sector Based Incident Response.mp4 | 41.8 MiB | 2022 Sep 08 01:06 |
Improving Sector Based Incident Response.srt | 66.5 KiB | 2022 Sep 05 02:42 |
In Curation We Trust Generating Contextual & Actionable Threat Intelligence.mp4 | 44.4 MiB | 2022 Sep 08 01:06 |
In Curation We Trust Generating Contextual & Actionable Threat Intelligence.srt | 69.8 KiB | 2022 Sep 05 02:46 |
Incident Response Investigations in the Age of the Cloud.mp4 | 30.0 MiB | 2022 Sep 08 01:06 |
Incident Response Investigations in the Age of the Cloud.srt | 56.0 KiB | 2022 Sep 05 02:46 |
Internet Spelunking IPv6 Scanning and Device Fingerprinting.mp4 | 44.5 MiB | 2022 Sep 08 01:06 |
Internet Spelunking IPv6 Scanning and Device Fingerprinting.srt | 79.6 KiB | 2022 Sep 05 02:49 |
It's Just a Jump To The Left (of Boom).mp4 | 29.5 MiB | 2022 Sep 08 01:06 |
It's Just a Jump To The Left (of Boom).srt | 61.5 KiB | 2022 Sep 05 02:49 |
Keynote Cybersecurity's Image Problem and What We Can All Do About It.mp4 | 97.9 MiB | 2022 Sep 08 01:06 |
Keynote Cybersecurity's Image Problem and What We Can All Do About It.srt | 113.7 KiB | 2022 Sep 05 02:52 |
Keynote Online Child Sexual Abuse Material (CSAM) The Insider Attack You Have Not Seen Coming.mp4 | 90.2 MiB | 2022 Sep 08 01:06 |
Keynote Online Child Sexual Abuse Material (CSAM) The Insider Attack You Have Not Seen Coming.srt | 128.4 KiB | 2022 Sep 05 02:55 |
Keynote What Do We Owe One Another In Cybersecurity.mp4 | 93.3 MiB | 2022 Sep 08 01:06 |
Keynote What Do We Owe One Another In Cybersecurity.srt | 121.6 KiB | 2022 Sep 05 02:57 |
Knowledge Management - Nourishing and Enhancing Your Communication and Intelligence.mp4 | 25.9 MiB | 2022 Sep 08 01:06 |
Knowledge Management - Nourishing and Enhancing Your Communication and Intelligence.srt | 64.2 KiB | 2022 Sep 05 02:58 |
Living with Ransomware - The New Normal in Cyber Security.mp4 | 26.5 MiB | 2022 Sep 08 01:06 |
Living with Ransomware - The New Normal in Cyber Security.srt | 61.6 KiB | 2022 Sep 05 03:00 |
More Than a CSIRT Lessons Learned from Supporting a National Response to COVID-19.mp4 | 33.9 MiB | 2022 Sep 08 01:06 |
More Than a CSIRT Lessons Learned from Supporting a National Response to COVID-19.srt | 75.7 KiB | 2022 Sep 05 03:03 |
Never Walk Alone Inspirations From a Growing OWASP Project.mp4 | 61.1 MiB | 2022 Sep 08 01:06 |
Never Walk Alone Inspirations From a Growing OWASP Project.srt | 61.5 KiB | 2022 Sep 05 03:04 |
No More Ransomware in Critical Infrastructure.mp4 | 24.4 MiB | 2022 Sep 08 01:06 |
No More Ransomware in Critical Infrastructure.srt | 47.3 KiB | 2022 Sep 05 03:09 |
Open Source Doesn't Care About You, But You Should Care About It.mp4 | 49.1 MiB | 2022 Sep 08 01:06 |
Open Source Doesn't Care About You, But You Should Care About It.srt | 72.1 KiB | 2022 Sep 05 03:09 |
Operation GamblingPuppet Analysis of a Multivector and Multiplatform Campaign Targeting Online.mp4 | 24.7 MiB | 2022 Sep 08 01:06 |
Operation GamblingPuppet Analysis of a Multivector and Multiplatform Campaign Targeting Online.srt | 57.7 KiB | 2022 Sep 05 03:12 |
Prioritizing Vulnerability Response with a Stakeholder Specific Vulnerability Categorization.mp4 | 46.9 MiB | 2022 Sep 08 01:06 |
Prioritizing Vulnerability Response with a Stakeholder Specific Vulnerability Categorization.srt | 68.9 KiB | 2022 Sep 05 03:20 |
Ransomware Incident Response - The Real-World Story of a Ransomware Attack.mp4 | 53.8 MiB | 2022 Sep 08 01:06 |
Ransomware Incident Response - The Real-World Story of a Ransomware Attack.srt | 87.1 KiB | 2022 Sep 05 03:20 |
Ransomware Stages of Grief.mp4 | 30.3 MiB | 2022 Sep 08 01:06 |
Ransomware Stages of Grief.srt | 63.4 KiB | 2022 Sep 05 03:25 |
Ransomware, Risk, & Recovery Protecting and Creating Resilience for Hybrid Active Directory.mp4 | 40.1 MiB | 2022 Sep 08 01:06 |
Ransomware, Risk, & Recovery Protecting and Creating Resilience for Hybrid Active Directory.srt | 59.9 KiB | 2022 Sep 05 03:23 |
Reversing Golang Binaries with Ghidra.mp4 | 34.8 MiB | 2022 Sep 08 01:06 |
Reversing Golang Binaries with Ghidra.srt | 52.3 KiB | 2022 Sep 05 03:26 |
Rise of the Vermilion Cross-platform Cobalt Strike Beacon Targeting Linux and Windows.mp4 | 38.5 MiB | 2022 Sep 08 01:06 |
Rise of the Vermilion Cross-platform Cobalt Strike Beacon Targeting Linux and Windows.srt | 68.0 KiB | 2022 Sep 05 03:28 |
Sightings Ecosystem A Data-driven Analysis of ATT&CK in the Wild.mp4 | 50.5 MiB | 2022 Sep 08 01:06 |
Sightings Ecosystem A Data-driven Analysis of ATT&CK in the Wild.srt | 79.6 KiB | 2022 Sep 05 03:28 |
Speed is key Leveraging the Cloud for Forensic Artifact Collection & Processing.mp4 | 35.8 MiB | 2022 Sep 08 01:06 |
Speed is key Leveraging the Cloud for Forensic Artifact Collection & Processing.srt | 64.6 KiB | 2022 Sep 05 03:31 |
The Blue Side of Documentation.mp4 | 39.0 MiB | 2022 Sep 08 01:06 |
The Blue Side of Documentation.srt | 48.8 KiB | 2022 Sep 05 03:34 |
The SolarWinds Supply Chain Compromise.mp4 | 40.1 MiB | 2022 Sep 08 01:06 |
The SolarWinds Supply Chain Compromise.srt | 55.5 KiB | 2022 Sep 05 03:43 |
There is No TTP.mp4 | 44.7 MiB | 2022 Sep 08 01:06 |
There is No TTP.srt | 47.8 KiB | 2022 Sep 05 03:39 |
Threats versus Capabilities Building Better Detect and Respond Capabilities.mp4 | 46.6 MiB | 2022 Sep 08 01:06 |
Threats versus Capabilities Building Better Detect and Respond Capabilities.srt | 75.5 KiB | 2022 Sep 05 03:39 |
Timing is Everything Generic Trigger Events for Malware Memory Dumping.mp4 | 32.6 MiB | 2022 Sep 08 01:06 |
Timing is Everything Generic Trigger Events for Malware Memory Dumping.srt | 51.1 KiB | 2022 Sep 05 03:44 |
Traffic Light Protocol 2022 Updates for An Improved Sharing Experience.mp4 | 70.8 MiB | 2022 Sep 08 01:06 |
Traffic Light Protocol 2022 Updates for An Improved Sharing Experience.srt | 133.0 KiB | 2022 Sep 05 03:34 |
VEXed by Vulnerabilities That Don't Affect Your Product Try This.mp4 | 47.8 MiB | 2022 Sep 08 01:06 |
VEXed by Vulnerabilities That Don't Affect Your Product Try This.srt | 69.4 KiB | 2022 Sep 05 03:46 |
Watching Webpages in Action with Lookyloo.mp4 | 43.8 MiB | 2022 Sep 08 01:06 |
Watching Webpages in Action with Lookyloo.srt | 67.0 KiB | 2022 Sep 05 03:49 |
Who Do You Think You Are.mp4 | 33.2 MiB | 2022 Sep 08 01:06 |
Who Do You Think You Are.srt | 63.1 KiB | 2022 Sep 05 03:49 |
Who Shares Wins.mp4 | 44.8 MiB | 2022 Sep 08 01:06 |
Who Shares Wins.srt | 49.2 KiB | 2022 Sep 05 03:51 |
Your Phone is Not Your Phone A Dive Into SMS PVA Fraud.mp4 | 34.8 MiB | 2022 Sep 08 01:06 |
Your Phone is Not Your Phone A Dive Into SMS PVA Fraud.srt | 52.2 KiB | 2022 Sep 05 03:54 |