Webinar on Threat Hunting

Today, I took part in a Cisco webinar on threat hunting processes and thoughts. Check it out here! Bust Threats or Risk Getting Busted .

more ...

QuBit Bulgaria

I presented on automating threat intelligence yesterday at QuBit in Sofia, Bulgaria.

This was my first time giving this presenation, and as usual (for me), I was coding up to the moment I walked on stage. I thought it went really well and learned a lot from the audience. What …

more ...

Which Providers Have the Most Phishing Content?

Phishing is an efficient method for an attacker to deliver malware or harvest credentials from unsuspecting victims. By sending out a mass or targeted email designed to look like it came from a bank or other legitimate source, an attacker can acquire a fair number of user credentials or deliver …

more ...

Anatomy of a Facebook Phishing Campaign

An average of 1,200 phishing messages were verified each day on PhishTank during the month of January 2015. Most phishing attempts are delivered through email. However, some phishing attacks leverage social networking. This is an analysis of one phishing attack seen on Facebook.

A Facebook user reported seeing the …

more ...