At #BHUSA, @bsoman3 will present "Death to the IOC: What's Next in Threat Intelligence," and discuss the use of machine learning to automate the extraction of relevant threat data from vast amounts unstructured text: ow.ly/lzSN50v64du#blackhat#threatintel
There's an increasing awareness of foreign influence on American institutions through social media. In this #podcast episode, we cover related research from Insikt Group: #ThreatIntelligence
Chinese Charm Attempts to Alter American Political Opinion
Priscilla Moriuchi discusses Insikt Group's recently published findings from their research i... more
The #Anubis#Android malware can hijack a specified activity and abuse the device's features such as WebView and Push notification to perform phishing. Our analysis: bit.ly/2LQg8Uj
Experiencing a cyberattack against your organization is not simply a question of "if" but rather "when." Join our CrowdCast on Thurs. July 25 to learn how @CrowdStrike services defines and approaches compromise assessment (CA) ow.ly/LJLk50uWE3e#cybersecurity
No comments:
Post a Comment