FileMood

Download CYBERWARCON

CYBERWARCON

Name

CYBERWARCON

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

1.8 GB

Total Files

107

Hash

3F286FEF1031F5720C2CC1474BE336B8097E0100

/

CYBERWARCON logo.jpg

14.9 KB

CYBERWARCON thank you.txt

0.7 KB

/CYBERWARCON 2018/

An Analysis of Micro and Macro Cyber Attacks in the Ongoing War in Yemen.eng.srt

78.7 KB

An Analysis of Micro and Macro Cyber Attacks in the Ongoing War in Yemen.mp4

67.2 MB

Are US Cyber Deterrence Operations Suppressing or Inciting Attacks.eng.srt

101.6 KB

Are US Cyber Deterrence Operations Suppressing or Inciting Attacks.mp4

66.2 MB

Barely Whispering.eng.srt

21.1 KB

Barely Whispering.mp4

18.5 MB

Bears in the Lines Russian Critical Infrastructure Espionage in the Face of US Grid Resilience.eng.srt

57.8 KB

Bears in the Lines Russian Critical Infrastructure Espionage in the Face of US Grid Resilience.mp4

41.8 MB

Behind the Next Destructive Attack.eng.srt

28.5 KB

Behind the Next Destructive Attack.mp4

20.8 MB

Disinformation or Debate Finding Signal Amid Political Noise.eng.srt

110.9 KB

Disinformation or Debate Finding Signal Amid Political Noise.mp4

69.2 MB

False Leaks - A Network Lens on Cyber-Enabled Information Operations.eng.srt

77.0 KB

False Leaks - A Network Lens on Cyber-Enabled Information Operations.mp4

61.4 MB

GreyEnergy Beyond BlackEnergy and NotPetya.eng.srt

53.6 KB

GreyEnergy Beyond BlackEnergy and NotPetya.mp4

44.2 MB

Influencer Vaccine Identifying Information Operations Infrastructure.eng.srt

74.1 KB

Influencer Vaccine Identifying Information Operations Infrastructure.mp4

58.9 MB

Infosec 1930 - CYBERWARCON Keynote.eng.srt

47.9 KB

Infosec 1930 - CYBERWARCON Keynote.mp4

42.6 MB

Outsourcing Cyberwar.eng.srt

31.7 KB

Outsourcing Cyberwar.mp4

25.1 MB

Revisiting Known Perps Behavioral Profiling for Continuous Monitoring of Threat Actors.eng.srt

88.7 KB

Revisiting Known Perps Behavioral Profiling for Continuous Monitoring of Threat Actors.mp4

48.8 MB

Unrestricted Warfare on Campus Chinese Information Operations and American Higher Education.eng.srt

63.8 KB

Unrestricted Warfare on Campus Chinese Information Operations and American Higher Education.mp4

41.2 MB

/CYBERWARCON 2019/

Ch-Ch-Changes The Arc of the CHOLLIMA’s and DPRK’s State-Driven Cyber Ecosystem.mp4

14.5 MB

Chimera.mp4

48.2 MB

China’s Influence Campaign Targeting the Hong Kong Protests What the Data.mp4

39.6 MB

Full-Spectrum Information Ops for Critical Infrastructure Attacks & Disruption.mp4

33.9 MB

Internal Influence A Sampling of Domestic Information Operations.mp4

14.1 MB

Lord of the Flies An Open-Source Investigation into Saud al-Qahtani.mp4

34.1 MB

Operation Ghost The Dukes aren’t back - they never left.mp4

33.6 MB

RedSourcing Cyberwar On a Budget.mp4

14.6 MB

The Disinformation Industry.mp4

26.0 MB

The Secret Life of Sandworms.mp4

37.9 MB

Your Persistent Friend The Untold History of Iran’s Effectiveness.mp4

30.6 MB

/CYBERWARCON 2021/

Attributing Digital Covert Action The Curious Case of WikiSaudiLeaks.eng.srt

36.8 KB

Attributing Digital Covert Action The Curious Case of WikiSaudiLeaks.mp4

32.1 MB

Chinese IO Commercial Firm Attribution.eng.srt

61.9 KB

Chinese IO Commercial Firm Attribution.mp4

42.0 MB

Cyberattacks Is the Juice Worth the Squeeze..eng.srt

21.0 KB

Cyberattacks Is the Juice Worth the Squeeze.mp4

15.4 MB

Disrupting Cyber Adversaries Meta's Approach to Deterrence.eng.srt

22.6 KB

Disrupting Cyber Adversaries Meta's Approach to Deterrence.mp4

12.6 MB

Disruptions in Afghanistan Internet Infrastructure After Taliban Takeover.eng.srt

12.4 KB

Disruptions in Afghanistan Internet Infrastructure After Taliban Takeover.mp4

10.1 MB

Influence Operations What is Known and What Isn't.eng.srt

13.7 KB

Influence Operations What is Known and What Isn't.mp4

7.8 MB

Keynote - Chris Krebs.eng.srt

55.2 KB

Keynote - Chris Krebs.mp4

31.9 MB

Planes, Ships, and Satellites Cyber in Warfare.eng.srt

57.6 KB

Planes, Ships, and Satellites Cyber in Warfare.mp4

41.7 MB

Questioning Election Security.eng.srt

23.7 KB

Questioning Election Security.mp4

14.7 MB

Strategic Web Compromises in the Middle East with a Pinch of Candiru.eng.srt

46.3 KB

Strategic Web Compromises in the Middle East with a Pinch of Candiru.mp4

29.4 MB

Surfacing from the Underbrush Machete Pivots to Intrusion-Enabled Info Ops.eng.srt

19.8 KB

Surfacing from the Underbrush Machete Pivots to Intrusion-Enabled Info Ops.mp4

14.2 MB

The Last Remaining Cover for Action.eng.srt

86.9 KB

The Last Remaining Cover for Action.mp4

54.0 MB

Their Own Little War Iran Adopts Disruptive Ransomware.eng.srt

24.9 KB

Their Own Little War Iran Adopts Disruptive Ransomware.mp4

17.0 MB

Unmasking UNC1151, the Ghost Behind Ghostwriter.eng.srt

60.9 KB

Unmasking UNC1151, the Ghost Behind Ghostwriter.mp4

43.4 MB

/CYBERWARCON 2022/

Breaking Silos and Speaking The Same Language.eng.srt

75.7 KB

Breaking Silos and Speaking The Same Language.mp4

55.4 MB

China Stands Up Cybersecurity Talent and Innovative Policies in Xi's China.eng.srt

20.5 KB

China Stands Up Cybersecurity Talent and Innovative Policies in Xi's China.mp4

16.7 MB

Mossad.com How Iran is Using Fake Job Sites and Movie Studios to Catch Moles.eng.srt

39.3 KB

Mossad.com How Iran is Using Fake Job Sites and Movie Studios to Catch Moles.mp4

30.0 MB

NDP Polish-Language IO Campaign’s Role within RU’s Prop. and Disinfo. Ecosystem.eng.srt

25.1 KB

NDP Polish-Language IO Campaign’s Role within RU’s Prop. and Disinfo. Ecosystem.mp4

17.8 MB

PRC's Use of Mobile Surveillance for Tracking the Uighur population in China.eng.srt

65.1 KB

PRC's Use of Mobile Surveillance for Tracking the Uighur population in China.mp4

44.2 MB

Rising Tide Redux Leviathan's Supply Chain Attacks & Kinetic Naval Intervention.eng.srt

54.2 KB

Rising Tide Redux Leviathan's Supply Chain Attacks & Kinetic Naval Intervention.mp4

46.8 MB

Were Russian cyber operations militarily effective in Ukraine If not, why.eng.srt

19.6 KB

Were Russian cyber operations militarily effective in Ukraine If not, why.mp4

15.5 MB

/CYBERWARCON 2023/

ARCTIC RAGE Heats Up A Russian Influence Actor Targeting Ukraine's War Effort.eng.srt

19.8 KB

ARCTIC RAGE Heats Up A Russian Influence Actor Targeting Ukraine's War Effort.mp4

13.8 MB

Bringing Balance to the ‘Gen IO’ Debate.eng.srt

19.3 KB

Bringing Balance to the ‘Gen IO’ Debate.mp4

20.2 MB

Chinese Hacking of Critical Infrastructure.eng.srt

31.0 KB

Chinese Hacking of Critical Infrastructure.mp4

24.7 MB

Deceit Among Comrades DPRK’S Intrusion Into Russian Defense Industrial Base.eng.srt

33.5 KB

Deceit Among Comrades DPRK’S Intrusion Into Russian Defense Industrial Base.mp4

23.9 MB

Does This Vuln System Look Funny to You.eng.srt

57.8 KB

Does This Vuln System Look Funny to You.mp4

31.5 MB

Insights into a cyberwar Ukraine 2022-2023.eng.srt

18.6 KB

Insights into a cyberwar Ukraine 2022-2023.mp4

16.8 MB

Mapping the Terrain of an Online Conflict Who's Winning the Narrative War in UA.eng.srt

22.9 KB

Mapping the Terrain of an Online Conflict Who's Winning the Narrative War in UA.mp4

13.5 MB

Sandworm's Disruptive Operations.eng.srt

43.2 KB

Sandworm's Disruptive Operations.mp4

26.3 MB

Shedding LI-ght on cyber mercenary sting ops.eng.srt

14.7 KB

Shedding LI-ght on cyber mercenary sting ops.mp4

12.2 MB

Spamou-Gabbing - Chinese IO on American Alt-Platforms.eng.srt

15.5 KB

Spamou-Gabbing - Chinese IO on American Alt-Platforms.mp4

11.5 MB

What if the revil ransomware FSB arrest video was genuine.eng.srt

22.2 KB

What if the revil ransomware FSB arrest video was genuine.mp4

15.0 MB

WHY YOUR INFLUENCE OPERATION IS PROBABLY A BAD IDEA.eng.srt

28.9 KB

WHY YOUR INFLUENCE OPERATION IS PROBABLY A BAD IDEA.mp4

17.1 MB

You compile me. You had me at RomCom - When cybercrime met espionage.eng.srt

15.8 KB

You compile me. You had me at RomCom - When cybercrime met espionage.mp4

13.2 MB

 

Total files 107


Copyright © 2025 FileMood.com