|
/
|
|
HEADER.md
|
0.6 KB
|
|
SLEUTHCON logo wide.jpg
|
47.2 KB
|
|
SLEUTHCON logo-1.jpg
|
16.4 KB
|
|
SLEUTHCON thank you.txt
|
1.1 KB
|
|
/BRUNCHCON 2022/
|
|
0 to 232 in 6 Minutes Hunting Threats at Scale.mp4
|
13.9 MB
|
|
Business Email Compromise Solutions Feel Closer Than They Appear.mp4
|
8.4 MB
|
|
Crimeware Cooler Than APT.mp4
|
18.0 MB
|
|
Float Like a Butterfly Sting Like a Bee.mp4
|
19.4 MB
|
|
Lions, Tigers, and Infostealers - Oh my.mp4
|
17.3 MB
|
|
The De-RaaS’ing of Ransomware.mp4
|
12.0 MB
|
|
These crypters have everything An argument for caring about cry.mp4
|
7.0 MB
|
|
/.../BRUNCHCON 2022 captions/
|
|
0 to 232 in 6 Minutes Hunting Threats at Scale.eng.json
|
1.0 MB
|
|
0 to 232 in 6 Minutes Hunting Threats at Scale.eng.lrc
|
21.7 KB
|
|
0 to 232 in 6 Minutes Hunting Threats at Scale.eng.srt
|
23.6 KB
|
|
0 to 232 in 6 Minutes Hunting Threats at Scale.eng.text
|
17.4 KB
|
|
0 to 232 in 6 Minutes Hunting Threats at Scale.eng.tsv
|
19.7 KB
|
|
0 to 232 in 6 Minutes Hunting Threats at Scale.eng.txt
|
21.9 KB
|
|
0 to 232 in 6 Minutes Hunting Threats at Scale.eng.vtt
|
21.9 KB
|
|
Business Email Compromise Solutions Feel Closer Than They Appear.eng.json
|
516.3 KB
|
|
Business Email Compromise Solutions Feel Closer Than They Appear.eng.lrc
|
12.5 KB
|
|
Business Email Compromise Solutions Feel Closer Than They Appear.eng.srt
|
13.8 KB
|
|
Business Email Compromise Solutions Feel Closer Than They Appear.eng.text
|
9.7 KB
|
|
Business Email Compromise Solutions Feel Closer Than They Appear.eng.tsv
|
11.2 KB
|
|
Business Email Compromise Solutions Feel Closer Than They Appear.eng.txt
|
12.7 KB
|
|
Business Email Compromise Solutions Feel Closer Than They Appear.eng.vtt
|
12.7 KB
|
|
Crimeware Cooler Than APT.eng.json
|
1.3 MB
|
|
Crimeware Cooler Than APT.eng.lrc
|
34.9 KB
|
|
Crimeware Cooler Than APT.eng.srt
|
39.6 KB
|
|
Crimeware Cooler Than APT.eng.text
|
24.4 KB
|
|
Crimeware Cooler Than APT.eng.tsv
|
30.3 KB
|
|
Crimeware Cooler Than APT.eng.txt
|
35.3 KB
|
|
Crimeware Cooler Than APT.eng.vtt
|
35.3 KB
|
|
Float Like a Butterfly Sting Like a Bee.eng.json
|
1.1 MB
|
|
Float Like a Butterfly Sting Like a Bee.eng.lrc
|
27.9 KB
|
|
Float Like a Butterfly Sting Like a Bee.eng.srt
|
30.2 KB
|
|
Float Like a Butterfly Sting Like a Bee.eng.text
|
22.7 KB
|
|
Float Like a Butterfly Sting Like a Bee.eng.tsv
|
25.6 KB
|
|
Float Like a Butterfly Sting Like a Bee.eng.txt
|
28.1 KB
|
|
Float Like a Butterfly Sting Like a Bee.eng.vtt
|
28.1 KB
|
|
Lions, Tigers, and Infostealers - Oh my.eng.json
|
1.4 MB
|
|
Lions, Tigers, and Infostealers - Oh my.eng.lrc
|
31.4 KB
|
|
Lions, Tigers, and Infostealers - Oh my.eng.srt
|
34.1 KB
|
|
Lions, Tigers, and Infostealers - Oh my.eng.text
|
25.3 KB
|
|
Lions, Tigers, and Infostealers - Oh my.eng.tsv
|
28.7 KB
|
|
Lions, Tigers, and Infostealers - Oh my.eng.txt
|
31.7 KB
|
|
Lions, Tigers, and Infostealers - Oh my.eng.vtt
|
31.7 KB
|
|
The De-RaaS’ing of Ransomware.eng.json
|
597.9 KB
|
|
The De-RaaS’ing of Ransomware.eng.lrc
|
14.0 KB
|
|
The De-RaaS’ing of Ransomware.eng.srt
|
15.3 KB
|
|
The De-RaaS’ing of Ransomware.eng.text
|
11.1 KB
|
|
The De-RaaS’ing of Ransomware.eng.tsv
|
12.6 KB
|
|
The De-RaaS’ing of Ransomware.eng.txt
|
14.1 KB
|
|
The De-RaaS’ing of Ransomware.eng.vtt
|
14.1 KB
|
|
These crypters have everything An argument for caring about cry.eng.json
|
484.0 KB
|
|
These crypters have everything An argument for caring about cry.eng.lrc
|
12.5 KB
|
|
These crypters have everything An argument for caring about cry.eng.srt
|
13.9 KB
|
|
These crypters have everything An argument for caring about cry.eng.text
|
9.4 KB
|
|
These crypters have everything An argument for caring about cry.eng.tsv
|
11.0 KB
|
|
These crypters have everything An argument for caring about cry.eng.txt
|
12.7 KB
|
|
These crypters have everything An argument for caring about cry.eng.vtt
|
12.7 KB
|
|
/SLEUTHCON 2023/
|
|
Call Me Maybe The Rise of Callback Phishing Emails.mp4
|
6.3 MB
|
|
Certified Bad One malware, Two years of Certificates.mp4
|
6.7 MB
|
|
Closing Remarks.mp4
|
2.4 MB
|
|
Crime, Uh, Finds A Way The Evolution of Ecrime in a Post-Macro World.mp4
|
26.3 MB
|
|
Exploring Initial Access Methods of Surprisingly Competent Government Employees.mp4
|
7.0 MB
|
|
Hunting Prolific Access Broker PROPHET SPIDER.mp4
|
18.0 MB
|
|
Leakonomics The Supply and Demand of Hacked Data in the Criminal Underground.mp4
|
23.5 MB
|
|
Look at this Graph Prioritizing Initial Access Threats & TTPS via Link Analysis.mp4
|
8.2 MB
|
|
Mapping the Ransomware Payment Ecosystem & Threat Actor Behavior.mp4
|
7.6 MB
|
|
My 0ktapus Teacher New Actors, New Problems.mp4
|
14.7 MB
|
|
Opening Remarks.mp4
|
1.5 MB
|
|
Russian Sanctions Evasion Puts Merchants and Banks at Risk.mp4
|
8.2 MB
|
|
The Threats & Research Opportunities of the Cannabis Industry.mp4
|
7.3 MB
|
|
Unmasking Venom Spider The Hunt for the Golden Chickens.mp4
|
18.7 MB
|
|
/.../SLEUTHCON 2023 captions/
|
|
Call Me Maybe The Rise of Callback Phishing Emails.eng.json
|
447.2 KB
|
|
Call Me Maybe The Rise of Callback Phishing Emails.eng.lrc
|
11.7 KB
|
|
Call Me Maybe The Rise of Callback Phishing Emails.eng.srt
|
13.2 KB
|
|
Call Me Maybe The Rise of Callback Phishing Emails.eng.text
|
8.2 KB
|
|
Call Me Maybe The Rise of Callback Phishing Emails.eng.tsv
|
10.1 KB
|
|
Call Me Maybe The Rise of Callback Phishing Emails.eng.txt
|
11.8 KB
|
|
Call Me Maybe The Rise of Callback Phishing Emails.eng.vtt
|
11.9 KB
|
|
Certified Bad One malware, Two years of Certificates.eng.json
|
361.4 KB
|
|
Certified Bad One malware, Two years of Certificates.eng.lrc
|
9.3 KB
|
|
Certified Bad One malware, Two years of Certificates.eng.srt
|
10.1 KB
|
|
Certified Bad One malware, Two years of Certificates.eng.text
|
7.4 KB
|
|
Certified Bad One malware, Two years of Certificates.eng.tsv
|
8.4 KB
|
|
Certified Bad One malware, Two years of Certificates.eng.txt
|
9.4 KB
|
|
Certified Bad One malware, Two years of Certificates.eng.vtt
|
9.4 KB
|
|
Closing Remarks.eng.json
|
193.9 KB
|
|
Closing Remarks.eng.lrc
|
5.7 KB
|
|
Closing Remarks.eng.srt
|
6.5 KB
|
|
Closing Remarks.eng.text
|
3.6 KB
|
|
Closing Remarks.eng.tsv
|
4.6 KB
|
|
Closing Remarks.eng.txt
|
5.7 KB
|
|
Closing Remarks.eng.vtt
|
5.8 KB
|
|
Crime, Uh, Finds A Way The Evolution of Ecrime in a Post-Macro World.eng.json
|
1.3 MB
|
|
Crime, Uh, Finds A Way The Evolution of Ecrime in a Post-Macro World.eng.lrc
|
30.0 KB
|
|
Crime, Uh, Finds A Way The Evolution of Ecrime in a Post-Macro World.eng.srt
|
33.2 KB
|
|
Crime, Uh, Finds A Way The Evolution of Ecrime in a Post-Macro World.eng.text
|
22.9 KB
|
|
Crime, Uh, Finds A Way The Evolution of Ecrime in a Post-Macro World.eng.tsv
|
26.9 KB
|
|
Crime, Uh, Finds A Way The Evolution of Ecrime in a Post-Macro World.eng.txt
|
30.3 KB
|
|
Crime, Uh, Finds A Way The Evolution of Ecrime in a Post-Macro World.eng.vtt
|
30.3 KB
|
|
Exploring Initial Access Methods of Surprisingly Competent Government Employees.eng.json
|
554.8 KB
|
|
Exploring Initial Access Methods of Surprisingly Competent Government Employees.eng.lrc
|
13.3 KB
|
|
Exploring Initial Access Methods of Surprisingly Competent Government Employees.eng.srt
|
14.5 KB
|
|
Exploring Initial Access Methods of Surprisingly Competent Government Employees.eng.text
|
10.4 KB
|
|
Exploring Initial Access Methods of Surprisingly Competent Government Employees.eng.tsv
|
11.9 KB
|
|
Exploring Initial Access Methods of Surprisingly Competent Government Employees.eng.txt
|
13.4 KB
|
|
Exploring Initial Access Methods of Surprisingly Competent Government Employees.eng.vtt
|
13.4 KB
|
|
Hunting Prolific Access Broker PROPHET SPIDER.eng.json
|
1.3 MB
|
|
Hunting Prolific Access Broker PROPHET SPIDER.eng.lrc
|
32.0 KB
|
|
Hunting Prolific Access Broker PROPHET SPIDER.eng.srt
|
34.8 KB
|
|
Hunting Prolific Access Broker PROPHET SPIDER.eng.text
|
25.9 KB
|
|
Hunting Prolific Access Broker PROPHET SPIDER.eng.tsv
|
29.3 KB
|
|
Hunting Prolific Access Broker PROPHET SPIDER.eng.txt
|
32.3 KB
|
|
Hunting Prolific Access Broker PROPHET SPIDER.eng.vtt
|
32.3 KB
|
|
Leakonomics The Supply and Demand of Hacked Data in the Criminal Underground.eng.json
|
1.7 MB
|
|
Leakonomics The Supply and Demand of Hacked Data in the Criminal Underground.eng.lrc
|
38.8 KB
|
|
Leakonomics The Supply and Demand of Hacked Data in the Criminal Underground.eng.srt
|
42.2 KB
|
|
Leakonomics The Supply and Demand of Hacked Data in the Criminal Underground.eng.text
|
31.2 KB
|
|
Leakonomics The Supply and Demand of Hacked Data in the Criminal Underground.eng.tsv
|
35.5 KB
|
|
Leakonomics The Supply and Demand of Hacked Data in the Criminal Underground.eng.txt
|
39.1 KB
|
|
Leakonomics The Supply and Demand of Hacked Data in the Criminal Underground.eng.vtt
|
39.1 KB
|
|
Look at this Graph Prioritizing Initial Access Threats & TTPS via Link Analysis.eng.json
|
538.8 KB
|
|
Look at this Graph Prioritizing Initial Access Threats & TTPS via Link Analysis.eng.lrc
|
14.2 KB
|
|
Look at this Graph Prioritizing Initial Access Threats & TTPS via Link Analysis.eng.srt
|
15.9 KB
|
|
Look at this Graph Prioritizing Initial Access Threats & TTPS via Link Analysis.eng.text
|
10.5 KB
|
|
Look at this Graph Prioritizing Initial Access Threats & TTPS via Link Analysis.eng.tsv
|
12.4 KB
|
|
Look at this Graph Prioritizing Initial Access Threats & TTPS via Link Analysis.eng.txt
|
14.4 KB
|
|
Look at this Graph Prioritizing Initial Access Threats & TTPS via Link Analysis.eng.vtt
|
14.4 KB
|
|
Mapping the Ransomware Payment Ecosystem & Threat Actor Behavior.eng.json
|
445.9 KB
|
|
Mapping the Ransomware Payment Ecosystem & Threat Actor Behavior.eng.lrc
|
12.1 KB
|
|
Mapping the Ransomware Payment Ecosystem & Threat Actor Behavior.eng.srt
|
13.4 KB
|
|
Mapping the Ransomware Payment Ecosystem & Threat Actor Behavior.eng.text
|
8.9 KB
|
|
Mapping the Ransomware Payment Ecosystem & Threat Actor Behavior.eng.tsv
|
10.6 KB
|
|
Mapping the Ransomware Payment Ecosystem & Threat Actor Behavior.eng.txt
|
12.2 KB
|
|
Mapping the Ransomware Payment Ecosystem & Threat Actor Behavior.eng.vtt
|
12.2 KB
|
|
My 0ktapus Teacher New Actors, New Problems.eng.json
|
1.0 MB
|
|
My 0ktapus Teacher New Actors, New Problems.eng.lrc
|
25.9 KB
|
|
My 0ktapus Teacher New Actors, New Problems.eng.srt
|
28.7 KB
|
|
My 0ktapus Teacher New Actors, New Problems.eng.text
|
19.6 KB
|
|
My 0ktapus Teacher New Actors, New Problems.eng.tsv
|
23.0 KB
|
|
My 0ktapus Teacher New Actors, New Problems.eng.txt
|
26.1 KB
|
|
My 0ktapus Teacher New Actors, New Problems.eng.vtt
|
26.2 KB
|
|
Opening Remarks.eng.json
|
105.7 KB
|
|
Opening Remarks.eng.lrc
|
2.4 KB
|
|
Opening Remarks.eng.srt
|
2.6 KB
|
|
Opening Remarks.eng.text
|
1.9 KB
|
|
Opening Remarks.eng.tsv
|
2.1 KB
|
|
Opening Remarks.eng.txt
|
2.4 KB
|
|
Opening Remarks.eng.vtt
|
2.4 KB
|
|
Russian Sanctions Evasion Puts Merchants and Banks at Risk.eng.json
|
550.3 KB
|
|
Russian Sanctions Evasion Puts Merchants and Banks at Risk.eng.lrc
|
14.3 KB
|
|
Russian Sanctions Evasion Puts Merchants and Banks at Risk.eng.srt
|
16.1 KB
|
|
Russian Sanctions Evasion Puts Merchants and Banks at Risk.eng.text
|
10.2 KB
|
|
Russian Sanctions Evasion Puts Merchants and Banks at Risk.eng.tsv
|
12.4 KB
|
|
Russian Sanctions Evasion Puts Merchants and Banks at Risk.eng.txt
|
14.4 KB
|
|
Russian Sanctions Evasion Puts Merchants and Banks at Risk.eng.vtt
|
14.5 KB
|
|
The Threats & Research Opportunities of the Cannabis Industry.eng.json
|
386.3 KB
|
|
The Threats & Research Opportunities of the Cannabis Industry.eng.lrc
|
10.2 KB
|
|
The Threats & Research Opportunities of the Cannabis Industry.eng.srt
|
11.2 KB
|
|
The Threats & Research Opportunities of the Cannabis Industry.eng.text
|
7.7 KB
|
|
The Threats & Research Opportunities of the Cannabis Industry.eng.tsv
|
9.0 KB
|
|
The Threats & Research Opportunities of the Cannabis Industry.eng.txt
|
10.3 KB
|
|
The Threats & Research Opportunities of the Cannabis Industry.eng.vtt
|
10.3 KB
|
|
Unmasking Venom Spider The Hunt for the Golden Chickens.eng.json
|
1.2 MB
|
|
Unmasking Venom Spider The Hunt for the Golden Chickens.eng.lrc
|
29.1 KB
|
|
Unmasking Venom Spider The Hunt for the Golden Chickens.eng.srt
|
31.7 KB
|
|
Unmasking Venom Spider The Hunt for the Golden Chickens.eng.text
|
23.3 KB
|
|
Unmasking Venom Spider The Hunt for the Golden Chickens.eng.tsv
|
26.6 KB
|
|
Unmasking Venom Spider The Hunt for the Golden Chickens.eng.txt
|
29.3 KB
|
|
Unmasking Venom Spider The Hunt for the Golden Chickens.eng.vtt
|
29.4 KB
|
|
/SLEUTHCON 2024/
|
|
Catching the Contagious Interview.mp4
|
7.2 MB
|
|
Certified Evil.mp4
|
9.2 MB
|
|
Chasing Androxgh0st Attribution in an Open-Source Cloud Malware Ecosystem.mp4
|
24.9 MB
|
|
Closing Remarks.mp4
|
7.0 MB
|
|
How eCrime Adversaries Use Legitimate Remote Management Tools.mp4
|
6.1 MB
|
|
Hyperscalers and FinCrime A Match Made in the Cloud.mp4
|
22.3 MB
|
|
I Don’t Think We’re in Western Country Anymore Ransomware TTPs by the Asia Pacific.mp4
|
28.7 MB
|
|
It Is Time to Ban Ransom Payments Change My Mind.mp4
|
10.2 MB
|
|
It's Me, Hi, I'm the APT The Rise of E-Crime to Nation-State Levels.mp4
|
37.3 MB
|
|
Opening Remarks.mp4
|
1.8 MB
|
|
Ransomware's Crazy Uncle.mp4
|
32.6 MB
|
|
Tales from the Crypt(er) The Market and Dynamics That Inform Attribution.mp4
|
8.7 MB
|
|
The Untold Stories of Bassterlord’s Manuals.mp4
|
22.3 MB
|
|
Xakep, Repa, Probiv, Spy.mp4
|
18.2 MB
|
|
/.../SLEUTHCON 2024 captions/
|
|
Catching the Contagious Interview.eng.json
|
310.7 KB
|
|
Catching the Contagious Interview.eng.lrc
|
8.3 KB
|
|
Catching the Contagious Interview.eng.srt
|
9.1 KB
|
|
Catching the Contagious Interview.eng.text
|
6.2 KB
|
|
Catching the Contagious Interview.eng.tsv
|
7.3 KB
|
|
Catching the Contagious Interview.eng.txt
|
8.3 KB
|
|
Catching the Contagious Interview.eng.vtt
|
8.4 KB
|
|
Certified Evil.eng.json
|
522.6 KB
|
|
Certified Evil.eng.lrc
|
12.9 KB
|
|
Certified Evil.eng.srt
|
14.4 KB
|
|
Certified Evil.eng.text
|
9.5 KB
|
|
Certified Evil.eng.tsv
|
11.3 KB
|
|
Certified Evil.eng.txt
|
13.0 KB
|
|
Certified Evil.eng.vtt
|
13.1 KB
|
|
Chasing Androxgh0st Attribution in an Open-Source Cloud Malware Ecosystem.eng.json
|
1.4 MB
|
|
Chasing Androxgh0st Attribution in an Open-Source Cloud Malware Ecosystem.eng.lrc
|
35.9 KB
|
|
Chasing Androxgh0st Attribution in an Open-Source Cloud Malware Ecosystem.eng.srt
|
40.1 KB
|
|
Chasing Androxgh0st Attribution in an Open-Source Cloud Malware Ecosystem.eng.text
|
26.5 KB
|
|
Chasing Androxgh0st Attribution in an Open-Source Cloud Malware Ecosystem.eng.tsv
|
31.9 KB
|
|
Chasing Androxgh0st Attribution in an Open-Source Cloud Malware Ecosystem.eng.txt
|
36.2 KB
|
|
Chasing Androxgh0st Attribution in an Open-Source Cloud Malware Ecosystem.eng.vtt
|
36.2 KB
|
|
Closing Remarks.eng.json
|
276.8 KB
|
|
Closing Remarks.eng.lrc
|
8.0 KB
|
|
Closing Remarks.eng.srt
|
9.8 KB
|
|
Closing Remarks.eng.text
|
3.8 KB
|
|
Closing Remarks.eng.tsv
|
6.0 KB
|
|
Closing Remarks.eng.txt
|
8.1 KB
|
|
Closing Remarks.eng.vtt
|
8.1 KB
|
|
How eCrime Adversaries Use Legitimate Remote Management Tools.eng.json
|
364.4 KB
|
|
How eCrime Adversaries Use Legitimate Remote Management Tools.eng.lrc
|
9.4 KB
|
|
How eCrime Adversaries Use Legitimate Remote Management Tools.eng.srt
|
10.2 KB
|
|
How eCrime Adversaries Use Legitimate Remote Management Tools.eng.text
|
7.6 KB
|
|
How eCrime Adversaries Use Legitimate Remote Management Tools.eng.tsv
|
8.6 KB
|
|
How eCrime Adversaries Use Legitimate Remote Management Tools.eng.txt
|
9.5 KB
|
|
How eCrime Adversaries Use Legitimate Remote Management Tools.eng.vtt
|
9.5 KB
|
|
Hyperscalers and FinCrime A Match Made in the Cloud.eng.json
|
1.4 MB
|
|
Hyperscalers and FinCrime A Match Made in the Cloud.eng.lrc
|
36.7 KB
|
|
Hyperscalers and FinCrime A Match Made in the Cloud.eng.srt
|
40.7 KB
|
|
Hyperscalers and FinCrime A Match Made in the Cloud.eng.text
|
28.0 KB
|
|
Hyperscalers and FinCrime A Match Made in the Cloud.eng.tsv
|
32.8 KB
|
|
Hyperscalers and FinCrime A Match Made in the Cloud.eng.txt
|
37.1 KB
|
|
Hyperscalers and FinCrime A Match Made in the Cloud.eng.vtt
|
37.1 KB
|
|
I Don’t Think We’re in Western Country Anymore Ransomware TTPs by the Asia Pacific.eng.json
|
1.0 MB
|
|
I Don’t Think We’re in Western Country Anymore Ransomware TTPs by the Asia Pacific.eng.lrc
|
26.2 KB
|
|
I Don’t Think We’re in Western Country Anymore Ransomware TTPs by the Asia Pacific.eng.srt
|
29.7 KB
|
|
I Don’t Think We’re in Western Country Anymore Ransomware TTPs by the Asia Pacific.eng.text
|
18.5 KB
|
|
I Don’t Think We’re in Western Country Anymore Ransomware TTPs by the Asia Pacific.eng.tsv
|
22.9 KB
|
|
I Don’t Think We’re in Western Country Anymore Ransomware TTPs by the Asia Pacific.eng.txt
|
26.5 KB
|
|
I Don’t Think We’re in Western Country Anymore Ransomware TTPs by the Asia Pacific.eng.vtt
|
26.5 KB
|
|
It Is Time to Ban Ransom Payments Change My Mind.eng.json
|
492.7 KB
|
|
It Is Time to Ban Ransom Payments Change My Mind.eng.lrc
|
11.6 KB
|
|
It Is Time to Ban Ransom Payments Change My Mind.eng.srt
|
12.8 KB
|
|
It Is Time to Ban Ransom Payments Change My Mind.eng.text
|
8.8 KB
|
|
It Is Time to Ban Ransom Payments Change My Mind.eng.tsv
|
10.3 KB
|
|
It Is Time to Ban Ransom Payments Change My Mind.eng.txt
|
11.7 KB
|
|
It Is Time to Ban Ransom Payments Change My Mind.eng.vtt
|
11.7 KB
|
|
It's Me, Hi, I'm the APT The Rise of E-Crime to Nation-State Levels.eng.json
|
1.4 MB
|
|
It's Me, Hi, I'm the APT The Rise of E-Crime to Nation-State Levels.eng.lrc
|
36.7 KB
|
|
It's Me, Hi, I'm the APT The Rise of E-Crime to Nation-State Levels.eng.srt
|
40.9 KB
|
|
It's Me, Hi, I'm the APT The Rise of E-Crime to Nation-State Levels.eng.text
|
27.5 KB
|
|
It's Me, Hi, I'm the APT The Rise of E-Crime to Nation-State Levels.eng.tsv
|
32.8 KB
|
|
It's Me, Hi, I'm the APT The Rise of E-Crime to Nation-State Levels.eng.txt
|
37.1 KB
|
|
It's Me, Hi, I'm the APT The Rise of E-Crime to Nation-State Levels.eng.vtt
|
37.1 KB
|
|
Opening Remarks.eng.json
|
106.3 KB
|
|
Opening Remarks.eng.lrc
|
2.9 KB
|
|
Opening Remarks.eng.srt
|
3.3 KB
|
|
Opening Remarks.eng.text
|
1.8 KB
|
|
Opening Remarks.eng.tsv
|
2.3 KB
|
|
Opening Remarks.eng.txt
|
2.9 KB
|
|
Opening Remarks.eng.vtt
|
2.9 KB
|
|
Ransomware's Crazy Uncle.eng.json
|
1.4 MB
|
|
Ransomware's Crazy Uncle.eng.lrc
|
36.4 KB
|
|
Ransomware's Crazy Uncle.eng.srt
|
40.5 KB
|
|
Ransomware's Crazy Uncle.eng.text
|
27.2 KB
|
|
Ransomware's Crazy Uncle.eng.tsv
|
32.5 KB
|
|
Ransomware's Crazy Uncle.eng.txt
|
36.8 KB
|
|
Ransomware's Crazy Uncle.eng.vtt
|
36.8 KB
|
|
Tales from the Crypt(er) The Market and Dynamics That Inform Attribution.eng.json
|
446.4 KB
|
|
Tales from the Crypt(er) The Market and Dynamics That Inform Attribution.eng.lrc
|
11.6 KB
|
|
Tales from the Crypt(er) The Market and Dynamics That Inform Attribution.eng.srt
|
12.6 KB
|
|
Tales from the Crypt(er) The Market and Dynamics That Inform Attribution.eng.text
|
9.0 KB
|
|
Tales from the Crypt(er) The Market and Dynamics That Inform Attribution.eng.tsv
|
10.4 KB
|
|
Tales from the Crypt(er) The Market and Dynamics That Inform Attribution.eng.txt
|
11.7 KB
|
|
Tales from the Crypt(er) The Market and Dynamics That Inform Attribution.eng.vtt
|
11.7 KB
|
|
The Untold Stories of Bassterlord’s Manuals.eng.json
|
1.1 MB
|
|
The Untold Stories of Bassterlord’s Manuals.eng.lrc
|
26.1 KB
|
|
The Untold Stories of Bassterlord’s Manuals.eng.srt
|
28.4 KB
|
|
The Untold Stories of Bassterlord’s Manuals.eng.text
|
20.8 KB
|
|
The Untold Stories of Bassterlord’s Manuals.eng.tsv
|
23.8 KB
|
|
The Untold Stories of Bassterlord’s Manuals.eng.txt
|
26.3 KB
|
|
The Untold Stories of Bassterlord’s Manuals.eng.vtt
|
26.3 KB
|
|
Xakep, Repa, Probiv, Spy.eng.json
|
1.1 MB
|
|
Xakep, Repa, Probiv, Spy.eng.lrc
|
26.1 KB
|
|
Xakep, Repa, Probiv, Spy.eng.srt
|
27.9 KB
|
|
Xakep, Repa, Probiv, Spy.eng.text
|
21.8 KB
|
|
Xakep, Repa, Probiv, Spy.eng.tsv
|
24.2 KB
|
|
Xakep, Repa, Probiv, Spy.eng.txt
|
26.2 KB
|
|
Xakep, Repa, Probiv, Spy.eng.vtt
|
26.3 KB
|
|
/SLEUTHCON 2025/
|
|
Bulletproof Hoster or Proxy Provider Wrong - It’s Both, or Even More.mp4
|
8.8 MB
|
|
Closing Remarks.mp4
|
3.2 MB
|
|
How Does The Com Work.mp4
|
28.3 MB
|
|
Is It Ransomware The Gameshow.mp4
|
9.5 MB
|
|
Keynote.mp4
|
23.8 MB
|
|
Navigating Shifts in Ransomware TTPs Through the Minds of Basta Actors.mp4
|
23.3 MB
|
|
Opening Remarks.mp4
|
3.5 MB
|
|
RADIANT SPIDER Unveiled Insights into a Chinese eCrime Actor.mp4
|
21.8 MB
|
|
Slop Engagement Operations - The Weird Web of an AI-Fueled SEO Spambot.mp4
|
7.9 MB
|
|
The Watched Watching Back North Korean Threat Actors Investigate Public Threat Intel SLEUTHCON 2025.mp4
|
12.6 MB
|
|
Up the Garden Path Applying Cyber Deception to the Attack Lifecycle.mp4
|
7.5 MB
|
|
Victims Beware Threat Actors Are Monitoring Your Communications Strategy.mp4
|
7.4 MB
|
|
/.../SLEUTHCON 2025 captions/
|
|
Bulletproof Hoster or Proxy Provider Wrong - It’s Both, or Even More.eng.json
|
612.0 KB
|
|
Bulletproof Hoster or Proxy Provider Wrong - It’s Both, or Even More.eng.lrc
|
15.7 KB
|
|
Bulletproof Hoster or Proxy Provider Wrong - It’s Both, or Even More.eng.srt
|
18.0 KB
|
|
Bulletproof Hoster or Proxy Provider Wrong - It’s Both, or Even More.eng.text
|
10.4 KB
|
|
Bulletproof Hoster or Proxy Provider Wrong - It’s Both, or Even More.eng.tsv
|
13.2 KB
|
|
Bulletproof Hoster or Proxy Provider Wrong - It’s Both, or Even More.eng.txt
|
15.9 KB
|
|
Bulletproof Hoster or Proxy Provider Wrong - It’s Both, or Even More.eng.vtt
|
15.9 KB
|
|
Closing Remarks.eng.json
|
216.9 KB
|
|
Closing Remarks.eng.lrc
|
6.0 KB
|
|
Closing Remarks.eng.srt
|
6.8 KB
|
|
Closing Remarks.eng.text
|
4.1 KB
|
|
Closing Remarks.eng.tsv
|
5.1 KB
|
|
Closing Remarks.eng.txt
|
6.1 KB
|
|
Closing Remarks.eng.vtt
|
6.1 KB
|
|
How Does The Com Work.eng.json
|
1.5 MB
|
|
How Does The Com Work.eng.lrc
|
37.0 KB
|
|
How Does The Com Work.eng.srt
|
41.3 KB
|
|
How Does The Com Work.eng.text
|
27.6 KB
|
|
How Does The Com Work.eng.tsv
|
33.0 KB
|
|
How Does The Com Work.eng.txt
|
37.4 KB
|
|
How Does The Com Work.eng.vtt
|
37.4 KB
|
|
Is It Ransomware The Gameshow.eng.json
|
532.4 KB
|
|
Is It Ransomware The Gameshow.eng.lrc
|
13.4 KB
|
|
Is It Ransomware The Gameshow.eng.srt
|
15.3 KB
|
|
Is It Ransomware The Gameshow.eng.text
|
9.1 KB
|
|
Is It Ransomware The Gameshow.eng.tsv
|
11.3 KB
|
|
Is It Ransomware The Gameshow.eng.txt
|
13.5 KB
|
|
Is It Ransomware The Gameshow.eng.vtt
|
13.6 KB
|
|
Keynote.eng.json
|
1.3 MB
|
|
Keynote.eng.lrc
|
31.5 KB
|
|
Keynote.eng.srt
|
34.3 KB
|
|
Keynote.eng.text
|
25.3 KB
|
|
Keynote.eng.tsv
|
28.9 KB
|
|
Keynote.eng.txt
|
31.7 KB
|
|
Keynote.eng.vtt
|
31.8 KB
|
|
Navigating Shifts in Ransomware TTPs Through the Minds of Basta Actors.eng.json
|
1.9 MB
|
|
Navigating Shifts in Ransomware TTPs Through the Minds of Basta Actors.eng.lrc
|
35.3 KB
|
|
Navigating Shifts in Ransomware TTPs Through the Minds of Basta Actors.eng.srt
|
38.3 KB
|
|
Navigating Shifts in Ransomware TTPs Through the Minds of Basta Actors.eng.text
|
28.8 KB
|
|
Navigating Shifts in Ransomware TTPs Through the Minds of Basta Actors.eng.tsv
|
32.5 KB
|
|
Navigating Shifts in Ransomware TTPs Through the Minds of Basta Actors.eng.txt
|
35.6 KB
|
|
Navigating Shifts in Ransomware TTPs Through the Minds of Basta Actors.eng.vtt
|
35.6 KB
|
|
Opening Remarks.eng.json
|
189.7 KB
|
|
Opening Remarks.eng.lrc
|
5.1 KB
|
|
Opening Remarks.eng.srt
|
5.7 KB
|
|
Opening Remarks.eng.text
|
3.6 KB
|
|
Opening Remarks.eng.tsv
|
4.3 KB
|
|
Opening Remarks.eng.txt
|
5.1 KB
|
|
Opening Remarks.eng.vtt
|
5.1 KB
|
|
RADIANT SPIDER Unveiled Insights into a Chinese eCrime Actor.eng.json
|
1.2 MB
|
|
RADIANT SPIDER Unveiled Insights into a Chinese eCrime Actor.eng.lrc
|
30.6 KB
|
|
RADIANT SPIDER Unveiled Insights into a Chinese eCrime Actor.eng.srt
|
33.5 KB
|
|
RADIANT SPIDER Unveiled Insights into a Chinese eCrime Actor.eng.text
|
24.0 KB
|
|
RADIANT SPIDER Unveiled Insights into a Chinese eCrime Actor.eng.tsv
|
27.7 KB
|
|
RADIANT SPIDER Unveiled Insights into a Chinese eCrime Actor.eng.txt
|
30.8 KB
|
|
RADIANT SPIDER Unveiled Insights into a Chinese eCrime Actor.eng.vtt
|
30.8 KB
|
|
Slop Engagement Operations - The Weird Web of an AI-Fueled SEO Spambot.eng.json
|
450.4 KB
|
|
Slop Engagement Operations - The Weird Web of an AI-Fueled SEO Spambot.eng.lrc
|
11.1 KB
|
|
Slop Engagement Operations - The Weird Web of an AI-Fueled SEO Spambot.eng.srt
|
12.0 KB
|
|
Slop Engagement Operations - The Weird Web of an AI-Fueled SEO Spambot.eng.text
|
9.0 KB
|
|
Slop Engagement Operations - The Weird Web of an AI-Fueled SEO Spambot.eng.tsv
|
10.1 KB
|
|
Slop Engagement Operations - The Weird Web of an AI-Fueled SEO Spambot.eng.txt
|
11.2 KB
|
|
Slop Engagement Operations - The Weird Web of an AI-Fueled SEO Spambot.eng.vtt
|
11.2 KB
|
|
The Watched Watching Back North Korean Threat Actors Investigate Public Threat Intel SLEUTHCON 2025.eng.json
|
626.7 KB
|
|
The Watched Watching Back North Korean Threat Actors Investigate Public Threat Intel SLEUTHCON 2025.eng.lrc
|
15.6 KB
|
|
The Watched Watching Back North Korean Threat Actors Investigate Public Threat Intel SLEUTHCON 2025.eng.srt
|
16.9 KB
|
|
The Watched Watching Back North Korean Threat Actors Investigate Public Threat Intel SLEUTHCON 2025.eng.text
|
12.5 KB
|
|
The Watched Watching Back North Korean Threat Actors Investigate Public Threat Intel SLEUTHCON 2025.eng.tsv
|
14.1 KB
|
|
The Watched Watching Back North Korean Threat Actors Investigate Public Threat Intel SLEUTHCON 2025.eng.txt
|
15.7 KB
|
|
The Watched Watching Back North Korean Threat Actors Investigate Public Threat Intel SLEUTHCON 2025.eng.vtt
|
15.7 KB
|
|
Up the Garden Path Applying Cyber Deception to the Attack Lifecycle.eng.json
|
324.3 KB
|
|
Up the Garden Path Applying Cyber Deception to the Attack Lifecycle.eng.lrc
|
8.6 KB
|
|
Up the Garden Path Applying Cyber Deception to the Attack Lifecycle.eng.srt
|
9.5 KB
|
|
Up the Garden Path Applying Cyber Deception to the Attack Lifecycle.eng.text
|
6.5 KB
|
|
Up the Garden Path Applying Cyber Deception to the Attack Lifecycle.eng.tsv
|
7.6 KB
|
|
Up the Garden Path Applying Cyber Deception to the Attack Lifecycle.eng.txt
|
8.7 KB
|
|
Up the Garden Path Applying Cyber Deception to the Attack Lifecycle.eng.vtt
|
8.7 KB
|
|
Victims Beware Threat Actors Are Monitoring Your Communications Strategy.eng.json
|
407.8 KB
|
|
Victims Beware Threat Actors Are Monitoring Your Communications Strategy.eng.lrc
|
10.0 KB
|
|
Victims Beware Threat Actors Are Monitoring Your Communications Strategy.eng.srt
|
10.8 KB
|
|
Victims Beware Threat Actors Are Monitoring Your Communications Strategy.eng.text
|
8.1 KB
|
|
Victims Beware Threat Actors Are Monitoring Your Communications Strategy.eng.tsv
|
9.1 KB
|
|
Victims Beware Threat Actors Are Monitoring Your Communications Strategy.eng.txt
|
10.0 KB
|
|
Victims Beware Threat Actors Are Monitoring Your Communications Strategy.eng.vtt
|
10.1 KB
|
|
Total files 380
|