Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Topic
Threat Intel talks at BSides
602 talks tagged
Threat Intel
from 98 chapters of BSides events worldwide.
Related topics
Case Studies and Incidents Analysis
Technical
Blue
Talk
Research
Technical Deep-dives
54:05
The Road to Hell is Paved with Bad Passwords
Chris Kubecka
BSides Las Vegas
· 2019
War Stories
DFIR
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2019-10
27:37
PowerShell-Fu — Hunting on the Endpoint
Chris Gerritz
BSides Las Vegas
· 2016
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Technical Deep-dives
Talk
Open →
2016-08
41:15
OSTrICa – Open Source Threat Intelligence Collector
Roberto Sponchioni
BSides London
· 2016
Technical
DFIR
Threat Intel
Tooling
Demo
Talk
Open →
2016-07
36:51
ThreatPursuit VM
Dan Kennedy
BSides Canberra
· 2020
Tooling
Malware Analysis
Threat Intel
Blue
Demo
Talk
Open →
2020-05
30:27
David Bianco - The Secret Origins of the Pyramid of Pain
David Bianco
BSides Augusta
· 2022
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-10
44:04
Inside Magecart: Their Web Skimming Tactics Revealed
Terry Bishop
BSides London
· 2019
Technical
Malware Analysis
Threat Intel
Web AppSec
Intermediary
Talk
Open →
2019-06
36:55
Malware and Machine Learning: A Match Made in Hell
Mikko Hypponen
BSides Berlin
· 2023
Policy
Technical
AI Security
Malware Analysis
Threat Intel
Keynote
Open →
2024-01
41:58
BotProbe - botnet traffic capture using IPFIX
Mark Graham
Adrian Winkles
BSides London
· 2018
Technical
Malware Analysis
Network Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-06
51:34
Let's Get Cooking with CyberChef
Marcelle Lee
BSides Charm
· 2022
Technical
DFIR
Malware Analysis
Threat Intel
Talk
Open →
2022-07
38:26
The Woman Who Squashed Terrorists When an Embassy Gets Hacked
Chris Kubeka
BSides Cape Town
· 2019
War Stories
DFIR
Threat Intel
Blue
Case Studies and Incidents Analysis
Keynote
Open →
2019-12
55:35
Objectively Measuring Hunt Value
Justin Kohler
Patrick Perry
BSides Augusta
· 2018
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2018-10
16:22
PLC for Home Automation and How It Is as Hackable as a Honeypot
Philippe Lin
Scott Erven
BSides Las Vegas
· 2016
Technical
IoT
Physical Security
Threat Intel
Talk
Open →
2016-08
40:17
A Threat Analysis of 0ktapus SMS Phishing Campaigns
Will Thomas
BSides Cheltenham
· 2023
Technical
War Stories
Malware Analysis
Social Engineering
Threat Intel
Talk
Open →
2023-06
31:02
Phineas Fisher: A Timeline of Hacktivism
BSides Leeds
· 2020
War Stories
OSINT
Reverse Engineering
Threat Intel
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2020-07
29:48
Kevin Breen: RATs and IOC's - The Easy Way
Kevin Breen
BSides London
· 2014
Technical
DFIR
Malware Analysis
Threat Intel
Talk
Open →
2014-05
45:10
Gollum: One Anti-Phish Bot to Rule Them All
Byron Rudman
BSides Cape Town
· 2019
Technical
Detection Engineering
Threat Intel
Tooling
Blue
Talk
Open →
2019-12
43:57
TL;DR: Applying AI to Security
Clint Gibler
BSidesSF
· 2024
Technical
AI Security
Detection Engineering
Threat Intel
Intro
Talk
Open →
2024-07
44:13
Using SOCMINT In Threat Intelligence by Matthias Wilson
Matthias Wilson
BSides Dublin
· 2021
Technical
OSINT
Threat Intel
Talk
Open →
2021-05
20:12
Attack of the Graph: Visual Tools for Cyber Analysis
Christian Miles
BSides Vancouver
· 2021
Technical
Threat Intel
Threat Modeling
Vulnerability Research
Talk
Open →
2021-06
1:12:47
Metlstorm's Empiricism Emporium: Unpleasant Truths Our Speciality
Adam Boileau
BSides Wellington
· 2017
Technical
War Stories
Active Directory
Kerberos
Supply Chain Security
Threat Intel
Advanced
Red
+1
Open →
2018-02
25:08
Behind Enemy Lines by Ido Rozen
Ido Rozen
BSides TLV
· 2022
Research
Malware Analysis
Threat Intel
Web AppSec
Talk
Open →
2022-07
46:31
Detection as Code: The Engineering-Focused Future of Detection and Response
Jackie Bow
Julie Agnes Sparks
Jessica Rozhin
Louis Barrett
BSidesSF
· 2023
Technical
Detection Engineering
DevSecOps
Threat Intel
Blue
Panel
Open →
2023-05
24:21
Find, Fix, Finish: Generating Competitive Advantage With Threat Hunting
Brody Nisbet
BSides Canberra
· 2024
Technical
Detection Engineering
Threat Intel
Blue
Methodology
Talk
Open →
2024-10
27:38
Linux Under Siege: Analyzing the Latest Cyber Espionage Tactics and Malware Trends
Marc Rivero Lopez
BSides Budabest
· 2024
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-01
44:41
Malvertising: Under The Hood
Chris Boyd
BSides Manchester
· 2017
Technical
Malware Analysis
Threat Intel
Web AppSec
Talk
Open →
2017-08
24:45
Honeydocs and Offensive Countermeasures
Roy Firestein
BSides Toronto
· 2014
Technical
DFIR
Threat Intel
Blue
Demo
Talk
Open →
2014-12
47:05
OWASP Amass Beyond Subdomain Enumeration
Jeff Foley
Anthony Rhodes
BSidesROC
· 2019
Technical
OSINT
OWASP
Threat Intel
Talk
Open →
2019-03
17:51
The Art Of Cyber Deception
Joshua Wardle
BSides London
· 2025
Technical
Detection Engineering
Threat Intel
Talk
Open →
2024-02
46:04
Cyber Threat Intelligence and APT 101
Ronnie Obenhaus
John Stoner
BSides DC
· 2019
Technical
Threat Intel
Intro
Talk
Open →
2019-10
39:46
Exploit Prediction Scoring System (EPSS) - The User Guide - Chris Madden
Chris Madden
BSides Dublin
· 2024
Technical
Threat Intel
Vulnerability Research
Empirical Research
Methodology
Talk
Open →
2024-06
45:17
Enterprise Security Monitoring: Comprehensive Intel-Driven Detection
David Bianco
BSides Augusta
· 2013
Technical
Detection Engineering
Threat Intel
Methodology
Talk
Open →
2013-09
37:51
Building an Effective Intrusion Detection Program
Jason Craig
BSidesSF
· 2017
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2017-03
25:31
Intelligence led Penetration Testing
Cam Buchanan
BSides London
· 2015
Technical
Malware Analysis
Reverse Engineering
Threat Intel
Red
Talk
Open →
2015-07
27:44
To Protect and Control: The Militarization of the Internet
Jared Naude
BSides Cape Town
· 2025
Policy
Research
Privacy
Supply Chain Security
Threat Intel
Talk
Open →
2025-12
8:00:21
BSides Oslo 2025 — Live Stream
BSides Oslo 2025
Technical
Malware Analysis
Reverse Engineering
Social Engineering
Threat Intel
Web AppSec
Intermediary
Red
+1
Open →
2025-10
38:25
How to Stop Worrying & Build a Modern Detection & Response Program
Allyn Stott
BSides Berlin
· 2023
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Methodology
Talk
Open →
2024-01
28:25
Understanding IRSF Fraud: Protecting Against SMS Exploitation
Vien Van
Senthil Sivasubramanian
BSidesSF
· 2025
Technical
Detection Engineering
Threat Intel
Web AppSec
Talk
Open →
2025-10
34:04
Automating Threat Hunting on the Dark Web
Apurv Singh Gautam
BSides Philly
· 2020
Technical
OSINT
Threat Intel
Technical Deep-dives
Talk
Open →
2020-12
50:58
Threat hunting: Using MITRE ATT&CK against Carbanak malware
Amol Sarwate
BSidesSF
· 2022
Technical
Detection Engineering
Malware Analysis
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2022-07
29:42
Maltego In The Enterprise
David Bressler
BSides Boston
· 2013
Technical
OSINT
Threat Intel
Blue
Demo
Talk
Open →
2013-06
27:56
Honeypot Boo Boo: Better Breach Detection With Deception Inception
Justin Varner
BSides Munich
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2023-10
43:27
Threat Hunting AWS CloudTrail Logs with Microsoft Sentinel: Real-Time Attack Demo
Arijit Paul
BSides Sydney
· 2025
Technical
Cloud IAM
Detection Engineering
Threat Intel
Intermediary
Demo
Open →
2025-02
33:30
MITRE D3FEND and How to Master It
Saba Bagheri
BSides Sydney
· 2025
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2025-02
14:55
Connecting the dots: A beginner's experience of threat actor tracking - Keith Short
Keith Short
BSides London
· 2018
Technical
Malware Analysis
Threat Intel
Intro
Blue
Talk
Open →
2018-06
24:40
Logs and Tactical Defence
Allan Stojanovic
BSides Toronto
· 2014
Technical
Detection Engineering
Network Security
Threat Intel
Blue
Talk
Open →
2014-12
47:19
The Dangers of Working in Cyber Security
Simon Whittaker
BSides Belfast
· 2017
War Stories
Career & Soft Skills
DFIR
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2017-10
44:20
Automating Threat Hunting on the Dark Web
Apurv Singh Gautam
BSides Toronto
· 2020
Technical
OSINT
Threat Intel
Talk
Open →
2021-11
33:30
Your Intrusion Detection Still Sucks (And What to Do About It)
Jason Craig
BSidesSF
· 2025
Technical
Detection Engineering
Threat Intel
Talk
Open →
2025-10
31:17
A Better Way to Get Intelligent About Threats
Adam Vincent
BSides DC
· 2014
Technical
Threat Intel
Talk
Open →
2014-10
34:05
"SSH, so hot right now. Profiling it with HASSH" - Ben Reardon & Adel Karimi
Ben Reardon
Adel Karimi
BSides Canberra
· 2019
Technical
Detection Engineering
Network Security
Threat Intel
Talk
Open →
2019-05
44:00
The Nation State Actor Ate My Homework!
Liam Smit
BSides Cape Town
· 2019
Research
Hardware Security
Malware Analysis
Reverse Engineering
Threat Intel
Advanced
Case Studies and Incidents Analysis
Empirical Research
+2
Open →
2019-12
29:14
Alex Kirk - Incident response and threat hunting using Bro/Zeek data
Alex Kirk
BSides Augusta
· 2019
Technical
DFIR
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2019-10
46:20
Target Acquired: Human Intelligence Tradecraft and Insider Threat Recruitment
Chris Russell
BSides Dallas/Fort Worth
· 2021
Technical
War Stories
OSINT
Social Engineering
Threat Intel
Talk
Open →
2021-11
40:43
Detecting Malicious Certificates Using Machine Learning
Abhishek Sharma
Khaled Al-Hassanieh
Jason Reaves
BSides DC
· 2017
Research
Technical
Cryptography
Malware Analysis
Threat Intel
Talk
Open →
2017-10
25:10
Finetuning Large Language Models (LLMs) for Security Log Detections
Wilson Tang
BSidesSF
· 2024
Technical
AI Security
Detection Engineering
Threat Intel
Talk
Open →
2024-07
41:46
The Expanding Universe of Cyber Threats
Dr. Xena Olsen
BSidesSF
· 2023
Technical
Threat Intel
Intro
Case Studies and Incidents Analysis
Keynote
Open →
2023-05
27:48
Team Threat Hunting with AI and Automation
Kenneth Peeples
BSides Charleston
· 2024
Technical
AI Security
Container Security
Detection Engineering
Threat Intel
Talk
Open →
2024-11
26:00
Exposed Secrets — How Public Git Repositories and Docker Images Expose Millions of Secrets
Mackenzie Jackson
BSidesSF
· 2022
Research
DFIR
Supply Chain Security
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-07
41:49
Prioritising your security work using MITRE ATT&CK
Floris Ladan
BSides Tallinn
· 2022
Technical
Detection Engineering
Threat Intel
Threat Modeling
Intermediary
Blue
Talk
Open →
2022-10
28:33
Hook, Line, and Tinker: A Dive into Phishing Campaign Sites
Rick Ramgattie
BSidesSF
· 2024
Technical
OSINT
Threat Intel
Web AppSec
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2024-07
45:48
One Technique, Two Techniques, Red Technique, Blue Technique: Operationalizing MITRE ATT&CK
Jamie Williams
Daniel Weiss
BSides DC 2018
Technical
Detection Engineering
Threat Intel
Threat Modeling
Talk
Open →
2018-11
43:20
There and Back Again: Detecting OT devices across protocol gateways
Rob Kim
BSides CDMX
· 2025
Technical
Network Security
Threat Intel
Talk
Open →
2025-07
45:41
Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign Against a Foreign Government
Mark Parsons
BSides Charleston
· 2024
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-11
52:17
The Current State of Microsoft Identity Security: Common Security Issues
Sean Metcalf
BSides Charm
· 2024
Technical
Active Directory
Cloud IAM
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-06
31:05
Advanced Persistent Teenagers: Understanding the Lapsus$ Playbook
Benjamin Hering
BSidesSF
· 2024
Technical
Active Directory
Social Engineering
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2024-07
1:29:11
Malwhere? A Cyber Navigation with Divesh Mandhyan
Divesh Mandhyan
Kartik Verma
BSides Noida
· 2025
Technical
Malware Analysis
OSINT
Threat Intel
Talk
Open →
2025-03
8:26:49
Thinking Outside the SOC: Structured Analytical Techniques for the Overloaded Cyber Analyst
Haley Beam
Alina Thai
BSides Las Vegas
· 2025
Technical
DFIR
Detection Engineering
Threat Intel
Talk
Open →
2025-08
50:00
Hunting PowerShell Attacks on The Open Internet
Paul Melson
BSides Augusta
· 2019
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2019-10
58:14
Velociraptor: Digging Deeper
Michael Cohen
BSides Sydney
· 2019
Technical
DFIR
Threat Intel
Blue
Demo
Talk
Open →
2019-09
1:00:10
Threat Hunting In Practice - Michael-Angelo Zummo
Michael-Angelo Zummo
BSides KC
· 2022
Technical
DFIR
Threat Intel
Blue
Talk
Open →
2022-10
40:18
Fighting Fraud in the Trenches
Amir Shaked
BSides Las Vegas
· 2018
Technical
Threat Intel
Web AppSec
Talk
Open →
2018-09
15:28
No Distribute Scanners:
Florian Murschetz
Mathieu Gaucheler
BSides Munich
· 2021
Research
Malware Analysis
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-06
22:49
Scaling Amazon GuardDuty: A Comprehensive Detection Strategy
Avinash Reddy Thumma
Amin
BSides Ahmedabad
· 2025
Technical
Cloud IAM
Detection Engineering
Threat Intel
Talk
Open →
2025-05
29:50
Large NLP Machine Learning Models and Their Upcoming Impact on Cybersecurity
Geoff McDonald
BSides Vancouver
· 2022
Technical
AI Security
Malware Analysis
Threat Intel
Intro
Talk
Open →
2022-07
27:20
Panda Mirror: How the Chinese CCP Manipulates NPM to Hoard Malware
Paul McCarty
BSides Canberra
· 2025
Research
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Talk
Open →
2025-12
57:21
IPv6 IS a Security Defense - How not to get it wrong
Joe Klein
BSides Delaware
Technical
Network Security
Threat Intel
Talk
Open →
2017-11
1:05:35
A Deep Look into a Chinese Advanced Attack
Michael Gough
BSides DC
· 2015
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-12
22:22
What the Yandex Leak Tells Us About How Big Tech Uses Your Data
Kaileigh McCrea
BSides Las Vegas
· 2023
Research
OSINT
Privacy
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-10
27:40
Ferris Bueller's Guide to Abuse Domain Permutations
Rob Ragan
Kelly Albrink
BSidesSF
· 2019
Technical
OSINT
Social Engineering
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2019-03
43:12
Tracking Malicious Logon: Visualize and Analyze Active Directory Event Logs
Shusei Tomonaga
Tomoaki Tani
BSides Las Vegas
· 2018
Technical
Active Directory
DFIR
Threat Intel
Blue
Talk
Open →
2018-09
23:10
Building Your Own WHOIS Dataset for Reconnaissance
Will Vandevanter
BSides Las Vegas
· 2024
Technical
OSINT
Threat Intel
Red
Talk
Open →
2024-09
29:35
The Bucket List: Experiences Operating S3 Honeypots
Cameron Ero
BSidesSF
· 2018
Research
Cloud IAM
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-04
40:55
Quando o Simples Vence: Anatomia Real dos Ataques que Continuam Funcionando
Ricardo Tavares
BSides São Paulo
· 2025
War Stories
Active Directory
Detection Engineering
Malware Analysis
Threat Intel
Blue
Purple
Case Studies and Incidents Analysis
+1
Open →
2025-06
36:45
Testing Security Solutions with Atomic Red Team
Michael Haag
BSides Knoxville
· 2018
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2019-04
55:42
Build Your Own Threat Intel Platform (No Budget Required)
A. Stryker
BSides SLC
· 2026
Technical
AI Security
OSINT
Threat Intel
Intro
Talk
Open →
2026-04
50:15
Unraveling the Threat of Chrome Based Malware
Justin Warner
Spencer Walden
BSides DC
· 2018
Technical
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-11
42:21
Now You C(&C), Now You Don't
Amichai Shulman
Stav Shulman
BSides TLV
· 2022
Research
Technical
Malware Analysis
Network Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-07
53:26
Bringing Harmony to IIS: Using game mods to protect (or nuke) your web server
Adrian Justice
BSides Canberra
· 2023
Technical
Reverse Engineering
Threat Intel
Web AppSec
Advanced
Demo
Talk
Open →
2023-10
46:01
Drop It Like It's Qbot: Detecting Initial Execution Earlier with OSINT
Stef Rand
BSides Augusta
· 2023
Technical
Detection Engineering
Malware Analysis
OSINT
Threat Intel
Blue
Talk
Open →
2023-10
56:01
21st Century War Stories
Ben Turner
BSides Manchester
· 2016
War Stories
OSINT
Social Engineering
Threat Intel
Red
Case Studies and Incidents Analysis
Talk
Open →
2016-09
34:52
Hiding Your Attacks with Misdirection
Jonathan Echavarria
BSides Orlando
· 2015
Technical
Malware Analysis
Network Security
Threat Intel
Red
Talk
Open →
2015-11
46:20
Unmasking the Digital Shadows: OSINT Techniques for Cybersecurity Professionals
Sharon Knowles
BSides Cape Town
· 2025
Technical
OSINT
Threat Intel
Keynote
Open →
2025-03
54:31
Building an Open Source Threat Intelligence Program
Edward McCabe
BSides Charleston
· 2014
Technical
OSINT
Threat Intel
Talk
Open →
2014-11
29:45
The Brazilian Deep Web: How Fraud Groups Operate on Telegram and WhatsApp
Thiago Bordini
BSides Las Vegas
OSINT
Social Engineering
Threat Intel
Talk
Open →
2023-10
30:56
Into the Vo1d: Hunting a Botnet Hidden in TV Boxes
André Tavares
BSides Lisbon
· 2025
Technical
IoT
Malware Analysis
Threat Intel
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
54:23
Forecasting Cyber Attacks
Charlene Deaver-Vazquez
BSides Charm
· 2022
Technical
Threat Intel
Threat Modeling
Methodology
Technical Deep-dives
Talk
Open →
2022-07
23:13
Using machine learning to detect sensitive documents on SharePoint
Wilson Tang
BSidesSF
· 2023
Technical
Cloud IAM
Machine Learning
Threat Intel
Intermediary
Technical Deep-dives
Talk
Open →
2023-05
49:46
Project DiSIEM
Ana Respício
Fernando Alves
Alysson Bessani
Pedro Ferreira
BSides Lisbon
· 2018
Technical
Detection Engineering
OSINT
Threat Intel
Technical Deep-dives
Talk
Open →
2018-12
37:55
Simple Data Exfiltration in a Secure Industry Environment
Phil Cronin
BSides Boston
· 2016
Technical
War Stories
Detection Engineering
Network Security
Threat Intel
Red
Talk
Open →
2016-08
27:32
Behind the Curtain of Dark Web and Cybercrime Operations
Alexander Wilczek
BSides Canberra
· 2025
Research
Technical
Cryptography
DFIR
Threat Intel
Talk
Open →
2025-12
View all 602 talks tagged Threat Intel →