SlideShare a Scribd company logo
1 of 53
Download to read offline
LESSER KNOWN THREAT INTELLIGENCE
IMPLEMENTATION
Avkash Kathiriya
Information Security Learner
#WhoamI
me@:~$ Avkash Kathiriya
me@:~$ Information Security Learner
me@:~$ Experience in SOC, Threat Hunting, Incident Response, ATM Security,
Threat Intelligence & research
me@:~$ Twitter : @avkashk
me@:~$ Blog: www.avkashk.wordpress.com or LinkedIn Pulse (Avkash
Kathiriya)
me@:~$ Email : avkashk@null.co.in
AGENDA
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 3
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 4
THREAT INTELLIGENCE??
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 5
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 6
Lets talk the
science way
Threat Intelligence Types
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 7
https://www.cpni.gov.uk/advice/cyber/Threat-Intelligence/
“Strategic” Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 8
Threat research
reports
Data breach
reports
Regulatory
announcements
Internal Business
strategies
Third party
outsourcing
“Tactical” Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 9
Exploit alert
monitoring
Exploit researcher
blogs
Vulnerability
dashboards
Exploitability
mapping
“Technical” Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 10
Virus Total
Abusetracker
APT IOC
OSINT
Maltego
Etc. etc.. 
“Operational” Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 11
CERT Advisory
Dark web
monitoring
Situational
Awareness
Social Media
Monitoring
Threat Intelligence Market
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 12
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 13
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 14
Lets talk the
“Sun Tzu” way
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 15
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 16
Before we
move lets take
a 1000 feet
view
Open Threat Intelligence steps
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 17
• Know “Your organisation” first
• Create Threat intel framework which suits you
• Open-source Feeds
• Open-source Platforms
• Open-source reports
• Community Tools
• Security communities
and Friends
DNS Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 18
DNS Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 19
DNS Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 20
• Catch hold the DNS logs first
• Find out how the attackers are targeting your
network
• DNS as your best buddy while doing “Threat
Hunting”
Domain Squatting
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 21
Domain Squatting
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 22
Domain Squatting
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 23
Domain Squatting
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 24
DNS
TWIST
Domain Squatting
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 25
Domain Squatting
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 26
Domain Squatting
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 27
Domain Squatting
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 28
• Intelligent way of monitoring phishing/spear-
phishing attacks
• Rich source of domain intelligence for your SOC
• Risk scoring based on below parameters
• Registered domain
• MX records
• Newly registered domain
Google Alerts
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 29
Google Alerts
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 30
Google Alerts
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 31
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 32
Google Alerts delivered to your SOC 24*7
Google Alerts In XML feeds
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 33
Google Alerts
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 34
• Intelligence gathering tool
• Vendor security intelligence gathering
• Your infrastructure vulnerability notification
• Integration with SOC for 24*7 monitoring
People Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 35
Why People Intelligence is IMP??
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 36
“People” Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 37
Security
Awareness Data
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 38
If you see “WORD” calling
“CMD”
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 39
If you see “WORD” calling
“CMD” from the user who is
Known Phish Bait
People Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 40
• Phishing simulation data is richest source of
human intelligence of your organization
• Identify your “broken link” in the “weakest link”
• Prioritize monitoring of risky users
Deception for Threat Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 41
Deception for Threat Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 42
Network
Decoy
Document
Decoy
Credential
Decoy
Recon
Outpost
Social
Decoy
Credential Theft
Enticing Document
Deception as a threat intel
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 45
• Know your attacker already inside your network
• Honey tokens for callbacks
• Setup your threat intel web bots
• Mimikatz hunting
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 46
“Pastebin” Monitoring
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 47
“Pastebin” Monitoring feeds into SOC
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 48
“Community” Intelligence
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 49
Security
Community
Friends
Conferences
Summits
Working GroupsYour Company
Takeaways
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 50
‣ Before you invest in any commercial provider, you must maximize
your own intrusions
‣ No threat intel is more relevant than what is occurring within your
own environment
‣ You don’t have the best technology and most expensive intel sources
to be effective
‣ You probably will never have a fusion center but you can make
threat intelligence work
‣ DIY / Open Source tools is perfectly acceptable
‣ Actionable intelligence must be timely
‣ Don’t spend so much time performing analysis that timeliness
suffers
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 51
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 52
Thanks and References
• Sun Tzu
• Google
• SANS
• Rick Holland
• Dave Herrald and Ryan Kovar
• Meme Generators
5/28/2017LESSER KNOWN THREATINTEL IMPLEMENTATION BY AVKASH K 53

More Related Content

What's hot

Hacking Closed Networks
Hacking Closed NetworksHacking Closed Networks
Hacking Closed NetworksPriyanka Aash
 
In search of unique behaviour
In search of unique behaviourIn search of unique behaviour
In search of unique behaviourDefCamp
 
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
CrowdStrike Webinar: Taking Dwell-Time Out of Incident ResponseCrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
CrowdStrike Webinar: Taking Dwell-Time Out of Incident ResponseBrendon Macaraeg
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNorth Texas Chapter of the ISSA
 
Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning CrowdStrike
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNorth Texas Chapter of the ISSA
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeAdam Barrera
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdStrike
 
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingProactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingCrowdStrike
 
Building an Application Security Program with Sun Tzu, The Dalai Lama and Hon...
Building an Application Security Program with Sun Tzu, The Dalai Lama and Hon...Building an Application Security Program with Sun Tzu, The Dalai Lama and Hon...
Building an Application Security Program with Sun Tzu, The Dalai Lama and Hon...Denim Group
 
Become a Threat Hunter by Hamza Beghal
Become a Threat Hunter by Hamza BeghalBecome a Threat Hunter by Hamza Beghal
Become a Threat Hunter by Hamza BeghalNull Singapore
 
Episode IV: A New Scope
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New ScopeThreatConnect
 
APT(Advanced Persistent Threats) & strategies to counter APT
APT(Advanced Persistent Threats) & strategies to counter APTAPT(Advanced Persistent Threats) & strategies to counter APT
APT(Advanced Persistent Threats) & strategies to counter APTAvkash Kathiriya
 
Getting Your Security Budget Approved Without FUD
Getting Your Security Budget Approved Without FUDGetting Your Security Budget Approved Without FUD
Getting Your Security Budget Approved Without FUDDenim Group
 
Cybersecurity is the Future of Computing
Cybersecurity is the Future of ComputingCybersecurity is the Future of Computing
Cybersecurity is the Future of ComputingDavid Fry
 

What's hot (20)

Hacking Closed Networks
Hacking Closed NetworksHacking Closed Networks
Hacking Closed Networks
 
In search of unique behaviour
In search of unique behaviourIn search of unique behaviour
In search of unique behaviour
 
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
CrowdStrike Webinar: Taking Dwell-Time Out of Incident ResponseCrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
 
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic FailuresNTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic Failures
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning Battling Unknown Malware with Machine Learning
Battling Unknown Malware with Machine Learning
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
 
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingProactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
 
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-VirusNTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - The Art of Evading Anti-Virus
 
Evolving Cybersecurity Threats
Evolving Cybersecurity Threats  Evolving Cybersecurity Threats
Evolving Cybersecurity Threats
 
Building an Application Security Program with Sun Tzu, The Dalai Lama and Hon...
Building an Application Security Program with Sun Tzu, The Dalai Lama and Hon...Building an Application Security Program with Sun Tzu, The Dalai Lama and Hon...
Building an Application Security Program with Sun Tzu, The Dalai Lama and Hon...
 
Become a Threat Hunter by Hamza Beghal
Become a Threat Hunter by Hamza BeghalBecome a Threat Hunter by Hamza Beghal
Become a Threat Hunter by Hamza Beghal
 
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & MitigationNTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
 
Episode IV: A New Scope
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New Scope
 
APT(Advanced Persistent Threats) & strategies to counter APT
APT(Advanced Persistent Threats) & strategies to counter APTAPT(Advanced Persistent Threats) & strategies to counter APT
APT(Advanced Persistent Threats) & strategies to counter APT
 
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
 
Getting Your Security Budget Approved Without FUD
Getting Your Security Budget Approved Without FUDGetting Your Security Budget Approved Without FUD
Getting Your Security Budget Approved Without FUD
 
Cybersecurity is the Future of Computing
Cybersecurity is the Future of ComputingCybersecurity is the Future of Computing
Cybersecurity is the Future of Computing
 

Similar to Avkash_lesser known threat intel implementations

Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNorth Texas Chapter of the ISSA
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNorth Texas Chapter of the ISSA
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresNothing Nowhere
 
A Brief History of Cryptographic Failures - Mork
A Brief History of Cryptographic Failures - MorkA Brief History of Cryptographic Failures - Mork
A Brief History of Cryptographic Failures - MorkNothing Nowhere
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNorth Texas Chapter of the ISSA
 
Hidden empires of malware
Hidden empires of malwareHidden empires of malware
Hidden empires of malwareRyan Kovar
 
Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?Arthur Paixão
 
Rishi Malik - How to write insecure software: It's easier then you think!
Rishi Malik - How to write insecure software: It's easier then you think!Rishi Malik - How to write insecure software: It's easier then you think!
Rishi Malik - How to write insecure software: It's easier then you think!Rishi Malik
 

Similar to Avkash_lesser known threat intel implementations (13)

Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic Failures
 
A Brief History of Cryptographic Failures - Mork
A Brief History of Cryptographic Failures - MorkA Brief History of Cryptographic Failures - Mork
A Brief History of Cryptographic Failures - Mork
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Hidden empires of malware
Hidden empires of malwareHidden empires of malware
Hidden empires of malware
 
Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Rishi Malik - How to write insecure software: It's easier then you think!
Rishi Malik - How to write insecure software: It's easier then you think!Rishi Malik - How to write insecure software: It's easier then you think!
Rishi Malik - How to write insecure software: It's easier then you think!
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Avkash_lesser known threat intel implementations