06. x33fcon 2019 - Atomic Threat Coverage: How to ATT&CK by Danil Yugoslavsky & Mateusz Wydra
08. x33fcon 2019 - APT ATT&CK™ - Threat-based Purple Teaming by Jamie Williams & Daniel Weiss
x33fcon 2019 conference highlights
10. x33fcon 2019 - Hunters ATT&CKing with the right data! by Roberto Rodriguez Jose Louis Rodriguez
09. x33fcon 2019 - Hunting beacons by Bartosz Jerzman
08. x33fcon 2018 - Aligning Threat intelligence Attribution to Defender Needs by Joe Slowik
01. x33fcon 2019 - Keynote by Aaron Wade
11. x33fcon 2019 - SS7 for INFOSEC by Paul Coggin
x33fcon 2020 conference highlights
x33fcon 2022 teaser
2. Piotr Białczak - Hunting malware using its fingerprints
Joe Slowik - Indicators vs. Anomalies vs. Behaviors: A Critical Examination for ICS Defense
Update On Atomic Threat Coverage - Daniil Yugoslavskiy
Tracking attackers: Why attribution matters and how to do it.
The Hidden Office Test Key (Persistence)
How to use the MITRE ATT&CK Navigator
13. Pawel Kordos, Patryk Czeczko - Malware techniques from aggressor's perspective
cloud_breach_s3 / AWS cloud hacking - download the confidential files from the AWS S3 bucket.
Adversary Emulation and Red Team Exercises - EDUCAUSE
The Imitation Game: Emulating Attackers - Wietze Beukema