Uncovering and Visualizing Malicious Infrastructure - SANS Threat Hunting Summit 2018
Uncovering And Visualizing Botnet Infrastructure And Behavior DeepSec 2017
Hunting Hidden Empires with TLS - Certified Hypotheses - SANS Cyber Threat Intelligence Summit 2018
Using Artificial Intelligence to Predict Malicious Infrastructure Activity - Staffan Truvé
Malware Infrastructure Easier to Deploy | AT&T ThreatTraq
Threat Hunting Using Live Box Forensics - SANS Threat Hunting Summit 2018
What Is Network Forensics? Analyzing Raw Packets To Find Events. - Internet Infrastructure Explained
A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure
How to Hack Any Account using Gophish in Kali Linux
RiskIQ & Maltego - How Mapping and Visualizing the Web Leaves Advance APT's Nowhere to Hide
Data matters: More effective threat hunting and defense with internet scan data
Infrastructure Chaining Using Microsoft Defender Threat Intelligence
Investigating APT malware with Maltego and ThreatCrowd
Deriving Insight from Threat Actor Infrastructure
BSides DC 2014 - MalwareViz: a free Malware Visualizer
"Task 3: Information Gathering with Maltego GUI Tool"
Dusty Evanoff - Malware Visualization with ProcDOT
The Most Dangerous Game Hunting Adversaries Across the Internet
Cyber Threat Hunting in the Real World - Tim Crothers - Part 1
Supercharged graph visualization for cyber security