Upgrading Your CTI to Track Down Criminal Hosting Infrastructures - SANS CTI Summit 2018
Tracking down criminal edited 0001
Tracking down criminal episode 1 0001
Tracking Down A Dangerous Criminal
Using Intelligence to Heighten your Defense - CTI SUMMIT 2017
Using CTI Against the World's Most Successful Email Scam - CTI SUMMIT 2017
2017 CTI Summit Highlight - Using CTI Against the World's Most Successful Email Scam
New DNA tech tracking down criminals
DEF CON 25 - Thomas Mathew, Dhia Mahjoub - Malicious CDNs
Taking the Temperature of the Cyber Underground Maurits Lucas (Director Intel Solutions, Intel 471)
Stalker uses voter registration to track down address of Ohio victim
April shooting haunts victim: 'The person is out there'
Reversing Threat Intelligence - Fun with Strings in Malware - CTI SUMMIT 2017
Hunting Hidden Empires with TLS - Certified Hypotheses - SANS Cyber Threat Intelligence Summit 2018
Family of murder victim helps track down accused killer
#HITB2018AMS CommSec D1 - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown
The hidden history of cyber-crime forums - bbc news
BSides Detroit 2018 103 Know the Enemy How to make threat intelligence work Nir Yosha
Zloader Maldoc Analysis With xlm-deobfuscator
Accurate Thinking: Analytic Pitfalls and How to Avoid Them - CTI SUMMIT 2017
Basic Functionalities - Hive
Information Anarchy: A Survival Guide for the Misinformation Age - SANS CTI Summit 2018
Legal Implications of Threat Intelligence Sharing - SANS CTI Summit 2018
Determining the Fit & Impact of CTI Indicators on Your Monitoring Pipeline - SANS CTI Summit 2018
Schroedinger’s Backslash: Tracking the Chinese APT Goblin Panda with RTF Metadata - SANS CTI Summit