We are proud of the rigorous work our Threat Intelligence Advisors, like Will Thomas, do to equip the global community of defenders. Extracting actionable intelligence from massive ransomware leaks requires structured data analytics. In a recent podcast episode, Will discusses his methodology for parsing the vast Conti dataset using tools like Cyber Chef and Elastic Search. Sharing these tactical approaches ensures practitioners have the knowledge to hunt effectively and disrupt adversary operations. #ThreatIntelligence #IncidentResponse #CTI #CyberSecurity
🎙️ NEW PODCAST EPISODE ALERT! 🎙️ "The only way to really get ahead of some of this stuff is to just be more proactive, building fingerprints, building rules, doing threat hunting. The cyber threats are speeding up. They're coming at you from all sorts of different ways. And if you're not proactively getting ahead of them, you're just going to run out of time." That's where Season 2, Episode 6 starts. Will Thomas, known across the CTI community as #BushidoToken, SANS FOR589 co-author, co-founder of Curated Intelligence, and creator of the Ransomware Tool Matrix, doesn't just research threats, he builds great open-source infrastructure the rest of the industry uses to track them. In this episode we explore: 🔍 Why most threat intelligence platforms are ingesting stale IOCs and generating false positives instead of actionable signal; 📂 How the Conti and Black Basta leaks became a masterclass in understanding how ransomware operators actually think and operate; 🛡️ What BYOVD and EDR-on-EDR attacks reveal about where endpoint-centric defense strategies are breaking down; 🪪 How identity-level compromise has made EDR largely irrelevant for a whole class of modern intrusions; 🔁 Why threat hunting isn't optional anymore and what a bi-directional TIP and SIEM relationship actually looks like in practice; If you work in CTI, threat hunting, detection engineering, or security leadership and you want to understand how the most prolific open-source threat researcher in the community approaches the craft, this one is for you. 🎧 Tune in: Apple Podcasts: https://lnkd.in/gHKUkTuH ᯤ Spotify: https://lnkd.in/gCDnwJhS 📦 Amazon Music: https://lnkd.in/gZ-hYFyW 🎬 YouTube: https://lnkd.in/gEB4C4sC 🎙️ Or your favourite podcast platform: https://lnkd.in/gDpNZeCB 💼 Connect with us on our LinkedIn Group: https://lnkd.in/gMKYqgA9 📡 Follow our page Cyber Threat Intelligence Podcast and stay on top of all new episodes and relevant CTI content. #CyberThreatIntelligence #CyberSecurity #CTI #Podcast #Infosec