The Game of Cyber Threat Hunting: The Return of the Fun

If you like what I do in hacking and want to support, I invite you to visit our store to buy cheap and exclusive nfts: https://mintable.app/u/cha0smagick



Dr. Xiaokui Shu, Research Staff Member, IBM Research
Dr. Jiyong Jang, Research Scientist and Manager, IBM Research

Threat hunting works like scientific discovery in the cyber world, yet the excitement of its eureka moment has been largely overshadowed by tedious tasks in the field, such as complex query crafting and manual data pivoting. This should not be the case. Join this session to see the fun brought back to threat hunting with new approaches and a live demo that refocuses hunting to its creative, exciting nature.

For more hacking info and tutorials visit: https://sectemple.blogspot.com/

Hello and welcome to the temple of cybersecurity. If you are looking for tutorials and all the news about the world of hacking and computer security, you have come to the right place. We invite you to subscribe to our newsletter in the box at the top and to follow us on our social networks:

Twitter: https://twitter.com/freakbizarro
Facebook: https://web.facebook.com/sectempleblogspotcom/
Discord: https://discord.gg/5SmaP39rdM

We also invite you to visit the other blogs in our network, where you can find something for every taste.
https://elantroposofista.blogspot.com/
https://gamingspeedrun.blogspot.com/
https://skatemutante.blogspot.com/
https://budoyartesmarciales.blogspot.com/
https://elrinconparanormal.blogspot.com/
https://freaktvseries.blogspot.com/

#hacking, #infosec, #tutorial, #bugbounty, #threathunting, #opensource, #pentest, #pentesting,

Comments