Developing Threat Intel with Slack
Wouldn’t it be cool, if your IDS could start hunting automatically.. simply by paying attention to your #ops channel?
Wouldn’t it be cool, if your IDS could start hunting automatically.. simply by paying attention to your #ops channel?
How to scale your phishing detection to millions of attacks per day- with just $4,000 and a laptop.
While everyone else is trying to rack servers, build API’s, client tools, documentation and billing systems, you’re already way ahead of them, spending the majority of your time hunting…
.. because having to fight for the resources, to keep people from robbing you, is dumb.
You should assume your customers are smart. You should be challenging them every day to be better. Use those metrics to retain the good ones and drive everyone else towards the competition.
I've seen presentations that prove this, and the AI does a better job at crafting phishing urls with a higher success rates than most humans do. This is where we start thinking of the larger AI frameworks as layers..
The main focus of the last ~60 hours has been APIs, feeds and real-time streaming. This includes the HTTP REST API the realtime ZeroMQ streaming API and to some extent, WebHooks…
If you're looking to build and deploy your own #ThreatIntel platform, these are the things you should be thinking about.. It should take months, not years.. and you should learn from our mistakes, not just your own.