Discover Security Events in Threat Intelligence
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
4 days from now
This session of Out of the Woods: The Threat Hunting Podcast challenges participants to identify a malware family through live analysis. Hosts reveal behavior in stages, walking through execution patterns, infrastructure indicators, and operational tradecraft tied to an active campaign. Attendees will assess how observed activity maps to MITRE ATT&CK and how tactics evolve across campaigns.
The webinar examines delivery methods, post exploitation behavior, and signals that support attribution. Participants can submit their guess before the final reveal. The discussion centers on real world malware behavior, behavioral fingerprinting across variants, and how infection chains reflect operator intent.
2 days ago
Modern social engineering attacks span multiple channels, including email, SMS, voice, chat, and social platforms, making them difficult to detect and contain using traditional tools. This webinar explores the limitations of legacy digital risk protection (DRP) and security awareness training (SAT) approaches in addressing fast moving, multi channel threats. The session focuses on how organizations can improve detection and response by correlating signals across different attack surfaces.
Attendees will learn how AI driven platforms can help identify and disrupt attacker campaigns in real time while reducing reliance on manual processes. The discussion also highlights the role of employees as a critical line of defense and how training can be integrated into broader security operations. The webinar provides insight into modernizing defenses against evolving social engineering threats.
2 days ago
Threat hunting requires a different approach to prioritization than alerts or incident response. This workshop explains why it is not about chasing the most severe threat, but about identifying weak visibility, incomplete detection coverage, and areas of unknown risk. Scott Poley presents a structured method for managing threat hunting as a discovery driven capability that strengthens the overall security program.
The session explores how prioritization often becomes clearer after execution, compares actor focused and technique focused strategies, and shows how hunting improves detection engineering and telemetry coverage. It also outlines a management level framework for measurable coverage tracking and program growth. Participants who complete the workshop and final challenge earn a certification from Intel 471's Threat Hunting Management Program.
2 days ago
Legacy DRP and SAT tools are struggling to keep up with modern social engineering attacks that spread across email, SMS, voice, chat, social platforms, and paid ads. Security teams face high alert volumes and slow manual workflows while attackers move quickly across multiple channels. This webinar presents a different approach built for today’s threat landscape.
The session introduces an AI native, unified platform designed to correlate signals across communication surfaces and autonomously disrupt attacker campaigns. It also highlights how organizations can train employees to serve as the first line of defense against social engineering threats.
3 days ago
New research from GreyNoise highlights how attackers are targeting edge infrastructure and where defenses still fall short. In this webinar, GreyNoise's Founder, VP of Data Science and Research, and Director of Intelligence examine findings from the 2026 State of the Edge Report. The session reviews large scale exploitation activity observed across internet facing systems and explains how targeting patterns challenge common assumptions about where defenses are strongest.
Speakers analyze trends such as remote code execution attempts from previously unseen IPs, rapid botnet growth across residential networks, and the continued exploitation of older vulnerabilities. The discussion also covers why reputation based blocking and patching based on recency can leave gaps, and how clustering techniques at the ASN and fingerprint level can help security teams turn large volumes of attacker activity into actionable defense decisions.
3 days ago
Supply chain attacks are reshaping the modern cyber threat landscape by exploiting trusted vendors, SaaS platforms, open source dependencies, and OAuth integrations. Instead of targeting organizations directly, attackers use these relationships to gain inherited access that can quietly spread across connected systems. What may appear as separate incidents such as phishing, ransomware, malware, or data breaches are often linked stages of a broader supply chain driven attack.
The session examines how stolen tokens, API keys, and service accounts allow threat actors to move laterally across trusted environments while appearing as legitimate users. It highlights how compromised access can extend across multiple organizations and why understanding these connections is critical to identifying and containing supply chain attacks.
1 week ago
AI powered real time event, threat, and risk intelligence is reshaping how organizations manage risk. This webinar examines how these capabilities are changing enterprise security strategies and why traditional reactive models are no longer enough. The session highlights the shift toward preemptive defense and the need to stay ahead of emerging threats.
Attendees will gain insight into reducing Mean Time to Detection and improving cross domain visibility across environments. The discussion offers a preview of evolving approaches to proactive risk management and what they could mean for enterprise security programs.
1 week ago
Recorded Future’s 2026 State of Security report highlights how geopolitical fragmentation, persistent cyber access, and AI driven change are reshaping the global threat landscape. This webinar focuses on what these shifts mean for Asia Pacific organizations, including shorter warning times, supply chain exposure, and increasing expectations for security teams to explain cyber risk in business terms.
Speakers discuss how CTI professionals can translate threat intelligence into organizational risk insights. Topics include reframing cyber threats as operational risk, identifying early warning signals, assessing supplier and digital dependencies, and communicating mitigation strategies in language that resonates with executives and board leaders.
1 week ago
Security teams often rely on limited context when deciding which vulnerabilities demand urgent action. This webinar examines CVE 2026 21858, known as "Ni8mare," a critical unauthenticated remote code execution flaw in the n8n AI workflow automation platform with a 10.0 CVSS score. Vulnerability Intelligence analyst Mehmet Berkay Yüksel explains why, despite exploit sales and reported activity, the current assessment places it at medium risk of exploitation.
The session explores how underground intelligence, OSINT, and technical analysis help determine when a CVE shifts from theoretical concern to active threat. Attendees will gain practical methods for integrating criminal forum and marketplace monitoring into vulnerability management and prioritizing mitigation based on real threat actor activity rather than scores alone.
1 week ago
See how security and intelligence teams use CYJAX to unify threat intelligence, reduce noise, and turn fragmented data into clear, actionable decisions. This live product demo shows the CYJAX platform in action, focusing on how it brings context to threat intelligence so teams can understand what is happening, why it matters, and what to do next.
The session is fully hands on, with no slides or theory, and walks through real workflows used by security teams across government, critical infrastructure, and large enterprises. Attendees will see how CYJAX helps cut through tool sprawl, streamline analysis, and support faster, more confident decision making. A recording will be available for those who cannot attend live.
1 week ago
Escalating geopolitical tensions between Iran, the United States, Israel, and regional actors are increasingly reflected in cyber activity. This briefing from KELA’s Cyber Intelligence Center examines how ongoing kinetic operations are driving disruptive cyber campaigns targeting government organizations and companies with regional operations.
The session reviews developments since February 28 and analyzes patterns of activity across the operational layer, separating high-volume disruptions such as DDoS from more strategic, high-impact attacks. It also explores emerging risks including account takeovers affecting social and broadcast administration channels. Attendees will gain practical defensive priorities to strengthen availability, secure trusted communication channels, and improve cloud resilience in response to evolving cyber threats.
2 weeks ago
Security operations are entering a new phase as agentic AI begins to influence how teams detect and respond to threats. In this webinar, Anomali’s CEO Ahmed Rubaie, Chief Commercial Officer Chris Vincent, and Advisor Christian Karam share their perspectives in a fireside chat on how this technology is expected to reshape security operations.
The session explores how agentic AI is being applied in practice, what is grounded in reality versus hype, and what developments may come next. Attendees will gain insight into what these changes could mean for security teams in 2026 and how operations may continue to evolve.