webinar register page

Webinar banner
Make Your Own Code Connections Cluster Inspired By Intezer’s Russian APT Map
Russian state-sponsored actors have meddled in elections, blacked out power grids, hacked the Olympics, and unleashed NotPetya, one of the most destructive worms in history. While notorious groups such as Turla, Sofacy, and APT29 have been well-documented, greater patterns have emerged when viewed as part of a larger threat ecosystem.

Intezer’s open-source interactive map: apt-ecosystem.com/russia/map/ reveals over 22,000 code connections between Russian hacker groups and their tools, from specific functions to entire modules.

This workshop will show how you can create your own code connections cluster for the threats that affect you. Mapping code connections between threats can accelerate the investigation of a large number of files, and support attribution and other threat intel/research projects.

Intezer’s Ari Eitan and CEO Itai Tevet, former Directors of the Israel Defense Force CERT, will explain how you can complement your existing malware investigation pipelines with Intezer’s API.

Learn more about the Genetic Software Mapping approach behind the project.

Nov 10, 2020 10:00 AM in Eastern Time (US and Canada)

Webinar logo
Webinar is over, you cannot register now. If you have any questions, please contact Webinar host: Elinor Gil.