#StayTuned #ComingSoon #PIVOTcon #PIVOTcon26
https://pivotcon.org
1. Go to our website pivotcon.org
2. Click #AskForInvite button (3/6)
1. Go to our website pivotcon.org
2. Click #AskForInvite button (3/6)
The next #PIVOTcon will be on 6-8 May 2026, in Malaga, ES!!!
You favorite ;) #ThreatResearch conference is coming back and we are planning to bring you the usual experience and content of utmost quality. Follow us + #StayTuned for more info
#CTI #ThreatIntel #PIVOTcon26
The next #PIVOTcon will be on 6-8 May 2026, in Malaga, ES!!!
You favorite ;) #ThreatResearch conference is coming back and we are planning to bring you the usual experience and content of utmost quality. Follow us + #StayTuned for more info
#CTI #ThreatIntel #PIVOTcon26
The Best Threat Research Awards, in the form of reMarkable Pro notebooks for our remarkable presenters, were sponsored by @abuse-ch.bsky.social @spamhaustech.bsky.social
#CTI #ThreatIntel 1/3
The Best Threat Research Awards, in the form of reMarkable Pro notebooks for our remarkable presenters, were sponsored by @abuse-ch.bsky.social @spamhaustech.bsky.social
#CTI #ThreatIntel 1/3
Day 1 is packed with fantastic talks. Networking in full swing 🤟🏐🎾
Pivot! Pivot! Pivot!
#CTI #ThreatIntel #ThreatResearch
Day 1 is packed with fantastic talks. Networking in full swing 🤟🏐🎾
Pivot! Pivot! Pivot!
#CTI #ThreatIntel #ThreatResearch
✅ real-world data
✅ cross-reference public reporting with own internal intelligence
✅ identification and grouping
✅ linking and attributing malicious activity
4/5
✅ real-world data
✅ cross-reference public reporting with own internal intelligence
✅ identification and grouping
✅ linking and attributing malicious activity
4/5
✅retrieve local text data
✅LLM reasoning system with the tools for searches and analyses.
✅ AI agents
3/5
✅retrieve local text data
✅LLM reasoning system with the tools for searches and analyses.
✅ AI agents
3/5
✅detect malware clients, their c2 servers
✅ estimate the location of the true client behind the proxy or VPN
✅ use JA4+ active server fingerprinting and how it can see beyond NAT
2/5
✅detect malware clients, their c2 servers
✅ estimate the location of the true client behind the proxy or VPN
✅ use JA4+ active server fingerprinting and how it can see beyond NAT
2/5
Read more about them: harfanglab.io
HarfangLab is a cybersecurity company that has developed a suite of solutions to prevent, detect, and block cyberattacks.
Our sponsors: pivotcon.org/sponsors
#CTI #ThreatIntel #ThreatResearch
Read more about them: harfanglab.io
HarfangLab is a cybersecurity company that has developed a suite of solutions to prevent, detect, and block cyberattacks.
Our sponsors: pivotcon.org/sponsors
#CTI #ThreatIntel #ThreatResearch
#PIVOTcon25 #CTI #ThreatIntel
#PIVOTcon25 #CTI #ThreatIntel
#PIVOTcon25 #CTI #ThreatIntel
#PIVOTcon25 #CTI #ThreatIntel
#PIVOTcon25 #CTI #ThreatIntel
#PIVOTcon25 #CTI #ThreatIntel
#CTI #ThreatIntel
(1/4)
#CTI #ThreatIntel
(1/4)
for being #PIVOTcon25 Gold Sponsor
Read more about Censys: censys.com
They provide organizations across the world with the most comprehensive real-time view of Internet infrastructure.
Our sponsors: pivotcon.org/sponsors
#ThreatIntel #CTI
for being #PIVOTcon25 Gold Sponsor
Read more about Censys: censys.com
They provide organizations across the world with the most comprehensive real-time view of Internet infrastructure.
Our sponsors: pivotcon.org/sponsors
#ThreatIntel #CTI
Read more about Threatray: threatray.com
Threatray provides malware detection and intelligence products
Our sponsors: pivotcon.org/sponsors
#ThreatIntel #CTI #ThreatResearch
Read more about Threatray: threatray.com
Threatray provides malware detection and intelligence products
Our sponsors: pivotcon.org/sponsors
#ThreatIntel #CTI #ThreatResearch
for being #PIVOTcon25 Gold Sponsor
Read more about Cisco Talos: talosintelligence.com
Talos powers the Cisco portfolio with comprehensive intelligence.
Our sponsors: pivotcon.org/sponsors
#ThreatIntel #CTI #ThreatResearch
for being #PIVOTcon25 Gold Sponsor
Read more about Cisco Talos: talosintelligence.com
Talos powers the Cisco portfolio with comprehensive intelligence.
Our sponsors: pivotcon.org/sponsors
#ThreatIntel #CTI #ThreatResearch
18/18
18/18
Mark Kelly, Staff Threat Researcher, ProofPoint (@markkelly0x , @mkyo.bsky.social )
17/18
Mark Kelly, Staff Threat Researcher, ProofPoint (@markkelly0x , @mkyo.bsky.social )
17/18
Tom Hegel, Principal Threat Researcher, SentinelLabs (@TomHegel , @hegel.bsky.social )
Sreekar Madabushi, Founding Engineer, Validin
Kenneth Kinion, Founder, Validin ( @kennethkinion.bsky.social )
16/18
Tom Hegel, Principal Threat Researcher, SentinelLabs (@TomHegel , @hegel.bsky.social )
Sreekar Madabushi, Founding Engineer, Validin
Kenneth Kinion, Founder, Validin ( @kennethkinion.bsky.social )
16/18
Bartosz Roszewski, Senior Threat Intelligence Analyst, Magic Money LLC
15/18
Bartosz Roszewski, Senior Threat Intelligence Analyst, Magic Money LLC
15/18
Kristina Balaam, Senior Staff Threat Intelligence Researcher, Lookout ( @kristinabalaam.bsky.social, @chmodxx_ )
14/18
Kristina Balaam, Senior Staff Threat Intelligence Researcher, Lookout ( @kristinabalaam.bsky.social, @chmodxx_ )
14/18
Joe Hannon, Principal Security Researcher, Microsoft (MSTIC)
Adrien Bataille, Senior Threat Intelligence Analyst, Microsoft (MSTIC)
12/18
Joe Hannon, Principal Security Researcher, Microsoft (MSTIC)
Adrien Bataille, Senior Threat Intelligence Analyst, Microsoft (MSTIC)
12/18
Zach Riddle, Principal Threat Intelligence Analyst, Google Threat Intelligence Group
11/18
Zach Riddle, Principal Threat Intelligence Analyst, Google Threat Intelligence Group
11/18
Redacted
10/18
Redacted
10/18
Silas Cutler, Principal Security Researcher, Censys (@silascutler , @ silascutler.bsky.social)
9/18
Silas Cutler, Principal Security Researcher, Censys (@silascutler , @ silascutler.bsky.social)
9/18