SlideShare a Scribd company logo
-Team CRCIDF
Trends Tactics & Investigation Perspective
DISCLAIMER
The views / opinions / assumptions expressed for educational & research purposes only. Do not attempt to
violate the law with anything contained here. Neither the author of this material, nor anyone else affiliated in
any way, is liable for your actions.
The purpose of this presentation is to share what is cyber happening trends and what is possible...
CoT : CYBER OF THINGS
We live in the digital age
Criminals do too
What are the top cyber crime threats ?
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
CYBER INCIDENTS
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
C Factor and all are
interrelated
CYBER
CRIME
CYBER
SECURITY
CYBER
TERRORISM
CYBER RISK RANKING BY SECTOR
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
GOVERNMENT
MANUFACTURING
BANKING
FINANCIAL SERVICES & MOBILE MONEY RETAIL
STRATEGIC & PUBLIC ENTERPRISES. PROFESSIONAL SERVICES
HOSPITALITY
INSURANCE
TELECOMMUNICATIONS
*As per African (Kenya) Region
Top 5 cyber crime incidents from India
perimeter (Updated Oct 2020)
Flashback Pointers
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
Payment Fraud, Phishing, Vishing, Smishing, Wallet related, Card-not-present (CNP) fraud , UPI, QR-Code, PayTM,
OLX, Cashback related etc. 50 Percent
(1-3) Financial Frauds
Cyber Bullying, Online Harassment, Fake profile account, Online Scams, CP, CSAM, Money asking case, Revenge
porn, Fake news, dating app through fake account black mail, provocative speech, Religion base etc. 25 percent
(4) Online social media related
Job frauds, Matrimonial, MLM, Cheating, Malware hacking related etc. 25 Percent
(5) Other Cyber Crimes
TRENDS & TACTICS
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
Top State/UTs with the reported incidents
Delhi, Maharashtra, Gujarat, Uttar Pradesh, Karnataka…
i. Social Engineering: Hub Jamtara, Mewat, Mahipalpur, 50% of the cybercrimes in India are traced back to this sleepy town
ii. Trending Theme: Couple Challenge, don’t know the Cons, Deep Fake, Extortion, Blackmailing case
iii. Spywares: No OTP required of phone is hijacked
iv. Anonymity: Criminals (Still) Love Cryptocurrency
v. Banking Trojan Ursnif, Zeus, Emotet, Dridex etc.
vi. Bulletproof hosting (BPH) BPH refers to a type of hosting or hosting provider that earns its money by consciously accepting perpetrators of crime as part
of its clientele, offering them technical infrastructure resilient to law enforcement disruption or takedown
vii. Modular Malware Ransomware
viii. ...
RANSOMWARE Now Crypto
Hackers Mindset : Too much risk......but the target is too sweet
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
REQUIRED ACTION
 Govt. already having funds, schemes, various dedicated divisions/unit/portal to tackle such crimes/issues
 Capacity building: Detailed training as Ramayana can't be finished in 1 hour
 Digital literacy: Cyber Awareness such as netiquette, Modus Operand based
 PPT factor with proper effective coordination
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
CYBER SECURITY PREPAREDNESS
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
LEGALMEASURES
• Measures the
legal
framework of a
country that
streamlines
basic response
mechanisms to
breaching of
cyber law
TECHNICAL
• Measures the
adequacy of
technical
measures and
the strength of
capabilities
based on the
number of
existing
technical
institutions
and
frameworks
dealing with
cybersecurity
ORGANISATIONAL
• Measures the
organisational
strategy of a
countries
cybersecurity
imitative. This
is based on
the number of
institutions
and strategies
organizing
cybersecurity
development
at national
level
CAPACITYBUILDING
• Measures the
awareness
campaign and
the availability
of resources
for each
country. (
Includes the
existence of
research and
development
education and
training
programs and
certified
professionals
and public
sector
agencies.
COOPERATION
• Measures the
active
engagement
of different
sectors and
stakeholders in
preventing
threats and
combating
cyber-attacks.
Don't believe marketing hype regarding Cyber Crime Safety
"oh, we spent $$$ in $Vendor product, so we are safe"
Any "tool", regardless of the price, is still a "tool“
Effective Awareness appreciable
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
Take a Break
Ad
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
Another Buzz
OSINT ≠ Actionable Intelligence
What exactly : OSINF Open Source Information
Sentiments, Statistics, Trends
So what's required
Proactive Threat Hunting required : Data and Patience
Understand the Threat and Actor and what to hunt
Defacement Days gone… APT , Malware, Ransomware, Honeypots, Bots, Watering Hole etc.
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
Where We Stand
💳 38 % Crypto Miner's
👾 29 % Botnet
📲 27 % Mobile
🏧 18 % Banking
🧾 18 % Info stealer
🧾 7 % Ransomware
Src 👉 Check Point Cyber Security Report 2020
Ad
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
Ad
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
Aim
Strategic: Broader trends typically meant for a non technical audience
Tactical: Outlines of tactics, techniques, and procedures (TTP) of threat actors for a more technical audience
Operational: Technical details about specific attacks and campaigns
i. Hypothesis Driven: Data Leak/Breach, IOC, TTPS
ii. Analytics and Machine Learning : Data set, Signatures, Anomalies, Historical repo, UEBA, SOAR etc.
iii. Manual Interventions: Customised sensors, crawlers, parsers
iv. Human Intelligence always Win : Expertise, SME, Coordination agencies etc.
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
Strategy
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
SOCMINT
• Disseminate to Concern
• Need to add
Output
COTS
Twitter
iMessengers
Maltego
Etc.
Processing
There are three main steps
in analysing social media:
• Data identification,
• Data analysis, and
• Information
interpretation.
Gather actionable
insights in raw form
concerning to Subject, etc.
Input
i. OSINT Tools and Framework : Domain Based, Searching, Clustering, Grouping etc.
ii. OSINT Services websites: osint, start.me, midasearch, toddington, osintgeek, intel
technique etc.
iii. Commercial vendors: Feeds, Alerts
iv. Government off-the-shelf Tools : In-House, Integrated APIs and Data Lake
v. Common Sense
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
Tools
Cyber of things 2.0
Sit back and enjoy the show...
or
Let’s Start Crime free
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE
References
• Cyber Threat Intelligence Command Centre - SC3
• Github
• SANS
Mail: D3pak@protonmail.com
For more: https://d3pakblog.wordpress.com
CoT : CYBER OF THINGS
D3PAK KUMAR
DIGITAL FORENSICS | CYBER INTELLIGENCE

More Related Content

PDF
Cyber Threat Intel : Overview
PDF
Cyber Forensics & Challenges
PDF
Cyber Forensics
PDF
Threat Intelligence
PDF
2015 Global Threat Intelligence Report Executive Summary | NTT i3
PDF
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
PDF
Global Cyber Threat Intelligence
PPTX
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
Cyber Threat Intel : Overview
Cyber Forensics & Challenges
Cyber Forensics
Threat Intelligence
2015 Global Threat Intelligence Report Executive Summary | NTT i3
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Global Cyber Threat Intelligence
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...

What's hot (20)

PDF
The role of big data, artificial intelligence and machine learning in cyber i...
PDF
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
PDF
AI for CyberSecurity
PDF
Cyber Security and the National Central Banks
PDF
Incident Response Requires Superhumans
PPTX
Models of Escalation and De-escalation in Cyber Conflict
PPTX
Cyber Threat Intelligence
PDF
Bug Bounty Programs : Good for Government
PPTX
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
PDF
Outlook Briefing 2016: Cyber Security
PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
PPSX
Cyber Security Awareness Month 2017-Wrap-Up
PPTX
2015: The year-ahead-in-cyber-security
PDF
Cyber Security - awareness, vulnerabilities and solutions
PDF
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
PDF
Guardians of the future what should we do to secure future cyberspace
PDF
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
PDF
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
The role of big data, artificial intelligence and machine learning in cyber i...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
AI for CyberSecurity
Cyber Security and the National Central Banks
Incident Response Requires Superhumans
Models of Escalation and De-escalation in Cyber Conflict
Cyber Threat Intelligence
Bug Bounty Programs : Good for Government
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Mark Arena - Cyber Threat Intelligence #uisgcon9
Outlook Briefing 2016: Cyber Security
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Security Awareness Month 2017-Wrap-Up
2015: The year-ahead-in-cyber-security
Cyber Security - awareness, vulnerabilities and solutions
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Guardians of the future what should we do to secure future cyberspace
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
Ad

Similar to Cyber of things 2.0 (20)

PDF
Cybercrime: Radically Rethinking the Global Threat
PPTX
Achieving Caribbean Cybersecuirty
DOCX
Tarun Gaur On Hacking the Hackers Can We Turn the Tide on Cyber Crime
PPTX
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
PDF
Most Influential Cybersecurity Leader to Follow in 2024.pdf
PPTX
SIEM Fundamentals-Session 1 presentations
PDF
Commercial Real Estate - Cyber Risk 2020
PPTX
Emerging Threats to Digital Payments - Is Your Business Ready
DOCX
A report on cyber Crime
PDF
The 10 Fastest Growing Cyber Security Companies of 2017
PDF
The digital economy and cybersecurity
DOCX
Cybercrime Surveillance.docx
PDF
Dell Technologies Cyber Security playbook
PPT
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
PDF
Why is cyber security a disruption in the digital economy
PDF
Practical approach to combating cyber crimes
PDF
Cyber Security Planning 101
PPTX
Cyber Security – Challenges [Autosaved].pptx
Cybercrime: Radically Rethinking the Global Threat
Achieving Caribbean Cybersecuirty
Tarun Gaur On Hacking the Hackers Can We Turn the Tide on Cyber Crime
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Most Influential Cybersecurity Leader to Follow in 2024.pdf
SIEM Fundamentals-Session 1 presentations
Commercial Real Estate - Cyber Risk 2020
Emerging Threats to Digital Payments - Is Your Business Ready
A report on cyber Crime
The 10 Fastest Growing Cyber Security Companies of 2017
The digital economy and cybersecurity
Cybercrime Surveillance.docx
Dell Technologies Cyber Security playbook
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
Why is cyber security a disruption in the digital economy
Practical approach to combating cyber crimes
Cyber Security Planning 101
Cyber Security – Challenges [Autosaved].pptx
Ad

More from Deepak Kumar (D3) (20)

PDF
Dark Web Forensics
PDF
Cyber Security Tips
PDF
CISSP INFORGRAPH MINDMAP
PDF
Cyber Crime Types & Tips
PDF
Cyber Security India & Cyber Crime
PDF
21st Century Cyber Forensics
PDF
PPTX
PDF
PDF
Ransomware
PDF
Success Mantra
PDF
Facebook Security Tips
PDF
Registry Registrar Registrant
PDF
PDF
How to social/official network
PDF
PDF
Phishing Scam
Dark Web Forensics
Cyber Security Tips
CISSP INFORGRAPH MINDMAP
Cyber Crime Types & Tips
Cyber Security India & Cyber Crime
21st Century Cyber Forensics
Ransomware
Success Mantra
Facebook Security Tips
Registry Registrar Registrant
How to social/official network
Phishing Scam

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Institutional Correction lecture only . . .
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
01-Introduction-to-Information-Management.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Basic Mud Logging Guide for educational purpose
PDF
Business Ethics Teaching Materials for college
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Final Presentation General Medicine 03-08-2024.pptx
Complications of Minimal Access Surgery at WLH
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Institutional Correction lecture only . . .
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Module 4: Burden of Disease Tutorial Slides S2 2025
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
01-Introduction-to-Information-Management.pdf
VCE English Exam - Section C Student Revision Booklet
Basic Mud Logging Guide for educational purpose
Business Ethics Teaching Materials for college
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Week 4 Term 3 Study Techniques revisited.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pharma ospi slides which help in ospi learning
Final Presentation General Medicine 03-08-2024.pptx

Cyber of things 2.0

  • 1. -Team CRCIDF Trends Tactics & Investigation Perspective
  • 2. DISCLAIMER The views / opinions / assumptions expressed for educational & research purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this material, nor anyone else affiliated in any way, is liable for your actions. The purpose of this presentation is to share what is cyber happening trends and what is possible... CoT : CYBER OF THINGS
  • 3. We live in the digital age Criminals do too What are the top cyber crime threats ? CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 4. CYBER INCIDENTS CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE C Factor and all are interrelated CYBER CRIME CYBER SECURITY CYBER TERRORISM
  • 5. CYBER RISK RANKING BY SECTOR CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE GOVERNMENT MANUFACTURING BANKING FINANCIAL SERVICES & MOBILE MONEY RETAIL STRATEGIC & PUBLIC ENTERPRISES. PROFESSIONAL SERVICES HOSPITALITY INSURANCE TELECOMMUNICATIONS *As per African (Kenya) Region
  • 6. Top 5 cyber crime incidents from India perimeter (Updated Oct 2020) Flashback Pointers CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE Payment Fraud, Phishing, Vishing, Smishing, Wallet related, Card-not-present (CNP) fraud , UPI, QR-Code, PayTM, OLX, Cashback related etc. 50 Percent (1-3) Financial Frauds Cyber Bullying, Online Harassment, Fake profile account, Online Scams, CP, CSAM, Money asking case, Revenge porn, Fake news, dating app through fake account black mail, provocative speech, Religion base etc. 25 percent (4) Online social media related Job frauds, Matrimonial, MLM, Cheating, Malware hacking related etc. 25 Percent (5) Other Cyber Crimes
  • 7. TRENDS & TACTICS CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE Top State/UTs with the reported incidents Delhi, Maharashtra, Gujarat, Uttar Pradesh, Karnataka… i. Social Engineering: Hub Jamtara, Mewat, Mahipalpur, 50% of the cybercrimes in India are traced back to this sleepy town ii. Trending Theme: Couple Challenge, don’t know the Cons, Deep Fake, Extortion, Blackmailing case iii. Spywares: No OTP required of phone is hijacked iv. Anonymity: Criminals (Still) Love Cryptocurrency v. Banking Trojan Ursnif, Zeus, Emotet, Dridex etc. vi. Bulletproof hosting (BPH) BPH refers to a type of hosting or hosting provider that earns its money by consciously accepting perpetrators of crime as part of its clientele, offering them technical infrastructure resilient to law enforcement disruption or takedown vii. Modular Malware Ransomware viii. ...
  • 8. RANSOMWARE Now Crypto Hackers Mindset : Too much risk......but the target is too sweet CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 9. REQUIRED ACTION  Govt. already having funds, schemes, various dedicated divisions/unit/portal to tackle such crimes/issues  Capacity building: Detailed training as Ramayana can't be finished in 1 hour  Digital literacy: Cyber Awareness such as netiquette, Modus Operand based  PPT factor with proper effective coordination CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 10. CYBER SECURITY PREPAREDNESS CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE LEGALMEASURES • Measures the legal framework of a country that streamlines basic response mechanisms to breaching of cyber law TECHNICAL • Measures the adequacy of technical measures and the strength of capabilities based on the number of existing technical institutions and frameworks dealing with cybersecurity ORGANISATIONAL • Measures the organisational strategy of a countries cybersecurity imitative. This is based on the number of institutions and strategies organizing cybersecurity development at national level CAPACITYBUILDING • Measures the awareness campaign and the availability of resources for each country. ( Includes the existence of research and development education and training programs and certified professionals and public sector agencies. COOPERATION • Measures the active engagement of different sectors and stakeholders in preventing threats and combating cyber-attacks.
  • 11. Don't believe marketing hype regarding Cyber Crime Safety "oh, we spent $$$ in $Vendor product, so we are safe" Any "tool", regardless of the price, is still a "tool“ Effective Awareness appreciable CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE Take a Break
  • 12. Ad CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE Another Buzz
  • 13. OSINT ≠ Actionable Intelligence What exactly : OSINF Open Source Information Sentiments, Statistics, Trends So what's required Proactive Threat Hunting required : Data and Patience Understand the Threat and Actor and what to hunt Defacement Days gone… APT , Malware, Ransomware, Honeypots, Bots, Watering Hole etc. CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE Where We Stand 💳 38 % Crypto Miner's 👾 29 % Botnet 📲 27 % Mobile 🏧 18 % Banking 🧾 18 % Info stealer 🧾 7 % Ransomware Src 👉 Check Point Cyber Security Report 2020
  • 14. Ad CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 15. Ad CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE Aim
  • 16. Strategic: Broader trends typically meant for a non technical audience Tactical: Outlines of tactics, techniques, and procedures (TTP) of threat actors for a more technical audience Operational: Technical details about specific attacks and campaigns i. Hypothesis Driven: Data Leak/Breach, IOC, TTPS ii. Analytics and Machine Learning : Data set, Signatures, Anomalies, Historical repo, UEBA, SOAR etc. iii. Manual Interventions: Customised sensors, crawlers, parsers iv. Human Intelligence always Win : Expertise, SME, Coordination agencies etc. CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE Strategy
  • 17. CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE SOCMINT • Disseminate to Concern • Need to add Output COTS Twitter iMessengers Maltego Etc. Processing There are three main steps in analysing social media: • Data identification, • Data analysis, and • Information interpretation. Gather actionable insights in raw form concerning to Subject, etc. Input
  • 18. i. OSINT Tools and Framework : Domain Based, Searching, Clustering, Grouping etc. ii. OSINT Services websites: osint, start.me, midasearch, toddington, osintgeek, intel technique etc. iii. Commercial vendors: Feeds, Alerts iv. Government off-the-shelf Tools : In-House, Integrated APIs and Data Lake v. Common Sense CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE Tools
  • 20. Sit back and enjoy the show... or Let’s Start Crime free CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 21. References • Cyber Threat Intelligence Command Centre - SC3 • Github • SANS Mail: D3pak@protonmail.com For more: https://d3pakblog.wordpress.com CoT : CYBER OF THINGS D3PAK KUMAR DIGITAL FORENSICS | CYBER INTELLIGENCE