Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
AI Engineer - Learn how to integrate AI into software applications
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about Red Canary's systematic approach to naming and tracking cybersecurity threats in this 32-minute Office Hours episode featuring Alex Berninger, Senior Manager of Intelligence. Discover the complex challenges organizations face when multiple security companies create different names for the same threat actors due to seeing different pieces of activity. Explore Red Canary's methodology for threat clustering, starting with temporary 'egg' designations for new activity that evolve into color-bird naming conventions. Understand the strategic balance between creating new threat names versus adopting existing industry nomenclature, and how effective stakeholder communication influences these decisions. Examine how attribution priorities vary across organizations and why Red Canary emphasizes actionable intelligence focused on 'how' threats operate and 'what next' steps to take rather than deep attribution analysis. The session also includes cybersecurity news updates covering the new OWASP Top Ten draft and the resurgence of Qbot loader campaigns, providing current context for threat landscape developments.
Syllabus
00:00 - 00:41: Intro
00:42 - 02:27: Welcome to Red Canary Office Hours
0:2:28 - 04:50: In the news: New OWASP Top 10
04:51 - 07:12: In the news: Gootloader is back
07:13 - 31:39: How Red Canary names and tracks threats
Taught by
Red Canary