Tracking Transparency: Accurate labels in crypto tracing

One of the principles in cryptocurrency tracing is putting a name to an address — a process called attribution. Attribution is key for both law enforcement and compliance professionals who trace cryptocurrencies. Blockchain intelligence companies sell attribution as a product by leveraging pseudonymous blockchains, clustering heuristics and labeling of addresses. We measure the accuracy of […]

Cyberwarfare in the age of Digital & New Space Economy

In this session, we explore the convergence of cyber threats with the rapidly expanding realms of the digital economy and the new space economy. From safeguarding critical infrastructure in the digital age to securing satellite systems in space, this session will delve into the evolving landscape of cyberwarfare and offer actionable insights for defending against […]

The Trinity of Victim Notification

Increasingly, (inter)national media report about major data breaches in which millions of credentials are stolen. There is a thriving underground global online economy in credentials. Stolen credentials are effective because people often use the same password for multiple accounts – for a long period of time. Criminals abuse those credentials and use them for a […]

Using AI LLM for in-depth dataset analysis

In February 2024, a significant data leak occurred involving a Chinese company known as I-Soon or Anxun. The data consisted of 577 files, mostly in simplified Chinese, and included images, documents, tables, presentation slides, and conversations between individuals. The language barrier led some Cyber Threat Intelligence (CTI) teams to step back from analyzing the data. […]

Navigating AI Security Risks in Law Enforcement

Integrating AI into law enforcement promises transformative potential but introduces new security challenges. This session will explore the multifaceted landscape of cybersecurity risks, strategies and best practices with the aim of equipping stakeholders with essential insights on how to best navigate the challenges and opportunities presented by AI in law enforcement. Relying on AI for […]

Detecting Zero-Day Exploitation of Edge Devices

In December 2023 and April 2024, Volexity detected zero-day vulnerabilities being exploited in the wild against different edge devices, namely the Ivanti Connect Secure (CVE-2023-46805, CVE-2024-21887 ) and Palo Alto GlobalProtect (CVE-2024-3400) firewalls. Through its Network Security Monitoring (NSM) service, Volexitydetected lateral movement of the attackers in customer networks, and through high-paced investigations, identified the root cause of each intrusion.  This talk will cover the following: The talk will conclude […]