π₯ Last but not least: As always, we will have redacted talks on the agenda, but, given the sensitivity of the topics, we are keeping the speakers and/or the details of the talks redacted.π₯
15/15
π₯ Last but not least: As always, we will have redacted talks on the agenda, but, given the sensitivity of the topics, we are keeping the speakers and/or the details of the talks redacted.π₯
15/15
"Paint Me Like One of Your Elephants: Do Sidewinder and Bitter Have a New Sibling?"
Nick Attfield, Senior Threat Researcher at Proofpoint
Konstantin Klinger, Senior Security Research Engineer at Proofpoint
14/15
"The Rise of China's Cloud Access Brokers: Cyber Espionage From GENESIS PANDA to WARP PANDA"
Michael August Raggi, Principal Threat Response Specialist at Crowdstrike
13/15
"Know Thy Network, Because They Already Do: A Case Study of SLIME27's Campaign against Telecoms"
Silvia Yeh, Cyber Threat Intelligence Analyst at TeamT5
Rax Chuang, Cyber Threat Researcher at TeamT5
12/15
"The Infinite Game: The World Burns - How Do We Survive?"
Leon Chang, Senior Threat Researcher at TrendAI
11/15
"APAC Escrow Services: Building Trust in Untrusted Spaces"
Bea Venzon , Senior Security Researcher at CrowdStrike
Mao Sui, Security Researcher at CrowdStrike
10/15
"From Research to the Courtroom: Inside Google's Disruption of the Lighthouse and Darcula PhaaS Empires"
Roberto Martinez, Senior Analyst at Mandiant (part of Google Cloud)
9/15
"Pivoting to Find 'Invisible' Nation State C2s"
John Althouse, Founder and CTO at FoxIO
SΓ©bastien FΓ©ry, Head of Research and Development at FoxIO
8/15
"A 'Fishy' Conference in Autumn"
Julian-Ferdinand VΓΆgele @julianferdinand.bsky.social , Principal Threat Researcher at Recorded Future's Insikt Group
7/15
"Inside China Covert Infrastructure: Tracking Nation-State Obfuscation Networks on a Global Scale"
Michael Horka, Principal Information Security Engineer at Black Lotus Labs Lumen
6/15
"EDR Evasion Counterintelligence: Tracking Adversary Testing"
Colin Cowie , Threat Intelligence Lead at Sophos
5/15
"Paper Cuts: How an XLL Led Us to an Espionage Campaign Targeting Russia"
Nicole Fishbein, Security Researcher and Malware Analyst at Intezer
4/15
"Fresh Tracks: Hunting the New Class of Russian Espionage Clusters"
Greg Lesnewich, Staff Threat Researcher & Tech Lead for Counterespionage at Proofpoint
3/15
Link to #PIVOTcin26 agendaβ‘οΈ: pivotcon.org#agenda
2/15
π£ #PIVOTcon26 Agenda is here π€ We are thrilled to announce the lineup for this year's edition!
2β£ days and 19 talks from leading #ThreatResearch experts.
The agenda link is in the first commentπ, and the talks and speakers are in the thread.π§΅
#CTI #ThreatIntel
1/15
We are still finalising the agenda and the updated website, so the #PIVOTcon26 lineup announcement will be made early next week.
#CTI #ThreatIntel #ThreatResearch
#StayTuned
Thank you @epieos.com for being #PIVOTcon26 Silver Sponsorπ₯³
Read more here: epieos.com
Epieos empowers investigators with private OSINT solutions to investigate cybercriminal email addresses and phone numbers while uncovering exclusive intelligence.
Our sponsors: pivotcon.org/sponsors
#CTI
Thank you @wearetlpblack.bsky.social for being #PIVOTcon26 Bronze Sponsorπ₯³
Read more about them: tlpblack.net
If you never heard of TLPBLACK, hear from us - we know them in person. They do great work in threat intelligence, research tooling, and training.
pivotcon.org/sponsors/
#CTI #ThreatIntel
Thank you @ecrime.ch for being #PIVOTcon26 Silver Sponsorπ₯³
Read more about: @ecrime.ch here: ecrime.ch
They detect extortion threats, stolen data, and brand exposure before attackers escalate - with verified intelligence.
Our sponsors: pivotcon.org/sponsors
Thank you @sekoia.io for being #PIVOTcon26 Silver Sponsorπ₯³
Read more about: @sekoia.io here: sekoia.io
They protect organizations of all sizes with the leading SOC platform boosted by AI and cyber threat intelligence.
Our sponsors: pivotcon.org/sponsors
#CTI #ThreatIntel #ThreatResearch
We are proud to sponsor @pivotcon.bsky.social as a premier European conference for CTI professionals. It's our mission to empower defenders with the best possible knowledge and data. PIVOTcon is a fantastic place for networking, knowledge sharing, and collaboration.
See you in Malaga in May!
Thank you #Validin for being #PIVOTcon26 Gold Sponsorπ₯³
Read more about #Validin here: validin.com
Validin eliminates blind spots with comprehensive DNS history and IP context data.
Our sponsors: pivotcon.org/sponsors
#ThreatIntel #CTI #ThreatResearch
Thank you @censys.bsky.social for being #PIVOTcon26 Gold Sponsor π₯³
Read more about Censys: censys.com
They provide organizations across the world with the most comprehensive real-time view of Internet infrastructure.
Our sponsors: pivotcon.org/sponsors
#ThreatIntel #CTI #ThreatResearch
Thank you #Webscout for being #PIVOTcon26 Tech Sponsorπ₯³
Read more about Webscout here: webscout.io
Webscout delivers advanced network intelligence solutions to cybersecurity teams in gov, LE and critical infrastructure.
Our sponsors: pivotcon.org/sponsors
#CTI #ThreatIntel #ThreatResearch
Thank you #URLscan for being #PIVOTcon26 Gold Sponsor π₯³
Read more about URLscan: urlscan.io
URLscan is a sandbox for the web and a very useful threat research tool for pivoting.
Check out our sponsors: pivotcon.org/sponsors/
#ThreatIntel #ThreatResearch #CTI
Reminder that the #PIVOTcon2026 CFP closes this Friday, February 6. Get those papers in. We want to see you at @pivotcon.bsky.social in Malaga! π
Thank you @vertexproject.bsky.social for being #PIVOTcon26 Platinum Sponsor π
Read more about them at vertex.link
They deliver #Synapse, advanced intelligence and analysis technology that transforms complex data into actionable insight.
Check our sponsors at pivotcon.org/sponsors
Thank you @silentpush.bsky.social
for being #PIVOTcon26 Platinum Sponsor π
Read more: www.silentpush.com
Silent Push enables preemptive cyber defense that exposes threat actor infrastructure as itβs being set up using Indicators of Future Attackβ’ (IOFAβ’).
Our sponsors: pivotcon.org/sponsors