Episode 32 — Run link analysis that reveals hidden clusters

Link analysis is a powerful visualization technique used to uncover the "connective tissue" between seemingly unrelated technical artifacts and adversary campaigns. This episode teaches you how to build "relational graphs" that link entities such as email addresses, file hashes, and infrastructure nodes to reveal hidden clusters of activity. We explore the use of graph theory to identify "central" nodes in an adversary's network, which often represent critical points of failure that can be targeted for disruption. In a certification scenario, you might be tasked with using a link analysis tool to prove that three separate phishing attacks are actually part of the same coordinated mission by a single threat actor. Best practices involve maintaining "data hygiene" within your graphs to prevent accidental "over-linking" that can lead to false clusters. By mastering link analysis, you can provide stakeholders with a clear, visual representation of the threat landscape and the complex relationships that define modern cyber intrusions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 32 — Run link analysis that reveals hidden clusters
Broadcast by