SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

As businesses grow more intertwined, threats tend to focus on vulnerable points, suchas external partners and supply networks. Whether it's tampered software patches or illicit intrusion into vendors' systems, malevolent actors manipulate trust and interconnections to achieve widespread access.
In October, an innocuous-looking exchange on a well-known underground forum caught the attention of only a handful of seasoned threat watchers.
Within weeks, that conversation evolved into something far more dangerous—a fully operational ransomware group calling itself HELLCAT.
Large Language Models (LLMs) are rapidly being embedded into enterprise workflows. By 2025, 67% of organizations worldwide have adopted LLMs to support their operations, yet few defenders recognize them as a potential attack surface.
How do Advanced Persistent Teenagers (APTEENS) pose a risk to enterprises and the defenders who protect them? This session explores how APTEENS have become a dominant threat in 2025, with groups like Scattered Spider turning intrusions into multi-domain crises that demand coordination across Incident Response, Legal, Executive, Communications, and Threat Intelligence teams.
For months, Check Point Research has tracked Nimbus Manticore, a threat group whose tactics and targets align with Iran’s IRGC, also known as UNC1549 or Smoke Sandstorm. Its focus – Strategic. Its hallmark – Human first deception. Targets receive convincing job offers via personalised HR emails, each containing a unique link to a fake career portal. Every credential is custom issued, allowing attackers to track victims individually.
Evasion techniques are among the most damaging tactics malware can employ, yet recent advances in both attacks and defenses have not been widely covered.
While some samples rely on popular and easy to defeat tricks copy-pasted from open-source GitHub projects, others reveal the hand of highly skilled developers who demonstrate deep insights of operating system internals and nearly push the techniques into an art form.
In 2025, the cyber community learned that Mikko Hyppönen, a veteran of the anti-virus era, was leaving the industry to join a counter-drone start-up. At first, this shift seems dramatic: drones involve a physical and military dimension absent from cyberspace. Yet, the parallels are striking:
The war in Ukraine has become a proving ground for cyber warfare, proxy attacks, and international digital defense collaboration. This session examines the lessons learned about coalition-based cyber defense, scalable policy responses, and how global partnerships can rapidly adapt to evolving threats in a high-stakes conflict zone.
Since early 2023, a Chinese APT group tracked as CL-STA-0049 has been running an intricate campaign against government, defense, telecom, education, and aviation targets across Southeast Asia and South America.
This operation showcases exceptional tradecraft: Multi-stage attacks, stealthy evasion, and a backdoor unlike any we’ve seen before.
At its core lies “Squidoor”, a cross-platform backdoor with 10 distinct C2 channels—including rare techniques like abusing Outlook for command-and-control.
Russia-based threat actors remain a top concern for organizations across North America and Europe. In this session, PwC will share 2025 case studies on groups such as Blue Python (Turla), Blue Echidna (Sandworm), and Blue Dev 17 (Void Blizzard), exploring their tactics, tools, and infrastructure.
Proofpoint Threat Research has uncovered a striking trend: State-sponsored actors increasingly adopting the tools and tactics of cybercriminals. Tactics once used by criminals for profit are now showing up in espionage attacks. Across both emerging and established threat groups, we are seeing criminal techniques such as social engineering tricks, abuse of cloud services, and rapid vulnerability exploitation, all repurposed for intelligence gathering.
That promising Senior Software Engineer applicant with a Minion avatar on GitHub? They might just be a North Korean IT Worker.
Active since at least 2018, these operatives—Tracked as PurpleDelta—have targeted organizations across every sector, from government and finance to aerospace, e-commerce, and crypto.
Cyber conflict no longer stops at the battlefield. Civilians are increasingly caught in the crossfire. This keynote explores the humanitarian consequences of cyberattacks, from hospital outages to critical service disruption, and highlights the role of international cooperation and ethics in reducing harm to society.