Intel471-Logo-white.png

Intelligence-Driven Threat Hunting Workshop: Vulnerability Post-Exploitation Behaviors

Two Sessions Available:

Wednesday, April 22, 2026 | 11:00 AM to 1:00 PM ET
Thursday, April 23, 2026 | 10:00 AM to 12:00 PM CEST

Join Intel 471 for a 2-hour intelligence-driven workshop focused on how vulnerabilities are actually leveraged by adversaries. This session moves beyond severity scores to examine how vulnerabilities are prioritized, discussed and exploited in real-world operations, and how that intelligence can be applied directly to threat hunting.

The workshop begins with Berkay Yüksel, Vulnerability Analyst III, who will provide insight into how vulnerabilities gain traction in underground communities, what drives exploitation interest and how to assess which exposures are more likely to be targeted. Attendees will gain a clearer understanding of how vulnerabilities move from disclosure to active use.

Lee Archinal, Principal Threat Hunt Account Manager, will then guide participants through the hunt. In this hands-on portion, attendees will build hypotheses around vulnerable systems, investigate activity tied to exploitation attempts and analyze behaviors associated with initial access and follow-on activity.

This is an interactive session where participants will work through live scenarios using real-world intelligence and community hunt packages, applying vulnerability context to uncover and validate activity.

What you’ll gain:

  • Insight into how adversaries prioritize and exploit vulnerabilities
  • Methods for turning vulnerability intelligence into focused hunt hypotheses
  • Experience identifying behaviors linked to exploitation activity
  • Exposure to hunt packages aligned with exploitation techniques
  • A clearer connection between vulnerability context and threat hunting

Earn Your Intelligence-Driven Threat Hunting: Vulnerability Intelligence Badge

After the workshop, attendees can complete a final challenge to earn the Intelligence-Driven Threat Hunting: Vulnerability Intelligence Badge, demonstrating their ability to apply vulnerability intelligence within the threat hunting process.

Intelligence-Driven Threat Hunting Workshop: Vulnerability Post-Exploitation Behaviors