Home » Black Hat 2022 | Join the Hunt with Cybersixgill
Four Seasons Hotel at Mandalay Bay Las Vegas
Become a member of our threat hunting squad in our innovative, new Dark Lab challenge, a practical threat hunting experience for newcomers and experienced threat hunters to explore REAL and active threats.
You will compete in the challenge using Cybersixgill’s Investigative Portal for a chance to win a 5-night South African adventure for two, worth $10,000.
See how real threats originate in the deep and dark web
Understand what to do in specific situations given your roles
See and learn how threat actors think, move and communicate
Better and more rapidly learn through role-play versus real-life situations
Enhance your investigative skills to better defend your organization
Choose among a list of challenges to pursue
Get investigative clues for each challenge to begin you hunt
Build boolean searches
Search through real data to find real threats
Return the “flag” and receive a ticket to enter our prize draw for every challenge correctly completed within your time slot
Complete the online form at the top of the page to register and book your time slot
Visit our Dark Lab at and start your 30-minute threat hunting mission
Receive a ticket to enter our free prize draw for every challenge correctly completed within your time slot
Cybersixgill captures, processes and alerts teams to emerging threats, TTPs and IOCs as they surface on the clear, deep and dark web. Our customers have access to this intelligence before OSINT distributes it, before incident responders report it and before a threat actor executes their mission.
When compared to our closest competitor, Cybersixgill delivers:
Contact us to arrange a meeting at Black Hat Las Vegas for a demonstration with one of our threat intelligence experts.
“Cybersixgill helped us to track and gain insight into dark and deep web intelligence. The coverage is incredible; compared to other vendors we used and tried, they have the best snapshot of dark and deep web forums, chats, and markets.”
Fortune 500 Threat Intel Analyst
Contact us to arrange a meeting at Black Hat Las Vegas for a demonstration with one of our threat intelligence experts.
OFFICIAL RULES
TERMS & CONDITIONS: Prize winner will be notified by email at the email provided, and the potential winner will be required to execute and return an Affidavit of Eligibility and Liability/Publicity Release within 5 days of notification (first attempted delivery) or prize will be forfeited and an alternate winner selected. The potential winner may be required to provide Sponsor with proof of eligibility. Entrants agree to abide by and be bound by these rules and the judges’ decisions, which are final and binding in all matters related to the Challenge and this Sweepstakes. Winner must provide tax id number and other forms required by Sponsor for issuance of appropriate tax documentation and for check issuance. By entering, entrants agree that Sponsor may use entrant’s Challenge information for promotional purposes, in accordance with Sponsor’s privacy policy, which can be found at: https://www.cybersixgill.com/privacy-policy/. If the potential winner is resident of Canada, the potential winner must also solve a mathematical skill test administered by telephone at a pre-arranged mutually convenient time in order to claim the prize. If such winner is unable to solve the test, an alternate winner will be selected.
By accepting prize, winner agrees that neither Sponsor its parent, affiliates, subsidiaries, distributors, retailers, and/or any of their respective shareholders, directors, officers, distributors, employees or promotion/advertising agencies will have any liability whatsoever for any injuries, losses, harm, damage, cost, or expense arising from or in connection with participation in this Sweepstakes or any prize related activities, or the acceptance, possession, use and/or misuse of a prize including, without limitation, any personal injury or death. Participation in a shark cage dive activity is a dangerous activity. Winner and guest may be required to execute additional releases to accept prize, travel and/or participate in specific tour activities. By accepting prize, winner acknowledges that Sponsor, its parent, affiliates, subsidiaries, distributors, retailers, and/or any of their respective shareholders, directors, officers, distributors, employees or promotion/advertising agencies have neither made, nor are in any manner responsible or liable for, any warranty, representation or guarantee, express or implied, in fact or in law, relative to a prize, including but not limited to its quality or merchantability, or fitness for a particular purpose. All Federal, State, and Local laws and regulations apply.
Sponsor: Sixgill USA, Inc., 177 Huntington Ave Ste 1703, PMB 64136, Boston, MA 02115-3153
Automatically gain access to remediation information for each vulnerability directly from NVD, MITRE and other vendor sites.
Receive a full intelligence picture of the vulnerability, complete with context – including a comprehensive audit trail of the data we have collected on the actors and their discourse, exploit kits, attribution to malware, APT and ransomware. This includes a score of the likelihood a vulnerability will be exploited over the next 90 days, hours after the CVE is first published. Unlike CVSS, this score is continually updated in real-time in response to the threat intelligence we gather.
Map vulnerabilities to MITRE ATT&CK framework to anticipate how, when or why criminals will exploit each vulnerability, listing the CVEs used in the context of each technique to assess the risk to your organization and prioritize remediation efforts.
Accurately match organizational CPEs identified in step 1 to specific, related vulnerabilities (CVEs) to determine which vulnerabilities are exposing your systems to attack.
Discover and scope the relevant organizational assets (ie. CPEs) and vulnerabilities (ie CVEs) or identify specific CPEs and CVEs that are of interest.