Threat Chords: Tuning into Persistent Patterns in Adversary Behavior
Karthika, Samhita Vempatti
BSidesSF 2026 · Day 1 · AMC Theatre 13
In a landscape increasingly defined by rapid cyberattacks and sophisticated adversaries, the BSides SF talk "Threat Chords: Tuning into Persistent Patterns in Adversary Behavior" by Adobe cybersecurity researchers Karthika and Samhita Vempatti offered a compelling argument for shifting focus in threat intelligence. The core premise, inspired by musical chords, is that while individual **indicators of compromise (IOCs)**—the "notes" of an attack—may change frequently, the underlying behavioral patterns and operational playbooks—the "chords"—remain remarkably consistent over time.
AI review
A competent, well-structured threat intelligence talk that repackages the Pyramid of Pain into a music metaphor and applies it to two real campaigns. The Amos infra-pivoting case study shows genuine research chops, but the conceptual framework is familiar territory dressed up in new branding — nothing here will surprise a seasoned CTI practitioner.