Certificate transparency logs are an excellent resource for monitoring suspicious certificates and rogue certificate authorities. It's also become extremely popular for phishing landing pages and malware C2 servers to use legitimate certificates due to the availability of free certificate authorities.
This session will go over the technical details on how whichphish.com was built using the Elastic Search Platform to operationalise certificate transparency logs for security teams.