Quantcast
Channel: Threat Intelligence – ThreatConnect | Intelligence-Driven Security Operations
Browsing latest articles
Browse All 36 View Live

Image may be NSFW.
Clik here to view.

Why Build Apps in ThreatConnect

Why Build Apps and Share them in ThreatConnect’s TC Exchange – Collaborate to Strengthen Your Threat Intelligence Practice If you’ve spoken with anyone here at ThreatConnect, you may have noticed that...

View Article



Image may be NSFW.
Clik here to view.

Project CAMERASHY: Closing the Aperture on China’s Unit 78020

ThreatConnect® and Defense Group Inc. (DGI) have collaborated to share threat intelligence pertaining to the Advanced Persistent Threat (APT) group commonly known as “Naikon” within the information...

View Article

Image may be NSFW.
Clik here to view.

Camerashy on You Crazy Diamond

Yesterday ThreatConnect and DGI released a report titled CameraShy, which investigates Chinese cyber espionage activity against nations in the South China Sea. The report combines a very data-driven...

View Article

Image may be NSFW.
Clik here to view.

Threat Intelligence-Driven Risk Analysis

Way, way too long ago, we started a series exploring the relationship between threat intelligence and risk management. I’m not sure if a 3+ month gap disqualifies it as a series, but I’ll claim we’re...

View Article

Image may be NSFW.
Clik here to view.

Hunting Adversaries w/ Diamond Dashboard for Splunk

Action – the other half of the battle As a kid, G.I. Joe ranked somewhere below Star Wars, Legos, and Transformers for me in terms of toy box volume and hours of entertainment. Maybe a little above...

View Article


Image may be NSFW.
Clik here to view.

Best Practices: Indicator Rating and Confidence

ThreatConnect enables users to assign a Threat Rating and Confidence to every single indicator… but what do those numbers really represent?  In order to enable your organization to make the best...

View Article

Image may be NSFW.
Clik here to view.

Growing a Threat Intelligence Program is like Growing a Beard

*Disclaimer: Limitations in beard growth do not correlate to actual ability to implement a threat intelligence program. It was just after Thanksgiving dinner and my two-year-old daughter was sitting on...

View Article

Image may be NSFW.
Clik here to view.

Threat Intelligence in 3rd Party Risk Assessment

We’ve finally arrived at the fourth and final installment in this series exploring the relationship between threat intelligence and risk management. If you’re just joining us, previous posts are...

View Article


Image may be NSFW.
Clik here to view.

Intel’s in the way that you use it, Snoke don’t you know

It’s in the way that you fuse it Intel comes and it goes It’s in the way that you use it Snoke don’t you know                        – Eric Clapton (modified) When I decided to join a cybersecurity...

View Article


Image may be NSFW.
Clik here to view.

Kinetic and Potential Energy Framework: Applying Thermodynamics to Threat...

ThreatConnect proposes a framework for evaluating and triaging indicators based on physical energy properties All variety of scientists, from chemists to physicists and engineers, measure kinetic and...

View Article
Browsing latest articles
Browse All 36 View Live




Latest Images