Malicious versions of jQuery, Russian bots taken down, and ViperSoftX malware gets an upgrade in triaging the week 033.
Critical OpenSSH Flaw, Google Offers Big Bucks for KVM Zero-Days, and Child Predators Unmasked Using Infostealer Malware in triaging the week 032.
Rise in Android malware, new GrimResource Windows attack, and WikiLeaks founder Julian Assange released in triaging the week 031.
Intelligence collection sources are the most important component of a CTI program. This guide will teach you what they are and how to use them.
Users get targeted with fake errors and new phishing kits, Scattered Spider hacker gets arrested, and the Kraken crypto exchanges loses millions in triaging the week 030.
CTI analysis bias is inherent in all analysts. You must learn how to overcome it to produce accurate intelligence assessments. This guide will teach you how.
New phishing techniques and campaigns are revealed, leaky GitHub token leads to NYT breach, and Microsoft Azure tags come under attack in triaging the week 029.
CTI report writing is an essential cyber security skill. This guide will teach you why it’s important, the key elements, and how to write a great report.
Snowflake breach impacts major orgs, TitTok hit by zero-day, and several London hospitals caught up in ransomware attack in triaging the week 028.
Estimative language is fundamental for good cyber threat intelligence reporting. This guide will teach you everything you need to know, from probability terms to confidence levels.
Check Point VPN attacked, Hackers abuse Cloudflare Workers and Stack Overflow, and a new ransomware group linked to North Korea in triaging the week 027.
Learn how to perform intrusion analysis in this comprehensive guide that includes a four-step process for success, tips and tricks, and practical examples.
Dark web marketplace gets taken down, new attacks abuse the cloud and legitimate services, and China uses ORB networks to evade detection in triaging the week 026.
Crown Jewel Analysis is a fundamental risk management methodology you should know. This guide will teach you what it is, how to use it, and tools to help.
New hacking attacks target cloud and DNS, MITRE releases a new framework, and Windows Quick Access gets abused in triaging the week 025.