Learn the Traffic Light Protocol (TLP). A fundamental cyber threat intelligence framework used to classify information for secure intelligence sharing.
New MacOS malware and DHCP attacks, LockBit admin locked up, and hackers pose as journalists in triaging the week 024.
Explore the top five Cyber Kill Chain challenges you will face when using this cyber security model in the real world and how to overcome them.
Okta comes under attack, dating scams are on the rise, and millions of Docker repositories are pushing malware in triaging the week 023
Unlock the power of YARA rules and build your own custom detections. Learn how to write them effectively and use them in the real world with examples.
Learn to create honey files, discover why programming is needed for cyber security, and raise your productivity in triaging the week 022.
This full guide will help you discover the power of the Analysis of Competing Hypotheses technique and learn how to analyze intelligence more efficiently.
Zero-day in Palo Alto firewalls, new steganography phishing emails, and Chirp Systems’ smart locks failing in triaging the week 021.
Elevate your cyber threat intelligence analysis with the Diamond Model. This full guide will teach you everything to start using this analytical technique.
Scams everywhere, Israeli spy chief sucks at opsec, and a new flaw in SharePoint lets hackers evade detection in triaging the week 020.
Discover the top five challenges with indicators (IOCs) and how to overcome them to improve the effectiveness of your cyber security operations.
Backdoor found in open-source tool, India rescues citizens from cyber slavery, and Microsoft slammed over breach in triaging the week 019.
Discover how to create your own automated malware analysis environment you can deploy in minutes by combining powerful technologies in this hands-on guide.
Phishing-as-a-service on the rise, US says SQL injection vulnerabilities are unforgivable, and free VPN apps enable cybercrime in triaging the week 018.
Learn what threat modeling is, why it is important, and how to perform using STRIDE, DREAD, PASTA, Attacks Trees, and VAST in this comprehensive guide.