Learn why malware configuration parsing is an essential skill for any threat hunter, plus how to use a malware configuration parsers to do this automatically.
Malware abuses Discord, Australia imposes sanctions, and the Uber of cybercrime is revealed in triaging the week 009.
Learn about MITRE’s CTI Blueprints project. A revolutionary new CTI project that aims to help analysts deliver high-quality, standardized CTI reports.
New mitigations and with GrapheneOS and iShutdown scripts, top ransomware gangs to watch out for in 2024, and MacOS malware evades XProtect in triaging the week 008.
Discover the indicator lifecycle in this full guide on cyber security indicators. You will learn what indicators are and how to use them best.
DPKR steals all the crypto, X accounts are under siege, and China Cracks Apple’s AirDrop in triaging the week 007.
Learn about cyber threat intelligence requirements, why they are important, and how to create effective intelligence requirements in three simple steps.
Australian court hacked, a formal ban on ransomware incoming, and Mandiant X account hijacked in triaging the week 006.
Learn about the cyber threat intelligence lifecycle, the six stages of this fundamental model, and how you can use it in real-world security operations.
Hackers abuse GitHub, FBI takes major shot at ALPHV ransomware, and the Lapsus$ hacker gets sentenced in triaging the week 005.
Read this guide to discover what cyber threat intelligence is and how it can benefit you at your business's operational and strategic levels.
DNS vulnerabilities, cloud engineers rampage, and the UK at risk of catastrophic ransomware attack in triaging the week 004.
Discover why it is important to have clear definitions for key cyber threat intelligence concepts and how this series can be your reference guide.
Google Workspace vulnerabilities, a new version of Kali Linux, and Kraven Security’s website is now live in triaging the week 003.
We have officially launched the website. This interactive platform lets you learn all things cyber threat intelligence, threat hunting, and custom tooling.