
Unmasking the Hackers: A Complete Guide to Threat Actors
Discover how to identify threat actors, their motivation, intent, and capability so you can prioritize defenses and allocate resources effectively.
The Kraven Security blog is the ultimate resource for free content on cyber threat intelligence, threat hunting, and custom tooling. We drop new articles every week with tips, advice, and guided tutorials. Don't miss a thing and signup to get notified of new content.
You have successfully joined our subscriber list.
Discover how to identify threat actors, their motivation, intent, and capability so you can prioritize defenses and allocate resources effectively.
Learn how to use the F3EAD intelligence loop to add structure to your cyber threat intelligence work and generate actionable intelligence in this guide.
Discover the top 5 challenges of building a CTI team and how you can overcome them, from talent acquisition to operational integration, in this guide.
Discover the history of cyber threat intelligence, from the origins of intelligence to the threats CTI must combat today in this quick-fire guide.
Discover the key roles and responsibilities required to build a successful cyber threat intelligence team and the role of a CTI team in the wider business.
In an era of cyber threats looming large, the effectiveness of threat intelligence hinges on timely sharing with the right stakeholders. To facilitate this crucial
Two new initiatives released at Kraven Security! New free training courses drop and daily threat hunting packages based on OSINT reports.
In this complete guide, learn how to create your own custom web scraping tool to gather cyber threat intelligence using the no-code platform Octoparse.
C2 hunting empowers you to track down adversary C2 servers and stay a step ahead of the bad guys. This guide teaches you how to do it using Shodan.
Unlock the power of the ATT&CK Navigator, discover its many use cases, and learn to visualize and map attack techniques through a user-friendly interface.
The ATT&CK Powered Suit puts the entire ATT&CK knowledge base at your fingertips. Streamline your research and save valuable time with this new tool from MITRE.
This collection management framework template provides you with the structure to effectively document your data sources and understand how to use them.
This intelligence requirements template allows you to document your company’s intel requirements and kickstart your cyber threat intelligence program.
A cyber threat intelligence report template saves you and your CTI team valuable time and effort. Here is a FREE report template you can use today!
Intelligence collection sources are the most important component of a CTI program. This guide will teach you what they are and how to use them.