
The Traffic Light Protocol: How to Classify Cyber Threat Intelligence
Learn the Traffic Light Protocol (TLP). A fundamental cyber threat intelligence framework used to classify information for secure intelligence sharing.
The Kraven Security blog is the ultimate resource for free content on cyber threat intelligence, threat hunting, and custom tooling. We drop new articles every week with tips, advice, and guided tutorials. Don't miss a thing and signup to get notified of new content.
You have successfully joined our subscriber list.
Learn the Traffic Light Protocol (TLP). A fundamental cyber threat intelligence framework used to classify information for secure intelligence sharing.
Explore the top five Cyber Kill Chain challenges you will face when using this cyber security model in the real world and how to overcome them.
Unlock the power of YARA rules and build your own custom detections. Learn how to write them effectively and use them in the real world with examples.
This full guide will help you discover the power of the Analysis of Competing Hypotheses technique and learn how to analyze intelligence more efficiently.
Elevate your cyber threat intelligence analysis with the Diamond Model. This full guide will teach you everything to start using this analytical technique.
Discover the top five challenges with indicators (IOCs) and how to overcome them to improve the effectiveness of your cyber security operations.
Discover how to create your own automated malware analysis environment you can deploy in minutes by combining powerful technologies in this hands-on guide.
Learn what threat modeling is, why it is important, and how to perform using STRIDE, DREAD, PASTA, Attacks Trees, and VAST in this comprehensive guide.
Discover the best way of collecting intelligence, a collection management framework. This guide will teach you what they are and how to create one.
Learn how to use the cyber kill chain. A fundamental framework for understanding cyber attacks, analyzing intrusions, and planning cyber defenses.
Learn about the top 5 challenges when creating intelligence requirements and strategies you can use to overcome them in this guide.
Discover how to create your very own local Kubernetes cluster automatically using Terraform, Ansible, and the power of infrastructure as code (IaC).
Learn about the Courses of Action matrix (CoA) and how it can help your organization accurately assess its defensive capabilities and improve resiliency.
Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, and map your attack surface.
Discover the top 5 threat intelligence lifecycle challenges you will face and how to overcome them to produce actionable intelligence.