-
Kraven Security Website Launch!
We have officially launched the website. This interactive platform lets you learn all things cyber threat intelligence, threat hunting, and custom tooling.
-
Discover the Ultimate Cyber Security Notetaking App: Polarity
Discover the new cyber security notetaking app that integrates with your organization’s tools and is an effective copilot for all your investigations.
-
Python Threat Hunting Tools: Part 12 – MISP and CrowdStrike Falcon Integration
Make your threat hunting process more efficient by integrating MISP and CrowdStrike Falcon EDR so you can automate uploading your IOCs for detection.
-
Threat Intelligence with MISP Part 7 – Exporting IOCs
Discover how to turn MISP attributes into Indicators of Compromise that you can export as a CSV file and upload to your security solution for detection.
-
Python Threat Hunting Tools: Part 11 – A Jupyter Notebook for MISP
Learn how to create a Jupyter Notebook that you can use to query your MISP instance. This will drastically speed up your threat intelligence operations!
-
Threat Intelligence with MISP Part 6 – Using the API
Learn to use the MISP API to make the most of your MISP instance. You will see how to get statistics about your MISP instance, search for attributes and events, and visualize data you’ve added to your instance.
-
Creating Your Own CTI Aggregator for Free: A Complete Guide
Learn what a CTI aggregator is, why you need one, and how to create your own for completely for free to make your threat intelligence gathering efficient
-
Threat Intelligence with MISP: Part 5 – Searching and Filtering
Learn how to search and filter MISP events and attributes to find threat intelligence relevant to you.
-
Threat Intelligence with MISP: Part 4 – Using Feeds
Learn how to add open-source threat intelligence feeds to your MISP instance so you can begin rapidly populating the threat intelligence platform with the latest data.
-
Threat Intelligence with MISP: Part 3 – Creating Events
Learn how to start using MISP. You will learn about MISP events, how to create them, and how to add context to them using MISP’s galaxies and taxonomies
-
Visual Threat Intelligence: A Masterpiece of Infographics and Storytelling
Let’s take a look at Visual Threat Intelligence by Thomas Roccia and discover why it is so popular in the cyber security community in this complete review.
-
Threat Intelligence with MISP: Part 2 – Setting up MISP
Learn how to install and set up MISP. You will discover the various installation methods available, which is best, and how to configure your MISP instance to begin ingesting threat intelligence.
-
Cyber Threat Intelligence with MISP: Part 1 – What is MISP?
Discover the premier open-source threat intelligence sharing platform, its key features, and how you can use it to elevate your security posture!
-
5 Mistakes I Made as a New Cyber Threat Intelligence Analyst
Being a cyber threat intelligence analyst is a difficult job. Here are the top 5 mistakes I made when I first started that you can learn from and avoid.
-
Threat Profiling: How to Understand Hackers and Their TTPs
Begin understanding how attackers think by performing threat profiling to map out how they might attack your organization using the MITRE ATT&CK matrix.