Our cyber threat intelligence content contains unique insights from industry experts, threat intelligence theory to help you understand complex topics, and practical use cases you can implement at your company to enhance its cyber security posture.
Free Learning Resources
Start your learning journey today using our FREE learning resources. This includes cyber threat intelligence, threat hunting, and custom tooling content. Budget should not be a barrier to high-quality content!
Cyber Threat Intelligence
How to Arm Yourself with Threat Intelligence
Discover MITRE’s CTI Blueprints: A Revolutionary New Project
CTI Report Writing: How to Communicate Threat Intelligence
ATT&CK Powered Suit: Streamline Your Research and Save Time
The Traffic Light Protocol: How to Classify Cyber Threat Intelligence
Top 5 Challenges When Creating Intelligence Requirements
Threat Intelligence with MISP Part 7 – Exporting IOCs
Unraveling the Courses of Action Matrix: Full Guide to CoA
Threat Hunting
Our threat hunting content will help you master the mysterious art of hunting down threats in the cyber realm.
You will see how to create complex hunting queries, automate your threat hunting workflow, and create your own hunting tools.Python Threat Hunting Tools: Part 1 — Why?
How to Arm Yourself with Threat Intelligence
Python Threat Hunting Tools Part 7 — Parsing CSV
Python Threat Hunting Tools: Part 10 — The Power of Jupyter Notebooks
How to Arm Yourself with Custom Sigma Rules
Python Threat Hunting Tools: Part 12 – MISP and CrowdStrike Falcon Integration
Python Threat Hunting Tools: Part 2 — Web Scraping
Python Threat Hunting Tools: Part 8 — Parsing JSON
Netlas.io: A Powerful Suite of Tools for Threat Hunting
Custom Tooling
Our custom tooling series will empower you with the superhuman powers programming and scripting can deliver.
You will learn how to create testing environments, use various languages to build your custom tools, and make your workflows more efficient with automation.
Python Threat Hunting Tools: Part 10 — The Power of Jupyter Notebooks
Malware Configuration Parsers: An Essential Hunting Tool
Python Threat Hunting Tools: Part 5 — Command Line Arguments
5 Ways to Use ChatGPT to Create Cyber Security Tools
Python Threat Hunting Tools: Part 11 – A Jupyter Notebook for MISP
Python Threat Hunting Tools Part 6 — Creating EXEs from Python Files
Python Threat Hunting Tools: Part 12 – MISP and CrowdStrike Falcon Integration
Discover the Ultimate Cyber Security Notetaking App: Polarity
Python Threat Hunting Tools: Part 2 — Web Scraping
Stay up-to-date whenever we release articles, tips, and guided tutorials. Don't miss a thing and signup to get notified of new content.
Thank you!
You have successfully joined our subscriber list.