Our cyber threat intelligence content contains unique insights from industry experts, threat intelligence theory to help you understand complex topics, and practical use cases you can implement at your company to enhance its cyber security posture.
Free Learning Resources
Start your learning journey today using our FREE learning resources. This includes cyber threat intelligence, threat hunting, and custom tooling content. Budget should not be a barrier to high-quality content!
Cyber Threat Intelligence
Estimative Language: How to Assign Confidence to Your Assessments
5 Cyber Kill Chain Challenges and How to Prevail
Day in the Life of a Senior Threat Intelligence Analyst
Collection Management Framework Template (+FREE Download)
Cyber Threat Intelligence Report Template (+FREE Download)
Top 5 Cyber Threat Intelligence Lifecycle Challenges
Top 5 Challenges With Indicators and How to Overcome Them
What Is the Indicator Lifecycle? A Guide to Using Indicators
Threat Hunting
Our threat hunting content will help you master the mysterious art of hunting down threats in the cyber realm.
You will see how to create complex hunting queries, automate your threat hunting workflow, and create your own hunting tools.How to Create a Home Lab: Virtualize all the Things!
How to Arm Yourself with Custom Sigma Rules
Python Threat Hunting Tools: Part 10 — The Power of Jupyter Notebooks
Python Threat Hunting Tools: Part 2 — Web Scraping
Python Threat Hunting Tools: Part 1 — Why?
Unraveling the Courses of Action Matrix: Full Guide to CoA
C2 Hunting: How to Find C2 Servers with Shodan
Hunting for Persistence with Cympire: Part I — Registry Run Keys
MITRE ATT&CK Framework: Holy Bible of Threat Intelligence
Custom Tooling
Our custom tooling series will empower you with the superhuman powers programming and scripting can deliver.
You will learn how to create testing environments, use various languages to build your custom tools, and make your workflows more efficient with automation.
Discover MITRE’s CTI Blueprints: A Revolutionary New Project
Python Threat Hunting Tools: Part 2 — Web Scraping
Python Threat Hunting Tools Part 7 — Parsing CSV
Web Scraping Cyber Threat Intelligence Using Octoparse: Full Guide
Malware Configuration Parsers: An Essential Hunting Tool
Python Threat Hunting Tools: Part 12 – MISP and CrowdStrike Falcon Integration
Python Threat Hunting Tools: Part 3 — Interacting with APIs
Python Threat Hunting Tools: Part 1 — Why?
Python Threat Hunting Tools Part 6 — Creating EXEs from Python Files
Stay up-to-date whenever we release articles, tips, and guided tutorials. Don't miss a thing and signup to get notified of new content.
Thank you!
You have successfully joined our subscriber list.