In this complete guide, learn how to create your own custom web scraping tool to gather cyber threat intelligence using the no-code platform Octoparse.
C2 hunting empowers you to track down adversary C2 servers and stay a step ahead of the bad guys. This guide teaches you how to do it using Shodan.
Unlock the power of the ATT&CK Navigator, discover its many use cases, and learn to visualize and map attack techniques through a user-friendly interface.
The ATT&CK Powered Suit puts the entire ATT&CK knowledge base at your fingertips. Streamline your research and save valuable time with this new tool from MITRE.
Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, Discover netlas.io, a powerful suite of tools to enrich your threat hunts, add threat intelligence to your investigations, and map your attack surface.
Learn why malware configuration parsing is an essential skill for any threat hunter, plus how to use a malware configuration parsers to do this automatically.
Learn about MITRE’s CTI Blueprints project. A revolutionary new CTI project that aims to help analysts deliver high-quality, standardized CTI reports.
Discover the new cyber security notetaking app that integrates with your organization’s tools and is an effective copilot for all your investigations.
Learn what a CTI aggregator is, why you need one, and how to create your own for completely for free to make your threat intelligence gathering efficient
Whodunit is a tool that can be used to identify the most likely Advanced Persistent Threat group responsible for an attack. Let's find out how to use it!