STIX Patterning Reference Guide
The STIX 2 Pattern Validator is a software tool for checking the syntax of the Cyber Threat Intelligence (CTI) STIX Pattern expressions,…
The STIX 2 Pattern Validator is a software tool for checking the syntax of the Cyber Threat Intelligence (CTI) STIX Pattern expressions,…
Jane Ginn accepts the prestigious OASIS Open Distinguished Contributor 2020 Award. Video of acceptance speech.
We are pleased to announce that STIX™ Version 2.1 and TAXII™ Version 2.1 from the OASIS Cyber Threat Intelligence (CTI) TC are…
Essential Training Modules for Cyber Threat Analysis Two key items that are in the toolbox for any cyber threat hunter are the…
Whether you are a Security Operations Center (SOC) analyst, a computer science student, a cybersecurity hobbyist, or a member of law enforcement…
As more cyber threat intelligence teams become established, and members of Information Sharing and Analysis Organizations (ISAOs) begin to realize the benefits…
OASIS has a broad technical agenda encompassing cybersecurity, blockchain, privacy, cryptography, cloud computing and IoT – any initiative for developing code, APIs,…
Since gaining power in 1979 Iran’s clerics have expended considerable resources to protect the Revolution with propaganda which promotes Iran as the…
According to a recent post by Qrator Labs, at 17:13 UTC on March 31, 2020, the AS50048 (NEWREAL-AS) leaked, in total, 2658…
The CTIN Team has recently been tracking a series of social media influence operations operatives that are currently targeting the US 2020…