Potential New EvilNum Campaign
CTIN has discovered a new campaign that appears to be associated with previous malicious infrastructure attributed to Evilnum. EvilNum is…
Charting a New Course for Military Cyber Threat Intelligence through Structured Standards and Protocols
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground,…
Android Phones of Ukranian Soldiers Weaponized by GRU
In a striking revelation that underscores the escalating tensions between Russia and Ukraine, a coalition of Western intelligence agencies has…
Physical Security for Commercial Facilities
Last month I wrote about cybersecurity for the Commercial Facilities critical infrastructure sector. Physical security is an essential aspect of…
So You Want To Set-up an ISAC
Setting up an Information Sharing and Analysis Center (ISAC) is essential for organizations aiming to create a comprehensive and strategic…
Liberty is Not Easy
What wisdom can you find that is greater than kindness? - Jean-Jacques Rousseau (1712-1778)
Security Best Practices for Commercial Facilities
Property managers of commercial facilities like shopping centers, sports stadiums, casinos, churches, and movie complexes face unique physical security and…
Why Use STIX2.1 In Your Products
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it…
Threat Hunting with TheHive, Cortex and MISP
Threat hunting with TheHive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture.…
Leveraging STIX and TAXII for Human Trafficking Intelligence: A Technical Analysis
By: Niels Groeneveld, OSINT AnalystJanuary 29, 2023 Human trafficking is a complex and pervasive problem that requires a multi-disciplinary approach…