Threat Hunting with TheHive, Cortex and MISP
Threat hunting with TheHive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture.…
Cyber observable threat hunting techniques.
Threat hunting with TheHive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture.…
STIX and TAXII are widely recognized as key frameworks for the sharing and exchange of cyber threat intelligence between organizations.…
Threat intelligence platforms (TIPs) are useful tools in many different industry verticals including Banking and Financial Services Transportation Communications Energy…
We are pleased to announce that STIX™ Version 2.1 and TAXII™ Version 2.1 from the OASIS Cyber Threat Intelligence (CTI)…
Essential Training Modules for Cyber Threat Analysis Two key items that are in the toolbox for any cyber threat hunter…
Whether you are a Security Operations Center (SOC) analyst, a computer science student, a cybersecurity hobbyist, or a member of…
According to a recent post by Qrator Labs, at 17:13 UTC on March 31, 2020, the AS50048 (NEWREAL-AS) leaked, in total,…
An active phishing campaign is being propagated from a Spanish-themed domain name that alludes to El Molino Sabor (in English:…
A STIX/TAXII community member, Stephen Russett, recently contributed a new open source tool to the CTI community. Here is what…
OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and…