APIs Explained: From Endpoints to Authentication
APIs specify the types of requests that can be made, how to make them, and the data formats that should be used.…
Techniques for automating threat hunting.
APIs specify the types of requests that can be made, how to make them, and the data formats that should be used.…
I was encouraged to find out that the most popular AI applications are actually extensions of existing tried and true tools that…
We will see a dangerous escalation in the use of AI by attackers in 2024 Q3. Attackers have developed increasingly sophisticated AI-powered…
One of the main benefits of using STIX and TAXII for law enforcement threat intelligence sharing is the ability to standardize the…
OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.
Threat hunting with The Hive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture. This…
A STIX/TAXII community member, Stephen Russett, recently contributed a new open source tool to the CTI community. Here is what he provided…
OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version…