Threat Hunting with The Hive, Cortex and MISP
Threat hunting with The Hive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture. This…
Cyber observable threat hunting techniques.
Threat hunting with The Hive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture. This…
Combining blockchain with machine learning and artificial intelligence algorithms can enable automated threat detection and response systems. These systems can swiftly analyze…
We are pleased to announce that STIX™ Version 2.1 and TAXII™ Version 2.1 from the OASIS Cyber Threat Intelligence (CTI) TC are…
Essential Training Modules for Cyber Threat Analysis Two key items that are in the toolbox for any cyber threat hunter are the…
Whether you are a Security Operations Center (SOC) analyst, a computer science student, a cybersecurity hobbyist, or a member of law enforcement…
According to a recent post by Qrator Labs, at 17:13 UTC on March 31, 2020, the AS50048 (NEWREAL-AS) leaked, in total, 2658…
An active phishing campaign is being propagated from a Spanish-themed domain name that alludes to El Molino Sabor (in English: “Mill Taste”)…
A STIX/TAXII community member, Stephen Russett, recently contributed a new open source tool to the CTI community. Here is what he provided…
OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version…
The cybersecurity private sector community has recently been working hand-in-hand with public sector law enforcement agencies to take-down these insidious botnets.