Potential New EvilNum Campaign
CTIN has discovered a new campaign that appears to be associated with previous malicious infrastructure attributed to Evilnum. EvilNum is…
A catch-all for topics related to cybersecurity.
CTIN has discovered a new campaign that appears to be associated with previous malicious infrastructure attributed to Evilnum. EvilNum is…
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground,…
Setting up an Information Sharing and Analysis Center (ISAC) is essential for organizations aiming to create a comprehensive and strategic…
What wisdom can you find that is greater than kindness? - Jean-Jacques Rousseau (1712-1778)
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it…
Threat hunting with TheHive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture.…
By: Niels Groeneveld, OSINT AnalystJanuary 29, 2023 Human trafficking is a complex and pervasive problem that requires a multi-disciplinary approach…
STIX and TAXII are widely recognized as key frameworks for the sharing and exchange of cyber threat intelligence between organizations.…
Boston, MA, USA, 21 November, 2022 – OASIS Open, the international open source and standards consortium, announced the approval of…
Congratulations to Harm Jan van Burg, Senior Policy Advisor, International Standards at OASIS Open, on his election as Vice Chair…