Posts
-
Jan 28th, 2021
ThreatConnect and Slack: Streamline Investigative Team Collaboration
ThreatConnect has revamped our existing integration with Slack by leveraging their latest APIs and Authentication, doing this allows us to include a ton more functionality. With Playbooks, you can aut
-
Jan 27th, 2021
CrimsonIAS: Listening for an 3v1l User
Executive Summary CrimsonIAS is a Delphi-written backdoor dating back to at least 2017 that enables operators to run command line tools, exfiltrate files, and upload files to the infected machine. Cri
-
Jan 25th, 2021
TIP & SOAR: Creating Increased Capability For Less Mature Teams
Building a threat intelligence-led security program with security orchestration, automation, and response (SOAR) capabilities helps to advance your program and gives your company or agency a fighting
-
Jan 21st, 2021
ThreatConnect and AlienLabs OTX: Give Your Investigations Community Support
ThreatConnect is pleased to deliver a Playbook App for joint customers to leverage AT&T AlienLabs OTX. With this app, you can query Alien Labs OTX for enrichment information on various indicators
-
Jan 20th, 2021
Beyond Information Sharing: DHS Begins Cyber Risk Quantification Push
The Cybersecurity and Infrastructure Security Agency (CISA) has launched a new cybersecurity effort to develop actionable metrics and quantify cyber risk across the nation’s critical infrastructure
-
Jan 18th, 2021
SOAR: Proactive Threat Hunting (Part 2)
There are many definitions for Threat hunting from an active cyber defense activity that proactively and iteratively searches through networks to detect and isolate advanced threats that evade existin
-
Jan 14th, 2021
Cyber Risk Quantification: The Pressure Is On (New Survey)
New survey suggests companies aren’t prepared or equipped to deliver cyber risk quantification data Cyber risk has long been acknowledged as one of the top risks facing companies of all sizes. And w
-
Jan 13th, 2021
Welcome to the Age of Automated Cyber Risk Quantification
This year the conversation about cyber risk and cyber risk quantification must change. Even the best vulnerability management program isn’t really addressing cyber risk. Did you know that more than
-
Jan 7th, 2021
Former CIA Cybersecurity Chief Speaks Out on Solar Winds Hack
In an exclusive interview with the ThreatConnect Podcast, Robert Bigman, the former Chief Information Security Officer (CISO) at the CIA, said when investigators complete their analysis into how the R
-
Jan 6th, 2021
Risk Quantification, Threat Intelligence & Automation: Stronger Together
ThreatConnect's marries cyber risk quantification (CRQ), threat intelligence platform (TIP), and SOAR capabilities.
-
Dec 22nd, 2020
8 Ways SOC & IR Teams Can Use ThreatConnect’s Workflow Capability
ThreatConnect’s Workflow capability enables users to continuously improve security processes with a single Platform for process documentation, team collaboration, and artifact enrichment. With W
-
Dec 22nd, 2020
How to Use Workflow to Conduct Phishing Analysis Part 2 – Automating Phase 1
While most organizations (88% in 2019 according to ProofPoint’s State of the Phish 2020 report) are targeted by spear phishing emails each year, the processes by which these messages are triaged and