-
Oct 2nd, 2020
Research Roundup: Kimsuky Phishing Operations Putting in Work
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Sep 29th, 2020
Integrations Aren’t Just for Developers
Introduction Security Orchestration, Automation and Response (SOAR) platforms gain a lot of strength from the technologies they have in place to enable integrations and the quality of those integratio
-
Sep 28th, 2020
Kimsuky Phishing Operations Putting In Work
Executive Summary Recently, an international NGO that provides threat sharing and analysis support to frequently targeted communities reached out to ThreatConnect wanting to learn more about the origi
-
Sep 25th, 2020
Research Roundup: APT39 Adversaries
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Sep 23rd, 2020
ThreatConnect and Sigma Signatures: Increase Detection Capabilities
ThreatConnect now supports Sigma Signatures! As a quick refresher, Sigma is a generic and open signature format for SIEM systems. It allows you to describe relevant log events straightforwardly. The r
-
Sep 18th, 2020
Research Roundup: Microsoft Strontium Sinkhole Domain Sibling
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Sep 11th, 2020
Research Roundup: Activity on Previously Identified APT33 Domains
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Sep 10th, 2020
ThreatConnect: The Brain of Security
Why Acquiring Nehemiah Security was the Right Decision Since its inception, ThreatConnect has used the analogy that it wants to be the “brain of security,” to act as its central nervous system pro
-
Sep 4th, 2020
ThreatConnect and MITRE ATT&CK: Supporting Sub-techniques
ThreatConnect has long supported the MITRE ATT&CK framework and, we are delighted to be among the first to support MITRE ATT&CK Sub-techniques. As a quick refresher, MITRE ATT&CK® is a gl
-
Sep 3rd, 2020
Research Roundup: Mustang Panda and RedDelta PlugX Using Same C2
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Aug 27th, 2020
Research Roundup: FBI/NSA Fancy Bear Report Followup
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Aug 26th, 2020
SOAR: An Incident Responder’s Best Friend
Decrease Time to Response and Remediation with SOAR As an Incident Responder (IR), it doesn’t seem to matter how quickly you solve an issue nor if the case or ticket comes to you with no additional