Posts
-
Jun 26th, 2020
Playbook Fridays: Converting your IOCs to CSVs
Welcome to ThreatConnect’s Playbook Fridays! We will continually publish posts featuring Playbooks (and sometimes Dashboards!) that can be built in the Platform. ThreatConnect developed the Playbook
-
Jun 25th, 2020
ThreatConnect Research Roundup: More Kimsuky “AutoUpdate” Malware
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Jun 19th, 2020
ThreatConnect Research Roundup: Kimsuky “AutoUpdate” Malware
June 19 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observ
-
Jun 19th, 2020
Orchestration With and Without Intelligence: What’s the Difference?
Orchestration informed by security intelligence from within your environment, and threat intelligence from a variety of external sources, is more effective, resilient, and adaptive. An intelligence-le
-
Jun 12th, 2020
ThreatConnect Research Roundup: Probable Sandworm Infrastructure
June 12 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observ
-
Jun 9th, 2020
ThreatConnect and Cylance: Better Endpoint Remediation
ThreatConnect has partnered with Blackberry Cylance, a leader in the Endpoint Detection and Response space, and built two Playbook Apps for our joint customers to leverage. With the addition of these
-
Jun 8th, 2020
Take a Deep Dive into ThreatConnect’s Workflow Capabilities
Interested in learning more about ThreatConnect’s Workflow capability for case management? With Workflow, you can continuously improve security processes with a single Platform for process documenta
-
Jun 2nd, 2020
Do Androids Dream of Electric CALFs?
CAL 2.5 introduces an additional CAL Feed that uses defined criteria to identify NRDs that we believe have been created using a domain generation algorithm (DGA). Just a few short months ago we anno
-
May 28th, 2020
ThreatConnect Research Roundup: Suspected Naikon DGA Domains
May 28 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observa
-
May 26th, 2020
Strengthen Business and Security Alignment with ThreatConnect
ThreatConnect is changing the way security works and that means better alignment with, and transparency to, the business. ThreatConnect’s intelligence-driven, security operations solutions include b
-
May 21st, 2020
ThreatConnect Research Roundup: Possible APT33 Infrastructure
May 21 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observa
-
May 15th, 2020
ThreatConnect and Jira: Automating Processes Made Easier
We’ve expanded our Jira integrations and now support more use cases with new ThreatConnect Apps. The existing ThreatConnect Playbook App for Jira Core has been improved and a brand new Playbook App