Posts
-
Jun 25th, 2017
How to Use Threat Intelligence & Orchestration to Defeat Stranger Threats
Threat Intelligence and Orchestration can come together to defeat threats to your network, or D&D monsters…whichever you face. When watching Stranger Things it’s easy to notice many in
-
Jun 21st, 2017
Getting Started with the ThreatConnect Query Language (TQL)
From Neanderthal to Ninja Users in ThreatConnect have a lot of data to go through, and a big part of our job is finding ways to empower them to find the right data faster. Our Browse Screen harbors an
-
Jun 14th, 2017
Phantom of the Opaera: New KASPERAGENT Malware Campaign
KASPERAGENT Malware Campaign resurfaces in the run up to May Palestinian Authority Elections ThreatConnect has identified a KASPERAGENT malware campaign leveraging decoy Palestinian Authority docume
-
Jun 5th, 2017
Get Started with Cyber Threat Analysis: How to Research Ransomware
Learn How to Research Ransomware in ThreatConnect We recently recorded a video to show what members of our Research Team do on a daily basis within the ThreatConnect platform to perform cyber threat
-
May 23rd, 2017
Did You Know We Have A Knowledge Base?
From guides to training videos and best practices, ThreatConnect’s Knowledge Base has everything you need to use the Platform to its fullest potential. Did you know that ThreatConnect has a know
-
May 18th, 2017
When Dumpster Fires Make You WannaCry
Stepping back and taking stock of WannaCry lessons learned During the afternoon on Friday May 12th, WannaCry ransomware infections broke out at several UK National Health Service (NHS) medical facilit
-
May 8th, 2017
Getting Started with Threat Intelligence: A Guide for the ONG Community
Getting Started with Threat Intelligence: A Guide for the ONG Community How ONG institutions can get started with ThreatConnect to gain context about threats The utilities vertical, specifically oil a
-
May 2nd, 2017
The Technical Blogs and Reports Source
I’ve got 99 problems, but keeping up with the news isn’t one Collecting is the sort of thing that creeps up on you. ~Paul Mellon “Did you see that latest report on [ransomware
-
Apr 26th, 2017
Parlez-vous Fancy?
ThreatConnect Reviews Potential Fancy Bear Activity Targeting the French Election Runoff In the run up to the French election runoff between Emmanuel Macron and Marine Le Pen, ThreatConnect reviews in
-
Mar 2nd, 2017
The FORCE of STIX & TAXII: Why STIX & TAXII are so Important to Financial Services Companies & EMEA
The Force of STIX & TAXII Use the force, Luke. If your cybersecurity team were given a common threat intelligence language and transport method that surrounded, penetrated, and bound you in an imp
-
Feb 27th, 2017
Measuring the Detection and Response Gap
Measuring the Detection and Response Gap Despite efforts to stockpile the best technology and assemble an army of defenders, today’s security organizations struggle with inefficiencies. Threat a
-
Feb 16th, 2017
Research One: A ThreatConnect Story
Research One: A ThreatConnect Story We’re excited to announce the availability of our newest product: TC Identify™, a threat-driven, context-enriched intelligence source provided through, and