Posts
-
Sep 2nd, 2016
Can a BEAR Fit Down a Rabbit Hole?
Can a BEAR Fit Down a Rabbit Hole? ThreatConnect Identifies Infrastructure Nexus Between Attacks Against State Election Boards and Spearphishing Campaign Against Turkish, Ukrainian Governments The qu
-
Aug 12th, 2016
Does a BEAR Leak in the Woods?
Identifies DCLeaks As Another Russian-backed Influence Outlet Read the full series of ThreatConnect posts following the DNC Breach: “Rebooting Watergate: Tapping into the Democratic National Co
-
Jul 29th, 2016
FANCY BEAR Has an (IT) Itch that They Can’t Scratch
*This post can also be found on the Fidelis blog, ThreatGeek.* FANCY BEAR Has an (IT) Itch that They Can’t Scratch ThreatConnect and Fidelis team up to explore the Democrati
-
Jul 26th, 2016
Guccifer 2.0: All Roads Lead to Russia
Guccifer 2.0: All Roads Lead to Russia Update 07/26/2016 4:00pm EDT Joe Uchill with The Hill, who has previously covered Guccifer 2.0 and the Wikileaks DNC data dump, has provided us with redacted i
-
Jul 20th, 2016
Guccifer 2.0: the Man, the Myth, the Legend?
Guccifer 2.0: the Man, the Myth, the Legend? ThreatConnect reassesses Guccifer 2.0’s claims in light of his recent public statements Read the full series of ThreatConnect posts following the DNC
-
Jul 7th, 2016
What’s in a Name Server?
What’s in a Name… Server? That which we call an APT. By any other name would smell as foul. Read the full series of ThreatConnect posts following the DNC Breach: “Rebooting Watergat
-
Jun 29th, 2016
Shiny Object? Guccifer 2.0 and the DNC Breach
The Shiйy ФbjЭkt? ThreatConnect challenges Guccifer 2.0’s claimed attribution for the Democratic National Committee (DNC) breach Read the full series of ThreatConnect posts following the DNC
-
Jun 17th, 2016
Rebooting Watergate: Tapping into the Democratic National Committee
Fancy Bears and Where to Find Them ThreatConnect uses the Crowdstrike blog article as a basis for conducting further research into the DNC breach and identifies additional infrastructure. On June 15,
-
May 16th, 2016
The Best Threat Intelligence Feeds
“What are the best, most important threat intelligence feeds that I should integrate into my security operations?“ What Feeds Me, Destroys Me Seriously, every time I get this question a li
-
May 4th, 2016
May the Fourth be with you: A Star Wars InfoSec Bibliography
Collecting and connecting things is a big part of what we do here at ThreatConnect. We aggregate disparate sources of threat data/intel so it’s within easy reach when you need it. We integrate a bun
-
Apr 28th, 2016
Threat Intelligence and the Downfall of the Galactic Empire
Threat Intelligence and the Downfall of the Galactic Empire ThreatConnect 4.2 Reduces Fragmentation in Your Security Organization As is always the case, Star Wars metaphors can teach us a lot about in
-
Apr 12th, 2016
64 bit Quarian APT Malware
We have developed TIPpers, which are incidents the ThreatConnect Research team flags for your awareness, so your organization can take decisive action. TIPper: 64-bit Quarian APT Malware Details a low