Posts
-
Feb 27th, 2015
The Anthem Hack: All Roads Lead to China
When news of the Anthem breach was reported on February 4th, 2015, the security industry quite understandably went wild. A breach of this magnitude was certainly unprecedented. Naturally, many indus
-
Feb 15th, 2015
ThreatConnect How To: Pivoting & Exporting Data
Introduction The Diamond Model of Intrusion Analysis is the analytic methodology upon which ThreatConnect is built. Developed by a number of preeminent security researchers and analysts (including o
-
Feb 2nd, 2015
ThreatConnect Community Success Story: The Rubber Meets the Road
Communities, sharing, and collaboration have hit the hype curve in cyber security circles. While the marketplace includes products that offer information exchange or are bolting on support for coll
-
Jan 29th, 2015
ThreatConnect How To: Importing Indicators
There are many advantages to having a centralized Threat Intelligence Platform (TIP) to aggregate, analyze and act on your own threat intelligence. Among them, is empowering the threat analyst to inte
-
Jan 12th, 2015
ThreatConnect Communities: A Swiss Army Knife in Your Collaboration Arsenal
ThreatConnect Communities have become the indispensable Swiss army knife in the analyst collaboration arsenal this past year. While our community blueprint has always included – a “Common Commun
-
Dec 21st, 2014
Operation Poisoned Helmand
In this day and age of interconnected cloud services and distributed content delivery networks (CDNs), it is important for both CDN service providers and security professionals alike to recognize and
-
Nov 20th, 2014
ThreatConnect Announces Investment from Grotech Ventures
Today, I’m proud to share that ThreatConnect has announced a $4 Million Series A investment led by Grotech Ventures and other strategic partners. You can read more about the specifics here. Grotech
-
Oct 6th, 2014
Debugging the Pakistan Cyber Army: From Pakbugs to Bitterbugs
For over a year, the ThreatConnect Research Team has been tracking Pakistan-based cyber espionage activity associated with a custom malware implant recently dubbed “BITTERBUG.” In August of 2013
-
Aug 5th, 2014
Operation Arachnophobia: The Spy-der Who Loved Me
The story of Operation Arachnophobia is not unlike a good spy novel; the characters aren’t who they appear to be, motives must always be questioned and the twists in the plot keep you guessing until
-
Jul 3rd, 2014
Getting Back to the Basics of Actionable Threat Intelligence
I remember it like it was yesterday, the first few hours of basic training. I stood there cooking in the South Carolina humidity with a very loud and short man, named Drill Sergeant Doll screaming a f
-
Jun 27th, 2014
Getting the Most out of Crowdsourcing Threat Intelligence
Earlier this week, we saw an article by Robert Ackerman Jr. on Dark Reading about crowdsourced threat intelligence and cyber security. Of course we were excited to see more discussion on threat intell
-
Jun 19th, 2014
How To Streamline Threat Intel Sharing Before Lunch
We saw recently that GCHQ is poised to create a threat intelligence sharing community between public and private organizations in the UK. We applaud this effort and hope that more organizations follow