Posts
-
Feb 16th, 2017
Research One: A ThreatConnect Story
Research One: A ThreatConnect Story We’re excited to announce the availability of our newest product: TC Identify™, a threat-driven, context-enriched intelligence source provided through, and
-
Jan 25th, 2017
Stepping to Fancy Bear
Stepping to FANCY BEAR (or how to efficiently validate and enrich a jumbled list of indicators) Over the last few weeks the U.S. government released two reports on Russian hacking and influence operat
-
Dec 21st, 2016
Do You Make Swords, or Do You Wield Them?
Classifying Analysts: Intelligence Producers and Intelligence Consumers The disciplines of swordsmith and swordsman have been intrinsically linked since the dawn of war. The swordsmith who crafted t
-
Dec 13th, 2016
Hacktivists vs Faketivists: Fancy Bears in Disguise
What is a faketivist? One of the more surprising stories of 2016 was the Russian effort to shape the outcome of the U.S. presidential election. What surprised us most at ThreatConnect was not Russian
-
Nov 22nd, 2016
How Companies Use ThreatConnect to Make Their Cybersecurity Programs More Efficient: A Use Case
Make Your Cybersecurity Program More Efficient Using ThreatConnect This is the second in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’re sharing st
-
Nov 2nd, 2016
Step 1: Collect and Correlate Relevant Threat Data
How to Aggregate Relevant Threat Data Is your cybersecurity team small? Or, are you looking to make your team more efficient? It can be difficult to know where to start when you have limited resource
-
Oct 25th, 2016
What is a Cyber Threat? How to Explain Cyber Threats to Your CEO
How to explain cyber threats to your CEO and others. Learn more about the potential for risk. What is a cyber threat? To explain what a cyber threat is to your CEO, you have to remember what your CEO
-
Sep 2nd, 2016
Can a BEAR Fit Down a Rabbit Hole?
Can a BEAR Fit Down a Rabbit Hole? ThreatConnect Identifies Infrastructure Nexus Between Attacks Against State Election Boards and Spearphishing Campaign Against Turkish, Ukrainian Governments The qu
-
Jul 29th, 2016
FANCY BEAR Has an (IT) Itch that They Can’t Scratch
*This post can also be found on the Fidelis blog, ThreatGeek.* FANCY BEAR Has an (IT) Itch that They Can’t Scratch ThreatConnect and Fidelis team up to explore the Democrati
-
Jul 26th, 2016
Guccifer 2.0: All Roads Lead to Russia
Guccifer 2.0: All Roads Lead to Russia Update 07/26/2016 4:00pm EDT Joe Uchill with The Hill, who has previously covered Guccifer 2.0 and the Wikileaks DNC data dump, has provided us with redacted i
-
Jul 20th, 2016
Guccifer 2.0: the Man, the Myth, the Legend?
Guccifer 2.0: the Man, the Myth, the Legend? ThreatConnect reassesses Guccifer 2.0’s claims in light of his recent public statements Read the full series of ThreatConnect posts following the DNC
-
Jun 29th, 2016
Shiny Object? Guccifer 2.0 and the DNC Breach
The Shiйy ФbjЭkt? ThreatConnect challenges Guccifer 2.0’s claimed attribution for the Democratic National Committee (DNC) breach Read the full series of ThreatConnect posts following the DNC