Posts
-
Jun 17th, 2016
Rebooting Watergate: Tapping into the Democratic National Committee
Fancy Bears and Where to Find Them ThreatConnect uses the Crowdstrike blog article as a basis for conducting further research into the DNC breach and identifies additional infrastructure. On June 15,
-
May 16th, 2016
The Best Threat Intelligence Feeds
“What are the best, most important threat intelligence feeds that I should integrate into my security operations?“ What Feeds Me, Destroys Me Seriously, every time I get this question a li
-
Mar 31st, 2016
Intel’s in the way that you use it, Snoke don’t you know
It’s in the way that you fuse it Intel comes and it goes It’s in the way that you use it Snoke don’t you know – Eric Clapton (modified) When I decided to
-
Mar 15th, 2016
5 Ways TIPs Can Enhance Your SIEM
The SIEM is the Pan, the TIP is the Kitchen, Or: 5 Ways TIPs Can Enhance Your SIEM New infosec tools are popping up as fast as one would expect given the explosive growth of the market. Many of these
-
Dec 15th, 2015
Threat Intelligence in 3rd Party Risk Assessment
We’ve finally arrived at the fourth and final installment in this series exploring the relationship between threat intelligence and risk management. If you’re just joining us, previous posts are l
-
Oct 16th, 2015
Threat Intelligence-Driven Risk Analysis
Way, way too long ago, we started a series exploring the relationship between threat intelligence and risk management. I’m not sure if a 3+ month gap disqualifies it as a series, but I’ll
-
Sep 18th, 2015
5 Tips For Effective Threat Intelligence
5 Tips For Effective Threat Intelligence See the FULL story 1. Develop a strategy. 2. Choose your threat intelligence platform. 3. Find and hire the right people. (It’s not easy.) 4. Automa
-
Aug 27th, 2015
What’s in a Platform?
The following post will examine the need for organizations to use a Platform to meet the organization’s ever changing security requirements. Unfortunately, the term Platform is an overused ter
-
Jun 20th, 2015
China Hacks the Peace Palace: All Your EEZ’s Are Belong to Us
Executive Summary In early July 2015, Chinese APT actors used an Adobe Flash Player exploit within a specific webpage detailing a noteworthy international legal case between the Philippines and China.
-
Jun 9th, 2015
OPM Breach Analysis: Update
As highlighted in our recent webinar with Rick Holland, when there is a security event of great magnitude, organizational leadership will want to know as much as possible about the technical WHAT and
-
Jun 5th, 2015
OPM Breach Analysis
Back in February 2015, the ThreatConnect team conducted in-depth independent analysis of the Anthem breach, finding connections to amorphous Chinese APT activity. Although our primary concern at the t
-
Jun 1st, 2015
Adversary Intelligence: Getting Behind the Keyboard
Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Industry pundits will debate attribution with a rel