-
Oct 30th, 2020
Who’s Next: A look at CAL 2.6’s latest additions
We’re proud to announce the release of CAL 2.6, our latest addition to our Collective Analytic Layer’s featureset. As the latest in our ongoing quest to find the most interesting intelligence an
-
Oct 16th, 2020
ThreatConnect Research Roundup: Possible Ryuk Infrastructure
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Oct 14th, 2020
Caught in our Net
Using neural networks to identify algorithmically generated domains (AGDs) The problem with today’s generation A while back, we released a new CAL Feed that leveraged our ability to detect domains t
-
Oct 13th, 2020
ThreatConnect and Check Point: Better Endpoint Protection
ThreatConnect has partnered with Check Point and built a Playbook App for our joint customers to leverage. With the addition of this new Playbook App, immediate actions can be taken to investigate, st
-
Oct 9th, 2020
How to Use Workflow to do Phishing Analysis Part 1 – Defining the Process
Workflow Refresher Earlier this year, in ThreatConnect 6.0, we released a new feature called Workflow. This capability enables users to define and memorialize processes for teams across the security o
-
Sep 23rd, 2020
ThreatConnect and Sigma Signatures: Increase Detection Capabilities
ThreatConnect now supports Sigma Signatures! As a quick refresher, Sigma is a generic and open signature format for SIEM systems. It allows you to describe relevant log events straightforwardly. The r
-
Sep 18th, 2020
Research Roundup: Microsoft Strontium Sinkhole Domain Sibling
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Sep 11th, 2020
Research Roundup: Activity on Previously Identified APT33 Domains
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Sep 10th, 2020
ThreatConnect: The Brain of Security
Why Acquiring Nehemiah Security was the Right Decision Since its inception, ThreatConnect has used the analogy that it wants to be the “brain of security,” to act as its central nervous system pro
-
Sep 4th, 2020
ThreatConnect and MITRE ATT&CK: Supporting Sub-techniques
ThreatConnect has long supported the MITRE ATT&CK framework and, we are delighted to be among the first to support MITRE ATT&CK Sub-techniques. As a quick refresher, MITRE ATT&CK® is a gl
-
Aug 26th, 2020
SOAR: An Incident Responder’s Best Friend
Decrease Time to Response and Remediation with SOAR As an Incident Responder (IR), it doesn’t seem to matter how quickly you solve an issue nor if the case or ticket comes to you with no additional
-
Aug 17th, 2020
ThreatConnect and Microsoft Graph: Integrate Seamlessly with the Microsoft Stack
We’ve got big news! ThreatConnect now integrates with Microsoft Graph, allowing ThreatConnect customers to connect with nearly any piece of Microsoft technology. This integration acts as a communic