Skip to main content
Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management
Learn More
Request a Demo
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 510 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

ThreatConnect Platform

Creating Order from Chaos: Enabling (Even) Better Decision Making with ThreatConnect 6.0

For those that don’t know, I have 4 kids and a dog. The children are 9 and under. Fresno, my dog, is like 100 years old in “dog years.” My house is chaotic, to say the least. I remember being able to sit down at my desk in the morning with a cup of coffee […]

Expose Data Breaches with Actionable Intelligence using the Polarity-Cyber Risk Analytics Integration
Polarity

Expose Data Breaches with Actionable Intelligence using the Polarity-Cyber Risk Analytics Integration

Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already use in their workflow, arming them with even better data awareness and recall. This example showcases our integration with Cyber Risk Analytics. Data breaches are occurring within companies […]

ThreatConnect Platform

Playbook Fridays: Potential Zoom-related Threats Dashboard

This Dashboard was created to track potential Zoom-related intelligence and indicators as the news of it being vulnerable was widely publicized. With many of us working from home these days, and in general more people being at home – attackers know this and know they have a much larger number of Zoom users to exploit. […]

Threat Research

Turning Cobalt Into Diamonds: Building an Actor Profile For Hunting

Summary Hunting adversaries begins with understanding their behavior through data. In this blog post, we’ll use the Diamond Model as a vehicle to create an actor profile for the criminal group Cobalt Gang. We’ll start by reviewing what is known about the adversary, orienting ourselves to their typical operations, and extracting data from their identified […]

Collective Analytics Layer (CAL) ThreatConnect Platform

Now Available: CAL COVID19-themed Newly Registered Domains Feed

As the world is struggling to respond to the global COVID-19 pandemic, we want to make sure we’re doing our part. There are a number of ne’er-do-wells that are trying to take advantage of the situation by exploiting people in their time of need, and we applaud the industry for coming together to find ways […]

What Comes After Data-to-Everything?
Polarity

What Comes After Data-to-Everything?

A good hockey player skates to where the puck is. A great hockey player skates to where the puck is going to be. – Wayne Gretzky It might be cliche, but I’m an avid hockey player and coach. I’ve got as much of a right as anyone to quote the great one. I’ve spent the […]

How-to Guides

How to Build a Basic Workflow in ThreatConnect

From a Simple Notification Email to Threat-Bending Phishing Triage, This Is Your First Step ThreatConnect 6.0 introduces a brand new feature: Workflow. This capability lets you combine manual and automated operations to define consistent and standardized processes for your security teams: Malware analysis Phishing triage Alert triage Intel requirement development Escalation procedures Breach SOP And […]

Detect Phishing Attempts Instantaneously with the Polarity-EmailRep Integration
Polarity

Detect Phishing Attempts Instantaneously with the Polarity-EmailRep Integration

Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already use in their workflow, arming them with even better data awareness and recall. This example showcases our integration with EmailRep. Phishing campaigns are still one of the most […]

The Best Tools to Keep your Remote Security Team on the Same Page
Polarity

The Best Tools to Keep your Remote Security Team on the Same Page

Here at Polarity, we’re a remote-first team, meaning our culture and infrastructure is built around remote work – it’s part of our identity as an organization. If you’re now working from home for an organization that typically works in an office, you’ll find yourself less prepared for the “new normal” of remote life that we’re collectively […]

Threat Research

7 Tips for Working from Home

Many of us are stuck at working from home due to COVID-19. These are very surreal times. For some of you (us), being at home trying to work might be a whole new world. Well, we’re here to help navigate these uncharted waters. A lot of ThreatConnectors have worked remotely for years, so we went […]

Special Playbook Fridays: COVID-19 Dashboard, Metrics, and Search
ThreatConnect Platform

Special Playbook Fridays: COVID-19 Dashboard, Metrics, and Search

We’ve got options for how you can track activity related to Coronavirus / COVID-19 in the ThreatConnect Platform: 1. New System Dashboard – COVID-19 Related Activity The ThreatConnect Research Team has created the ‘COVID-19-Related Activity Dashboard’, which provides a single location to view consolidated, relevant intelligence from across various sources where threat actors are leveraging […]

Threat Research

Automation Anxiety? Don’t Worry.

More efficient processes. Better staff utilization. Increased documentation of processes. These are just a few of the benefits of automation, yet organizations may be slow to adopt automation technologies due to a fear of the unknown.  The thought of automating some of their most critical processes does initially cause anxiety for some, but if I […]

Browse More Resources