Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
Creating Order from Chaos: Enabling (Even) Better Decision Making with ThreatConnect 6.0
For those that don’t know, I have 4 kids and a dog. The children are 9 and under. Fresno, my dog, is like 100 years old in “dog years.” My house is chaotic, to say the least. I remember being able to sit down at my desk in the morning with a cup of coffee […]
Expose Data Breaches with Actionable Intelligence using the Polarity-Cyber Risk Analytics Integration
Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already use in their workflow, arming them with even better data awareness and recall. This example showcases our integration with Cyber Risk Analytics. Data breaches are occurring within companies […]
Playbook Fridays: Potential Zoom-related Threats Dashboard
This Dashboard was created to track potential Zoom-related intelligence and indicators as the news of it being vulnerable was widely publicized. With many of us working from home these days, and in general more people being at home – attackers know this and know they have a much larger number of Zoom users to exploit. […]
Turning Cobalt Into Diamonds: Building an Actor Profile For Hunting
Summary Hunting adversaries begins with understanding their behavior through data. In this blog post, we’ll use the Diamond Model as a vehicle to create an actor profile for the criminal group Cobalt Gang. We’ll start by reviewing what is known about the adversary, orienting ourselves to their typical operations, and extracting data from their identified […]
Now Available: CAL COVID19-themed Newly Registered Domains Feed
As the world is struggling to respond to the global COVID-19 pandemic, we want to make sure we’re doing our part. There are a number of ne’er-do-wells that are trying to take advantage of the situation by exploiting people in their time of need, and we applaud the industry for coming together to find ways […]
What Comes After Data-to-Everything?
A good hockey player skates to where the puck is. A great hockey player skates to where the puck is going to be. – Wayne Gretzky It might be cliche, but I’m an avid hockey player and coach. I’ve got as much of a right as anyone to quote the great one. I’ve spent the […]
How to Build a Basic Workflow in ThreatConnect
From a Simple Notification Email to Threat-Bending Phishing Triage, This Is Your First Step ThreatConnect 6.0 introduces a brand new feature: Workflow. This capability lets you combine manual and automated operations to define consistent and standardized processes for your security teams: Malware analysis Phishing triage Alert triage Intel requirement development Escalation procedures Breach SOP And […]
Detect Phishing Attempts Instantaneously with the Polarity-EmailRep Integration
Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already use in their workflow, arming them with even better data awareness and recall. This example showcases our integration with EmailRep. Phishing campaigns are still one of the most […]
The Best Tools to Keep your Remote Security Team on the Same Page
Here at Polarity, we’re a remote-first team, meaning our culture and infrastructure is built around remote work – it’s part of our identity as an organization. If you’re now working from home for an organization that typically works in an office, you’ll find yourself less prepared for the “new normal” of remote life that we’re collectively […]
7 Tips for Working from Home
Many of us are stuck at working from home due to COVID-19. These are very surreal times. For some of you (us), being at home trying to work might be a whole new world. Well, we’re here to help navigate these uncharted waters. A lot of ThreatConnectors have worked remotely for years, so we went […]
Special Playbook Fridays: COVID-19 Dashboard, Metrics, and Search
We’ve got options for how you can track activity related to Coronavirus / COVID-19 in the ThreatConnect Platform: 1. New System Dashboard – COVID-19 Related Activity The ThreatConnect Research Team has created the ‘COVID-19-Related Activity Dashboard’, which provides a single location to view consolidated, relevant intelligence from across various sources where threat actors are leveraging […]
Automation Anxiety? Don’t Worry.
More efficient processes. Better staff utilization. Increased documentation of processes. These are just a few of the benefits of automation, yet organizations may be slow to adopt automation technologies due to a fear of the unknown. The thought of automating some of their most critical processes does initially cause anxiety for some, but if I […]