Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 633 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Orchestration and Automation ThreatConnect Platform

Improving Team Retention with SOAR

ThreatConnect’s intelligence driven Security, Orchestration, Automation & Response (SOAR) Platform can help organizations address the issues of training and retention. It acts as a process management system to enable faster, more effective, and lower cost on-boarding because best practices and optimized workflows are incorporated and structured to make it easier for new as well as […]

Incident Response Security Operations

ThreatConnect and Shodan: Enrich threat data to enhance decision making

ThreatConnect and Shodan have partnered to deliver the Shodan Playbook App. This app allows you to retrieve multiple types of enrichment information for IOCs. Additionally,  it allows you to craft custom Shodan searches to retrieve result sets based on factors such as software versions being run, services running, open ports, and more. You can even […]

ThreatConnect Platform

Black Hat 2020 Sessions Not to be Missed!

It’s that time again – yep, August. And you know what that means: Black Hat! Vegas! Swag. Great speakers. Putting your Fitbit to WORK in the Mandalay Bay! Oh, and the heat. Oh…wait, it is 2020… This year, Black Hat 2020 is virtual. Still great speakers. Still great sessions. Still booths to “stop by”. Still […]

Threat Research

Research Roundup: Mustang Panda and Fancy Bear

Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]

ThreatConnect Platform

Prioritize and Mitigate Threats More Efficiently with ThreatConnect and DomainTools

ThreatConnect® and DomainTools®, have officially partnered to deliver the DomainTools Iris Investigate Playbook App. By combining the data enrichment and domain monitoring power of DomainTools Iris Investigate with the automation capabilities of ThreatConnect Playbooks, you can now prioritize and mitigate threats more efficiently. DomainTools Iris Investigate Playbook App We’ve identified several use cases that this […]

Watch Our SE Take the Polarity Challenge
Polarity

Watch Our SE Take the Polarity Challenge

Watch one of our SEs take the Polarity Challenge, showing how quickly he can research indicators using Polarity’s Augmented Reality for security data.

Threat Research

Research Roundup: Mustang Panda PlugX Variant Samples and Decryption Script

Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]

Polarity Use Case: CVE Analysis
Polarity

Polarity Use Case: CVE Analysis

Today’s post continues an ongoing series on Polarity Use Cases. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed. No glasses or goggles required, Polarity is software that […]

ThreatConnect Platform

ThreatConnect and VMRay: Better Malware Analysis

ThreatConnect and VMRay have improved our existing integration with VMRay Analyzer. This Playbook App will allow you to send malware to a sandbox to be further examined and results retrieved with VMRay Analyzer.  Leveraging this App, you will be able to perform Phishing Email Triage, Endpoint Investigation, or Malware Hunting. This all leads to more […]

Threat Research

ThreatConnect Research Roundup: Twitter Hacked and APT29 Targets COVID-19 Vaccine

Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]

Rapidly Triage Network Detection & Response with the Polarity-Gigamon Integration
Polarity

Rapidly Triage Network Detection & Response with the Polarity-Gigamon Integration

Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you use every day, no glasses or goggles required. With over 100 powerful integrations, Polarity’s open-source Integrations Library arms you with the right data at the right time […]

Security Operations

ThreatConnect’s Security Operations Maturity Model

ThreatConnect is out to change the way security works with cybersecurity software that reduces complexity for everyone, makes decision making easy and unifies processes and technology to constantly improve defenses and drive down risk. It’s why we’ve evolved from our heritage as a leading Threat Intelligence Platform (TIP) to deliver a full suite of intelligence-driven […]

Browse More Resources