Skip to main content
Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management
Learn More
Request a Demo
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 633 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

What’s in a Name Server?
ThreatConnect Platform

What’s in a Name Server?

What’s in a Name… Server? That which we call an APT. By any other name would smell as foul. Read the full series of ThreatConnect posts following the DNC Breach: “Rebooting Watergate: Tapping into the Democratic National Committee“, “Shiny Object? Guccifer 2.0 and the DNC Breach“, “What’s in a Name Server?“, “Guccifer 2.0: the Man, the […]

Threat Research

Shiny Object? Guccifer 2.0 and the DNC Breach

The Shiйy ФbjЭkt? ThreatConnect challenges Guccifer 2.0’s claimed attribution for the Democratic National Committee (DNC) breach Read the full series of ThreatConnect posts following the DNC Breach: “Rebooting Watergate: Tapping into the Democratic National Committee“, “Shiny Object? Guccifer 2.0 and the DNC Breach“, “What’s in a Name Server?“, “Guccifer 2.0: the Man, the Myth, the Legend?“, […]

Threat Research

Rebooting Watergate: Tapping into the Democratic National Committee

Fancy Bears and Where to Find Them ThreatConnect uses the Crowdstrike blog article as a basis for conducting further research into the DNC breach and identifies additional infrastructure. On June 15, 2016 our partner, Crowdstrike, published a blog article detailing the breach of the Democratic National Committee (DNC) by two Russia-based threat groups, one of […]

Threat Intelligence Platform Threat Research

The Best Threat Intelligence Feeds

“What are the best, most important threat intelligence feeds that I should integrate into my security operations?“ What Feeds Me, Destroys Me Seriously, every time I get this question a little part of me dies. My left eye begins to twitch. This wave of heat rises up from my belly, and I feel it in […]

Uncategorized

May the Fourth be with you: A Star Wars InfoSec Bibliography

Collecting and connecting things is a big part of what we do here at ThreatConnect. We aggregate disparate sources of threat data/intel so it’s within easy reach when you need it. We integrate a bunch of tools and techs via our platform so all that aggregated intel can be put to good use throughout your […]

ThreatConnect Platform

Threat Intelligence and the Downfall of the Galactic Empire

Threat Intelligence and the Downfall of the Galactic Empire ThreatConnect 4.2 Reduces Fragmentation in Your Security Organization As is always the case, Star Wars metaphors can teach us a lot about infosec. I’d like to highlight some of the new features in ThreatConnect 4.2 by summing up the geopolitical situation during and immediately after Return […]

ThreatConnect Platform

64 bit Quarian APT Malware

We have developed TIPpers, which are incidents the ThreatConnect Research team flags for your awareness, so your organization can take decisive action. TIPper: 64-bit Quarian APT Malware Details a low detection 64-bit malware DLL, which matches strings and configuration used in Quarian, a Chinese Advanced Persistent Threat (APT), malware. That malware connects to infrastructure previously […]

Threat Research

Intel’s in the way that you use it, Snoke don’t you know

It’s in the way that you fuse it Intel comes and it goes It’s in the way that you use it Snoke don’t you know                        – Eric Clapton (modified) When I decided to join a cybersecurity startup, I had no idea fashion designer would […]

ThreatConnect Platform

Sending Aspiring Jedi Knights to Dagobah System

ThreatConnect builds academic partnerships to train the next generation of threat intelligence analysts In The Empire Strikes Back, Luke Skywalker heads to the remote Dagobah system to undergo Jedi training. And like the swamp-covered planet, sometimes the threat intelligence landscape can seem “bog-like”. How do I turn this pile of…data into actionable intelligence? Now, the […]

Threat Research

5 Ways TIPs Can Enhance Your SIEM

The SIEM is the Pan, the TIP is the Kitchen, Or: 5 Ways TIPs Can Enhance Your SIEM New infosec tools are popping up as fast as one would expect given the explosive growth of the market. Many of these tools are important weapons in your security arsenal: but how do you make sense of […]

ThreatConnect Platform

ROI for Threat Intelligence

ThreatConnect 4.1 Incorporates Return on Investment for Threat Intelligence If you have not seen it, Wade Baker, ThreatConnect’s VP Strategy and Risk Analytics, wrote a series of blog posts with the great folks at the RSA Conference discussing the evolution of InfoSec by looking at their conference topics over the past 25 years. One thing […]

ThreatConnect Platform

Threat Intelligence Processes are a Journey; Not a Destination

Several SANS CTI ago I presented on the ROI of Threat Intelligence Sharing and wrote a complementary blog where I highlighted a few scenarios where resource constrained organizations could actually save time and money in the acquisition and processing (analysis) of Threat Intelligence through the simple act of sharing. While that notion is still valid […]

Browse More Resources