Search results for:
-
Oct 25th, 2017
DNC Association Does Not Compute
Joining the cyber community to conduct independent analysis of the DNC Hack Recently, an article purported that the Democratic National Committee (DNC) turned down requests from FBI forensic units to
-
Oct 24th, 2017
Why orchestration and threat intelligence are a perfect match
On October 17, 2017 betanews published the article Why orchestration and threat intelligence are a perfect match, written by Andy Pendergast, VP of Product at ThreatConnect. The article examines how t
-
Oct 20th, 2017
Playbook Fridays: Taking Screenshots with a Playbook
Playbook Fridays: Screenshot Capture Playbook ThreatConnect developed the Playbooks capability to help analysts automate time consuming and repetitive tasks so they can focus on what is most important
-
Oct 13th, 2017
Playbook Fridays: How to Control the Cloud with Playbooks
Playbook Fridays: How To Control The Cloud With Playbooks Interacting with SNS from ThreatConnect Playbooks ThreatConnect developed the Playbooks capability to help analysts automate time consuming an
-
Oct 12th, 2017
IPinfo
IPinfo prides itself on being the most reliable, accurate, and in-depth source of IP address data available anywhere. We process terabytes of data to produce our custom IP geolocation, company, carrie
-
Oct 9th, 2017
ARIN
American Registry for Internet Numbers (ARIN) is responsible for the management and distribution of Internet number resources such as Internet Protocol (IP) addresses and Autonomous System Numbers (AS
-
Sep 28th, 2017
MISP
A threat intelligence platform for sharing, storing and correlating Indicators of Compromise of targeted attacks, threat intelligence, financial fraud information, vulnerability information or even co
-
Sep 21st, 2017
Track to the Future
How to use historical intelligence to get back to the future and defend your organization We need to talk about something. In the history of this blog, we’ve never discussed Back to the Future.
-
Sep 19th, 2017
ThreatConnect Makes Order Out of Threat Feed Chaos
On September 11th, 2017 CSO Online published the article, “ThreatConnect Makes Order Out of Threat Feed Chaos,” written by John Breeden II, Chief Executive Officer, Tech Writers Bureau. Th
-
Sep 18th, 2017
Casting a Light on BlackEnergy
A look into BlackEnergy malware and using ThreatConnect to aggregate and memorialize the identified intelligence. As workers prepared to head home on December 23, 2015, an attack against Ukraine’
-
Sep 8th, 2017
Playbook Fridays: How to Build a Playbook in ThreatConnect
This week: Palo Alto Wildfire Malware Triage Playbook ThreatConnect is beginning a NEW blog post series. We will continually publish posts featuring Playbooks that can be built in the Platform. Threat
-
Aug 30th, 2017
ThreatConnect Training: Save Time and Act Faster with Playbooks
Automate almost any cybersecurity process – no coding needed Ingesting threat data, malware analysis, and data enrichment can all be time consuming tasks. To learn how to automate these things (