Search results for:
-
Nov 2nd, 2020
ThreatConnect and McAfee DXL: Better Integrations with the McAfee Stack
ThreatConnect has partnered with security giant McAfee and released multiple Playbook Apps and one App Service for McAfee DXL. McAfee DXL is a communication fabric and it allows us to easily connect w
-
Oct 30th, 2020
APIVoid
APIVoid provides JSON API services used for cyber threat analysis, threat detection and threat prevention, reducing and automating the manual work of security analysts. Our portfolio of threat analysi
-
Oct 30th, 2020
Who’s Next: A look at CAL 2.6’s latest additions
We’re proud to announce the release of CAL 2.6, our latest addition to our Collective Analytic Layer’s featureset. As the latest in our ongoing quest to find the most interesting intelligence an
-
Oct 26th, 2020
ThreatConnect Research Roundup: Ryuk and Domains Spoofing ESET and Microsoft
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Oct 23rd, 2020
Sumo Logic
Sumo Logic is a pioneer of continuous intelligence, a new category of software, which enables organizations of all sizes to address the data challenges and opportunities presented by digital transform
-
Oct 23rd, 2020
SOC Series: Share with Your Friends in IR
Today’s post continues an ongoing series on Polarity Security Operations Center (SOC) use cases; demonstrating how Polarity helps you to see the story in your data without sacrificing thoroughness o
-
Oct 22nd, 2020
SOC Series: Get More from SOAR
Today’s post continues an ongoing series on Polarity Security Operations Center (SOC) use cases, demonstrating how Polarity helps you to see the story in your data without sacrificing thoroughness o
-
Oct 16th, 2020
ThreatConnect Research Roundup: Possible Ryuk Infrastructure
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Oct 14th, 2020
Caught in our Net
Using neural networks to identify algorithmically generated domains (AGDs) The problem with today’s generation A while back, we released a new CAL Feed that leveraged our ability to detect domains t
-
Oct 13th, 2020
ThreatConnect and Check Point: Better Endpoint Protection
ThreatConnect has partnered with Check Point and built a Playbook App for our joint customers to leverage. With the addition of this new Playbook App, immediate actions can be taken to investigate, st
-
Oct 9th, 2020
How to Use Workflow to do Phishing Analysis Part 1 – Defining the Process
Workflow Refresher Earlier this year, in ThreatConnect 6.0, we released a new feature called Workflow. This capability enables users to define and memorialize processes for teams across the security o
-
Oct 2nd, 2020
Research Roundup: Kimsuky Phishing Operations Putting in Work
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind