Search results for:
-
Oct 16th, 2020
ThreatConnect Research Roundup: Possible Ryuk Infrastructure
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Oct 15th, 2020
Archer
Archer is a platform that provides a common framework for managing risk and compliance in the context of a business, which is necessary for governance, risk, and compliance (GRC) programs to succeed i
-
Oct 14th, 2020
Caught in our Net
Using neural networks to identify algorithmically generated domains (AGDs) The problem with today’s generation A while back, we released a new CAL Feed that leveraged our ability to detect domains t
-
Oct 13th, 2020
ThreatConnect and Check Point: Better Endpoint Protection
ThreatConnect has partnered with Check Point and built a Playbook App for our joint customers to leverage. With the addition of this new Playbook App, immediate actions can be taken to investigate, st
-
Oct 9th, 2020
How to Use Workflow to do Phishing Analysis Part 1 – Defining the Process
Workflow Refresher Earlier this year, in ThreatConnect 6.0, we released a new feature called Workflow. This capability enables users to define and memorialize processes for teams across the security o
-
Oct 7th, 2020
JIRA
Jira Software is part of a family of products designed to help teams of all types manage work. Originally, Jira was designed as a bug and issue tracker. But today, Jira has evolved into a powerful wor
-
Oct 2nd, 2020
Research Roundup: Kimsuky Phishing Operations Putting in Work
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Oct 1st, 2020
SOC Series: Flawless Handoffs During Shift Change
Today’s post continues an ongoing series on Polarity Security Operations Center (SOC) use cases; demonstrating how Polarity augments analysts to deliver superhuman recall and contextual awareness. W
-
Sep 29th, 2020
Get Context from MISP Warning Lists as You Work Using the Polarity Integration
Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you us
-
Sep 29th, 2020
Integrations Aren’t Just for Developers
Introduction Security Orchestration, Automation and Response (SOAR) platforms gain a lot of strength from the technologies they have in place to enable integrations and the quality of those integratio
-
Sep 28th, 2020
Kimsuky Phishing Operations Putting In Work
Executive Summary Recently, an international NGO that provides threat sharing and analysis support to frequently targeted communities reached out to ThreatConnect wanting to learn more about the origi
-
Sep 25th, 2020
Research Roundup: APT39 Adversaries
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind