Scott Bolen | RONIN OWL CTIThe Business Impact of Cyber Threat IntelligenceTo safeguard their assets and reputation, organizations need proactive cybersecurity measures. This is where cyber threat intelligence…4h ago
Ondra RojčíkWhy a Non-Technical Background Does Not Prevent You from Succeeding in Cyber Threat IntelligenceIntrusions, cyber attacks and adversarial operations are often seen as technical events best described by the deployed malware, leveraged…May 273
deepwebdigger22.07.2024 was formed a new hacktivist group — Holy LeagueThey has declared cyber “war” on Spain following the arrest on 20.07.2024 Saturday of three DDoSia members. This coalition includes over…18h ago18h ago
Lex CrumptoninMITRE-EngenuityTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 31May 31
Scott Bolen | RONIN OWL CTIThe Business Impact of Cyber Threat IntelligenceTo safeguard their assets and reputation, organizations need proactive cybersecurity measures. This is where cyber threat intelligence…4h ago
Ondra RojčíkWhy a Non-Technical Background Does Not Prevent You from Succeeding in Cyber Threat IntelligenceIntrusions, cyber attacks and adversarial operations are often seen as technical events best described by the deployed malware, leveraged…May 273
deepwebdigger22.07.2024 was formed a new hacktivist group — Holy LeagueThey has declared cyber “war” on Spain following the arrest on 20.07.2024 Saturday of three DDoSia members. This coalition includes over…18h ago
Lex CrumptoninMITRE-EngenuityTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 31
Baris DincerForensic Investigation Operations — Complex Linux Forensics AnalysisThis time our mission is a bit complex and we have a lot of details to focus on. We will uncover and collect evidence of the details of…Jul 21
Thomas RocciainSecurityBreak6 Useful Infographics for Threat IntelligenceVisualizing Cybersecurity concepts can be a terrific way to learn more about specific tools, methodologies, and techniques! Here is a post…Dec 18, 20228