David GDon’t F*** with ThreatPipesA handful of ThreatPipes modules you can use for OSINT investigationsDec 31, 2019Dec 31, 2019
Julian CohenAdversary-Based Threat ModelingMost threat models start with attack surface or critical assets. Those threat models are useless and lead to bad decision-making. In this…Dec 24, 20193Dec 24, 20193
David GHow a missed delivery ruined ChristmasYour DHL package needs collecting from the depotDec 24, 2019Dec 24, 2019
CyCraft Technology CorpMITRE ATT&CK Mondays: WMI (T1047)MITRE ATT&CK Mondays is an ongoing series of weekly articles on adversary tactics and techniques listed on the MITRE ATT&CK framework. We…Dec 20, 2019Dec 20, 2019
Claire ZhouinDataVisorUrgent: Threat Protection Needed NowProactive threat detection is the key to business success in the new decade.Dec 18, 2019Dec 18, 2019
CyberprotectA World of Honeypots — Part.2Explore Cyberprotect Honeypots InfrastructureDec 17, 2019Dec 17, 2019
Rakesh KrishnaninInfoSec Write-upsCryptoBay.cz Analysis: A Bunch of other Fraudulent Services hosted on a Single IP Address RevealedAs a part of my daily TOR surfing, I stumbled upon a post in Dread titled “Cryptobay.cz”. By the title, I figured out that it is a new…Dec 14, 2019Dec 14, 2019
Krysla AndreaThreat Modeling: Building reliable software by breaking it.Threat modeling is the process by which engineers are able to represent in a structured way all the possible threats that could affect theDec 14, 2019Dec 14, 2019
RootstackThreat Modeling: Building reliable software by breaking it.Threat modeling is the process by which engineers are able to represent in a structured way all the possible threats that could affect theDec 14, 2019Dec 14, 2019
Frank SimserHuman Psychology and the Challenge of Framing Threat Intelligence as a Business EnablerAs the awareness of, and involvement in, information security at the board level has quickly risen, the efforts to re-frame robust…Dec 12, 2019Dec 12, 2019