InSecurityBreakbyThomas RocciaBuilding a Threat Intelligence GenAI Reporter with ORKL and ClaudeUsing Model Context Protocol (MCP)Nov 272
InSecurityBreakbyThomas RocciaApplying LLMs to Threat IntelligenceA Practical Guide with Code ExamplesNov 3, 20234
InInfoSec Write-upsbySandeep SaxenaBuilding an Integrated Threat Intelligence Platform Using Python and KibanaAbstractNov 16Nov 16
InSecurityBreakbyThomas RocciaTime Series Analysis by Leveraging GPT-4o Vision for Threat IntelIn threat intelligence, you often have to work with timelines, data graphs, and more. As part of our training, Blue Team Arsenal Python and…May 281May 281
InSecurityBreakbyThomas RocciaBuilding a Threat Intelligence GenAI Reporter with ORKL and ClaudeUsing Model Context Protocol (MCP)Nov 272
InSecurityBreakbyThomas RocciaApplying LLMs to Threat IntelligenceA Practical Guide with Code ExamplesNov 3, 20234
InInfoSec Write-upsbySandeep SaxenaBuilding an Integrated Threat Intelligence Platform Using Python and KibanaAbstractNov 16
InSecurityBreakbyThomas RocciaTime Series Analysis by Leveraging GPT-4o Vision for Threat IntelIn threat intelligence, you often have to work with timelines, data graphs, and more. As part of our training, Blue Team Arsenal Python and…May 281
Iain Fraser CyberSecurity JournalistTHREAT INTEL: MANDIANT — found that attacker dwell time decreased in 2023Gibraltar: Thursday 27 June 2024 at 10:30 CETJun 27
Eduzor KamsiA walkthrough of CyberDefenders “GrabThePhisher — Threat intel” CTFGood day, my name is Eduzor Kamsi and today I'll walk you through the GrabThePhisher posted on CyberDefenders.Nov 26, 2022
Steve EmersonAn Analysis of the Israel-Palestine Conflict from a Cybersecurity Perspective, October 2023Summarizing our mega-thread on the Israel-Palestine Conflict in 2023.Nov 5, 2023