Quantcast
Channel: Adversary Intelligence – ThreatConnect | Intelligence-Driven Security Operations
Browsing latest articles
Browse All 18 View Live

Image may be NSFW.
Clik here to view.

Adversary Intelligence: Getting Behind the Keyboard

Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Industry pundits will debate attribution with a...

View Article



Image may be NSFW.
Clik here to view.

Luke in the Sky with Diamonds

Applying the Diamond Model for Threat Intelligence to the Star Wars’ Battle of Yavin Alternate titles: “Diamonds are a Sith’s best friend” “I used to Bullseye Womp Rats in my t-shirt back home.” “I’m...

View Article

Image may be NSFW.
Clik here to view.

Why Build Apps in ThreatConnect

Why Build Apps and Share them in ThreatConnect’s TC Exchange – Collaborate to Strengthen Your Threat Intelligence Practice If you’ve spoken with anyone here at ThreatConnect, you may have noticed that...

View Article

Image may be NSFW.
Clik here to view.

Project CAMERASHY: Closing the Aperture on China’s Unit 78020

ThreatConnect® and Defense Group Inc. (DGI) have collaborated to share threat intelligence pertaining to the Advanced Persistent Threat (APT) group commonly known as “Naikon” within the information...

View Article

Image may be NSFW.
Clik here to view.

Camerashy on You Crazy Diamond

Yesterday ThreatConnect and DGI released a report titled CameraShy, which investigates Chinese cyber espionage activity against nations in the South China Sea. The report combines a very data-driven...

View Article


Image may be NSFW.
Clik here to view.

Hunting Adversaries w/ Diamond Dashboard for Splunk

Action – the other half of the battle As a kid, G.I. Joe ranked somewhere below Star Wars, Legos, and Transformers for me in terms of toy box volume and hours of entertainment. Maybe a little above...

View Article
Browsing latest articles
Browse All 18 View Live




Latest Images