Adversary Intelligence: Getting Behind the Keyboard
Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Industry pundits will debate attribution with a...
View ArticleLuke in the Sky with Diamonds
Applying the Diamond Model for Threat Intelligence to the Star Wars’ Battle of Yavin Alternate titles: “Diamonds are a Sith’s best friend” “I used to Bullseye Womp Rats in my t-shirt back home.” “I’m...
View ArticleWhy Build Apps in ThreatConnect
Why Build Apps and Share them in ThreatConnect’s TC Exchange – Collaborate to Strengthen Your Threat Intelligence Practice If you’ve spoken with anyone here at ThreatConnect, you may have noticed that...
View ArticleProject CAMERASHY: Closing the Aperture on China’s Unit 78020
ThreatConnect® and Defense Group Inc. (DGI) have collaborated to share threat intelligence pertaining to the Advanced Persistent Threat (APT) group commonly known as “Naikon” within the information...
View ArticleCamerashy on You Crazy Diamond
Yesterday ThreatConnect and DGI released a report titled CameraShy, which investigates Chinese cyber espionage activity against nations in the South China Sea. The report combines a very data-driven...
View ArticleHunting Adversaries w/ Diamond Dashboard for Splunk
Action – the other half of the battle As a kid, G.I. Joe ranked somewhere below Star Wars, Legos, and Transformers for me in terms of toy box volume and hours of entertainment. Maybe a little above...
View Article
More Pages to Explore .....