Published inInfoSec Write-upsThe ATT&CK Navigator: A Powerful Tool for Visualizing Cyber AttacksUnlock the power of the ATT&CK Navigator and learn to visualize and map attack techniques through a user-friendly interface.5d ago5d ago
Published inInfoSec Write-upsATT&CK Powered Suit: Streamline Your Research and Save TimeThere is a new way to unlock the awesome power of MITRE ATT&CK…, and it’s in your web browser. Let me introduce you to the ATT&CK Powered…Nov 81Nov 81
Collection Management Framework Template (+FREE Download)This collection management framework template provides you with the structure to effectively document and use your CTI data sources.Oct 23Oct 23
Intelligence Requirements Template (PDF + Word Doc Download)This intelligence requirements template allows you to document your company’s requirements and kickstart your CTI program.Sep 9Sep 9
Cyber Threat Intelligence Report Template (+FREE Download)A cyber threat intelligence report template saves you and your CTI team valuable time and effort. Here is a FREE template you can use!Aug 261Aug 261
Published inOSINT TeamEssential Threat Intelligence Collection Sources You Need to KnowIntelligence collection sources are the most important component of a CTI program. This guide will teach you everything you need to know.Jun 24Jun 24
Published inOSINT TeamCTI Analysis Bias: How to Overcome Your Prejudices During AnalysisBias is inherent in all CTi analysts. You must learn to overcome it to produce accurate intelligence assessments. This guide will each you.Jun 17Jun 17
Published inOSINT TeamCTI Report Writing: How to Communicate Threat IntelligenceCTI report writing is an essential cyber skill. This guide will teach you why, the key elements to include, and how to write a great…Jun 101Jun 101
Estimative Language: How to Assign Confidence to Your AssessmentsEstimative language is fundamental for good cyber threat intelligence reporting. This guide will teach you everything you need to know.Jun 3Jun 3
Published inInfoSec Write-upsIntrusion Analysis: How to Fully Investigate Cyber Security AttacksLearn how to perform intrusion analysis in this comprehensive guide, including a four-step process, tips and tricks, and practical…May 273May 273