Published inInfoSec Write-upsUnmasking the Hackers: A Complete Guide to Threat ActorsDiscover how to identify threat actors, their motivation, intent, and capability so you can prioritize your defenses effectively.5d ago5d ago
Published inInfoSec Write-upsThe F3EAD Intelligence Loop Explained: A Complete GuideLearn how to use the F3EAD intelligence loop to add structure to your CTI work and generate actionable intelligence in this guide.Mar 17Mar 17
Published inOSINT TeamTop 5 Challenges of Building a CTI Team (+ How to Overcome)Discover the top 5 challenges of building a CTI team and how you can overcome them, from talent acquisition to operational integration.Mar 10Mar 10
Published inOSINT TeamThe History of Cyber Threat Intelligence: Quick Fire GuideDiscover the history of cyber threat intelligence, from the origins of intelligence to the threats CTI must combat today in this guide.Feb 24Feb 24
Published inOSINT TeamThe CTI Team: Roles and Responsibilities You NeedDiscover the key roles and responsibilities required to build a successful cyber threat intelligence team.Feb 10Feb 10
Published inOSINT TeamSTIX/TAXII: A Full Guide to Standardized Threat Intelligence SharingLearn how to turn your threat reports into structured cyber threat intelligence using STIX/TAXII for efficient analysis and sharing.Jan 31Jan 31
New Free Training Courses and Threat Hunting Packages!Two new initiatives released at Kraven Security! New free training courses drop and daily threat hunting packages based on OSINT reports.Jan 242Jan 242
Published inOSINT TeamWeb Scraping Cyber Threat Intelligence Using Octoparse: Full GuideLearn how to create your own custom web scraping tool to gather cyber threat intelligence using the no-code platform Octoparse.Dec 17, 20242Dec 17, 20242
Published inInfoSec Write-upsC2 Hunting: How to Find C2 Servers with ShodanC2 hunting empowers you to track down adversary C2 servers and stay a step ahead bad guys. This guide teaches you how to do it using…Nov 29, 2024Nov 29, 2024
Published inInfoSec Write-upsThe ATT&CK Navigator: A Powerful Tool for Visualizing Cyber AttacksUnlock the power of the ATT&CK Navigator and learn to visualize and map attack techniques through a user-friendly interface.Nov 15, 20242Nov 15, 20242