6 days agoMember-onlyDiscover the Ultimate Cyber Security Notetaking App: PolarityIn this digital age of online work, we are bombarded with information from work, school, and daily life. We are in the era of knowledge work, where people gather, process, and distribute information as a job. …Notetaking10 min readNotetaking10 min read
Published inInfoSec Write-ups·Nov 20Member-onlyPython Threat Hunting Tools: Part 12 — MISP and CrowdStrike Falcon IntegrationWelcome back to this series on building threat hunting tools. In this series, I will be showcasing a variety of threat hunting tools that you can use to hunt for threats, automate tedious processes, and extend to create your own toolkit! Most of these tools will be simple, focusing on…Threat Hunting12 min readThreat Hunting12 min read
Published inInfoSec Write-ups·Nov 13Member-onlyThreat Intelligence with MISP Part 7 — Exporting IOCsWelcome back to this series on using MISP for threat intelligence! MISP (Malware Information Sharing Platform and Threat Sharing) is an open-source threat intelligence platform that allows you to share, collate, analyze, and distribute threat intelligence. It is used across industries and governments worldwide to share and analyze information about…Threat Intelligence11 min readThreat Intelligence11 min read
Published inInfoSec Write-ups·Nov 6Member-onlyPython Threat Hunting Tools: Part 11 — A Jupyter Notebook for MISPWelcome back to this series on building threat hunting tools. In this series, I will be showcasing a variety of threat hunting tools that you can use to hunt for threats, automate tedious processes, and extend to create your own toolkit! Most of these tools will be simple, focusing on…Threat Intelligence16 min readThreat Intelligence16 min read
Published inInfoSec Write-ups·Nov 1Member-onlyThreat Intelligence with MISP Part 6 — Using the APIWelcome back to this series on using MISP for threat intelligence! MISP (Malware Information Sharing Platform and Threat Sharing) is an open-source threat intelligence platform that allows you to share, collate, analyze, and distribute threat intelligence. It is used across industries and governments worldwide to share and analyze information about…Threat Intelligence11 min readThreat Intelligence11 min read
Published inInfoSec Write-ups·Oct 23Member-onlyCreating Your Own CTI Aggregator for Free: A Complete GuideCyber threat intelligence (CTI) involves gathering, analyzing, and understanding information about cyber security threats. To do this effectively, you need to use a CTI aggregator to harness the power of automation and strife to achieve the single pane of glass principle of cyber security architecture. This article will teach you…Threat Intelligence9 min readThreat Intelligence9 min read
Published inInfoSec Write-ups·Oct 16Member-onlyThreat Intelligence with MISP: Part 5 — Searching and FilteringWelcome back to this series on using MISP for threat intelligence! MISP (Malware Information Sharing Platform and Threat Sharing) is an open-source threat intelligence platform that allows you to share, collate, analyze, and distribute threat intelligence. It is used across industries and governments worldwide to share and analyze information about…Cybersecurity7 min readCybersecurity7 min read
Published inInfoSec Write-ups·Oct 9Member-onlyThreat Intelligence with MISP: Part 4 — Using FeedsWelcome back to this series on using MISP for threat intelligence! MISP (Malware Information Sharing Platform and Threat Sharing) is an open-source threat intelligence platform that allows you to share, collate, analyze, and distribute threat intelligence. It is used across industries and governments worldwide to share and analyze information about…Threat Intelligence11 min readThreat Intelligence11 min read
Published inInfoSec Write-ups·Oct 2Member-onlyThreat Intelligence with MISP: Part 3 — Creating EventsWelcome back to this series on using MISP for threat intelligence! MISP (Malware Information Sharing Platform and Threat Sharing) is an open-source threat intelligence platform that allows you to share, collate, analyze, and distribute threat intelligence. It is used across industries and governments worldwide to share and analyze information about…Threat Intelligence13 min readThreat Intelligence13 min read
Published inOSINT TEAM·Sep 25Member-onlyVisual Threat Intelligence: A Masterpiece of Infographics and StorytellingGood books on cyber threat intelligence are rare. Good books that craft visual illustrations to distill complex topics are even rarer. Visual Threat Intelligence by Thomas Roccia does both incredibly well. Visual Threat Intelligence: An Illustrated Guide for Threat Researchers is an introductory book to the murky world of cyber…Threat Intelligence7 min readThreat Intelligence7 min read