Honing the Art of Cyber Intelligence
Intelligence activities for defensive purposes have a long standing history in the military and geopolitical context. With time, the ways and means of collection, transmission, and anal . . .
Cyber Threat Intelligence•
Indicators of Behavior: The New Powerful Approach to Detect Advanced Threats
“Know your enemy and know yourself and you can fight a hundred battles without disast ...
CFTR ∙ CTIX ∙ Indicators of Compromise (IoCs) ∙ ATT&CK ∙
APT10: A Chinese Hacking Group Targeting Managed Service Providers Through Spear Phishing
Threat Actor ProfileOrigin: China, 2009Aliases: Cloud Hopper, Red Apollo, CNVX, Stone ...
PlugX ∙ Cloud Hopper ∙ APT10 ∙ Mimikatz ∙
List of Data Breaches, Malware, Vulnerabilities, Scams, and Issued Patches in June, 2019
The month of June witnessed a flurry of new malware, newly discovered vulnerabilities ...
GoldBrute botnet ∙ Malboard attack ∙ Sodinokibi Ransomware ∙ Fishwrap campaign ∙
Why Research and Education Sector Needs to Scale Up its Information Sharing Activities?
Over 50 million students currently attend elementary and secondary school education i ...
Education ∙ Cyware Threat Intelligence eXchange ∙ Threat Intelligence ∙ research ∙
How CTIX Overcomes the Barriers of Intel Sharing?
The modern global economies are increasingly reliant on a digital and connected infra ...
Cyware Threat Intelligence eXchange ∙ CTIX ∙ Intel Sharing ∙ hub and spoke ∙
Carbanak: Insights Into the Billion Dollar Bank Security Threat
Threat Actor ProfileOrigin: 2014.Aliases: Anunak, Carbon SpiderKey Target Sectors: Ma ...
Carbanak Group ∙ Carbon Spider ∙ Anunak ∙ ATMitch ∙
Join Thousands of Other Cyware Followers!