PinnedMastering Cyber Threat Intelligence with ObsidianUtilize Obsidian to transform your CTI dataset and uncover unprecedented connectionsMar 162Mar 162
PinnedThreat Intelligence with AI: The Power of Gemini, Drive and Inoreader IntegrationLeveraging Gemini with a custom dataset for advanced threat analysis and correlationDec 18, 20236Dec 18, 20236
Cyber criminals exploit Formcrafts to craft phishing pagesOver the past seven years, cybercriminals have used the Formcrafts online service to craft phishing pages with the intent of stealing…Feb 8Feb 8
Attribution in Cyber Threat Intelligence: Techniques and ChallengesUnderstanding the importance and methods of the cyber attribution from a strategic point of viewJan 18, 2023Jan 18, 2023
Hunting Cobalt Strike ServersA comprehensive view on the techniques used to fingerprint Cobalt Strike’s C2sMay 12, 20221May 12, 20221
The evolution of ShadowPad infrastructurePivoting the ShadowPad C2s SSL Certificate to track the malware’s infrastructureMar 25, 2022Mar 25, 2022
2021 Dark Web Financial Cyber ThreatsAn overview of the most commonly advertised information related to financial institutions on the Dark Web in 2021Feb 2, 2022Feb 2, 2022
Are the hackers all Russian?Results of a 1 year espionage operation in the Top-tier Russian underground communitiesApr 16, 2021Apr 16, 2021
Cyber Intelligence: HUMINT OperationsHow to engage Threat Actors during undercover operations in the cyber-crime battlegroundJan 25, 20211Jan 25, 20211
Banks’ Cyber Intelligence AssessmentTop 30 questions to understand the maturity of your Cyber Intelligence programJun 30, 20201Jun 30, 20201