To guard against cyber threats, knowledge about ongoing or new threats is essential. Analysts can collect critical cyber threat intelligence using techniques including pivoting on С2 IP addresses to identify malware, using URLs to reveal a threat actor’s infrastructure, identifying threats by specific MITRE TTPs, collecting samples with YARA rules, and discovering malware through command line artifacts and process names. The Threat Intelligence Lookup tool from ANY.RUN can facilitate these methods.
India emerges top 2, 3 destination for email, malware detections respectively
India is the second biggest target for email threats globally and the third largest for malware detection, behind the US and Japan, according to Trend