cognitive cybersecurity intelligence

News and Analysis

Search

5 Techniques for Collecting Cyber Threat Intelligence

To guard against cyber threats, knowledge about ongoing or new threats is essential. Analysts can collect critical cyber threat intelligence using techniques including pivoting on С2 IP addresses to identify malware, using URLs to reveal a threat actor’s infrastructure, identifying threats by specific MITRE TTPs, collecting samples with YARA rules, and discovering malware through command line artifacts and process names. The Threat Intelligence Lookup tool from ANY.RUN can facilitate these methods.

Source: thehackernews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts