Blog

Doing Threat Intel the Hard Way - Part 4: Operationalizing Threat Intelligence

This is the fourth post in a series on manual IOC management for threat intelligence. See the previous posts:Part 1: Manual IOC Management Part 2: Capturing Threat Intelligence Part 3: Processing Threat IntelligenceOperationalizing Threat IntelligenceAlthough a database of indicators and contextual information is useful, it is not enough. Once a...

Read More

Anomali Weekly Threat Intelligence Briefing - January 16, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provide summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...

Read More

Anomali Weekly Threat Intelligence Briefing - January 9, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provide summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...

Read More

2017 Cyber Security Predictions

2016 has now come to an end and a new set of security predictions are being revealed. The past year has been a whirlwind tour of challenges and changes in the cybersecurity landscape. Targeted threat activity took on a new emphasis by focusing on both disinformation and weaponized, confidential information. Ransomware...

Read More

Anomali Weekly Threat Intelligence Briefing - January 2, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.Trending ThreatsThis section provide summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing...

Read More

Anomali Weekly Threat Intelligence Briefing - December 29, 2016

Trending Threats This section provide summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing and can be used for indicator matching against your logs. Figure 1: IOC Summary Charts. These charts summarize the IOCs attached...

Read More

Doing Threat Intel the Hard Way - Part 3: Processing Threat Intelligence

This is the third post in a series on manual IOC management for threat intelligence. See the previous posts:Part 1: Manual IOC Management Part 2: Capturing Threat IntelligenceProcessing Threat IntelligenceOnce captured, threat intelligence data must be processed. Processing includes several steps,Normalization Deduplication Storage of Indicators Update, Expiration...

Read More

Anomali Weekly Threat Intelligence Briefing - December 19, 2016

Trending ThreatsThis section provide summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing and can be used for indicator matching against your logs.Let It Ride: The Sofacy Group’s DealersChoice...

Read More

PATCH NOW, MAN

Patch Tuesday has again descended upon us, sending security teams scurrying to update systems and protect users from potential exploitation by the seemingly endless tide of cybercriminals looking to profit or siphon data out of your environment. Which goes without saying, if you have not already rolled out these security...

Read More

Anomali Weekly Threat Intelligence Briefing - December 12, 2016

Trending ThreatsThis section provide summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing and can be used for indicator matching against your logs.Floki Bot Strikes (December 7, 2016) Floki Bot is a new malware variant...

Read More
Register for a Free Anomali Account Register now