[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
[
privacy
|
malware
|
research
|
vendor
]
Trend Micro Simply Security
Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
5 AI Security Takeaways featuring Forrester
Trend Micro and Japanese Partners Reveal Hidden Connections Among SEO Malware Operations
Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations
SOC Around the Clock: World Tour Survey Findings
AI Pulse: Election Deepfakes, Disasters, Scams & more
Attacker Abuses Victim Resources to Reap Rewards from Titan Network
Understanding the Initial Stages of Web Shell and VPN Threats: An MXDR Analysis
Unmasking Prometei: A Deep Dive Into Our MXDR Findings
MISP Project
MISP 2.4.200 and 2.5.2 released - Post Hack.lu/CTI-Summit release with many new features
MISP ioC retrosearch with misp42 Splunk app.
MISP 2.4.198 released with many bugs fixed, security fixes and improvements.
MISP 2.4.197 released with many bugs fixed, a security fix and improvements.
MISP 2.4.196 released with many bugs fixed and improvements.
SkillAegis
MISP 2.4.195 - hot summer olympic release
Maltego Integration with MISP
Collaborative Threat Intelligence Sharing and Automated Information Exchange - Insights from the JTAN Project Experience
MISP 2.4.194 released with new functionalities and various bugs fixed
Malware-Traffic-Analysis.net
2024-11-14 - Raspberry Robin infection using WebDAV server
2024-10-23 - Redline Stealer infection
2024-10-17 - Two days of server scans and probes and web traffic
X-Force Malware Reports
RokRat Analysis Report (IRIS-15765)
Gh0st RAT Analysis Report (INT00012169)
Chavecloak Analysis Report (INT00011959)
Minodo Backdoor and Nemesis Infostealer Analysis Report (IRIS-15448)
Zeppelin Malware Profile
SSLoad Malware Profile
Tiger RAT Malware Profile
IceNova Analysis Report (IRIS-16666)
Kasseika Malware Profile
AlienReverse Malware Profile
Lenny Zeltser
What to Do With Products Without SSO?
Transform the Defender’s Dilemma into the Defender’s Advantage
Are CISOs of Security Vendors in Your Community?
How to Write Good Incident Response Reports
My Story So Far and Your Own Career Journey
3 Opportunities for Cybersecurity Leaders Who Choose to Stay
Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind
How Security Can Better Support Software Engineering Teams
A Report Template for Incident Response
Security Leaders Can Lower Expenses While Reducing Risk
© 2024 RiskDiscovery | Sponsored by:
Deception Logic