Netskope Community
Web shells are commonly used by threat actors as part of the command and control phase of a cyberattack. These shells can be custom code and used by c read more..
On May 3rd 2023 Google Registry announced the release of eight new top-level domains (TLD). Two of these domains share the same naming conventions as read more..
Requirements Transaction Streaming SKU What is Threat Hunting? Threat hunting is the process of using the scientific method to proactively and iterat read more..
What is attack surface management? Attack surface management (ASM) is the continued discovery, classification, and monitoring of an organization's ex read more..
Online Status |
Status : offline
|
Date Last Visited |
08-22-2023
01:55 PM
|
In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below
Sign In
Re: Threat Intelligence SOPs
As promised, here is part one of the blog on CTIhttps://www.netskope.com/blog/understanding-cyber-threat-intelligence
Re: Threat Intelligence SOPs
I agree at first CTI can seem quite daunting which is why I like to reference processes (the CTI lifecycle) and models (Diamond models) as they make i read more..
Re: Threat Intelligence SOPs
Hello!, When looking to build a CTI program a few useful tips to start off with is understanding the Cyber Threat Intelligence lifecycle to establish read more..