Threat Intelligence
Tracking the Bad Guys
Importance of TI
Part of Security
It is helping DFIR, Blue Teams,...
Scope of TI
APT
Cyber Crime
Botnets
DDoS
Phishing
Cryptominers
Abuse
SSH Bruteforcing
Port Scanning
Ransomware
CSAM (Child Porn) and Human Trafficking
Glossary
Tactics, Techniques and Procedures (TTPs)
Telemetry, broadly any type of data being collected through a specific system
Advanced Persistent Threat
Indicators of Compromise
Command and Control
Last updated