ThreatConnect
Follow
696 Followers
Follow ThreatConnect on their other social channels!
About Us
Founded:
2011
Company Size:
51-200 employees
Company Type:
Private
Location:
Arlington, VA
Website:
ThreatConnect® enables organizations to identify, manage, and block threats with threat intelligence, automation, and orchestration. Providing security teams a platform to unite their people, processes, and technologies behind an intelligence-driven defense, ThreatConnect helps increase visibility ...
Read more
Promoted Content
Smarter = Faster: Security Orchestration with Threat Intelligence
Follow
292
Fancy Bear Pens the Worst Blog Posts Ever
ThreatConnect reviews continuing Fancy Bear activity targeting citizen journalism organization Bellingcat and identifies a new tactic leveraging Blogspot to mask their credential harvesting links.   Our friends over at Bellingcat, which conducts open source investigations and writes extensively on Russia-related issues, recently shared a new tranche of spear-phishing emails they had received. Spoiler alert: they originated from Fancy Bear actors. Using the ThreatConnect platform we inge ...
Follow
470
A Report on Healthcare and Medical Industry Threats
Learn about the threats and how to protect your healthcare organization Summary Medical and health organizations, which include organizations operating in the pharmaceutical sector, face a variety of threats that are inherent to the services they provide and the data they safeguard. Within medical and health verticals the risks associated with compromise are often significantly augmented as patient care and personal information are at stake. This report highlights notable threats to those orga ...
Follow
460
Stranger Threats Giveaway
In anticipation of the release of Stranger Things Season 2, we need your help to find the monster (threat) that has been running amok. This stranger threat (named after a shy snake) has been tied to North Korea and tends to target the aerospace, media, and financial industries. The typical tools and capabilities used by this threat include DDoS botnets, keyloggers, remote access tools (RATs), and wiper malware. Find out how to win >
Follow
183
DNC Association Does Not Compute
Joining the cyber community to conduct independent analysis of the DNC HackRecently, an article purported that the Democratic National Committee (DNC) turned down requests from FBI forensic units to look at its server and instead opted to use ThreatConnect and two other cyber security firms. While we cannot speak to the veracity of the first part of that statement, we can with certainty say that we (ThreatConnect) were not contracted by, nor did we work on behalf of, the DNC.The a ...
Follow
326
Casting a Light on BlackEnergy
A look into BlackEnergy malware and using ThreatConnect to aggregate and memorialize the identified intelligence. As workers prepared to head home on December 23, 2015, an attack against Ukraine's energy sector left 230,000 without electricity (or heat) for six hours. The attackers demonstrated a variety of capabilities, including spearphishing emails and variants of the BlackEnergy 3 malware to gain a foothold into the Information Technology (IT) networks of the electricity companies. The Dec ...
Follow
297
Track to the Future
How to use historical intelligence to get back to the future and defend your organization   We need to talk about something. In the history of the ThreatConnect blog, we've never discussed Back to the Future. It's crazy to think that that's the case as arguably the second-greatest sci-fi trilogy is rife with quotable lines and meme-able scenes that would make for amazing blog fodder. We have to say that we love the Back to the Future trilogy. Despite it essentially being the same mov ...
Follow
370
Enterprise Defense at the Speed of Data
A joint whitepaper by SAP, Deloitte, and ThreatConnectToday’s threats are relentless. Cyberattacks are often multi-year campaigns targeting valuable, sensitive data and have many business implications — brand reputation, lost revenue, and more. In this paper, we discuss how an intelligence-driven security program gives your company or agency a fighting chance to stay ahead of ever-changing threats.Read the white paper
Follow
1585
Mitigate Threats Faster with an Intelligence-Driven Defense
Learn to identify, manage, and block threats faster with intelligence.The ThreatConnect Platform was specifically designed to help you understand adversaries, automate workflows, and mitigate threats faster using threat intelligence. But we know security operations and threat intelligence are not one size fits all. That’s why we have options.View this recorded webinar to learn how our recently announced suite of products can help you mitigate threats faster. We’ll show you:The products: ...
Follow
3309
Building an Intelligent SOC
Follow along with Gartner Analyst Oliver Rochford and ThreatConnect CEO Adam Vincent as they detail how to build an intelligent SOC. Learn why the traditional SOC is failing and what changes are needed to bring intelligence, automation, and adaptability to your security operations.Watch this webinar to learn:Why the traditional SOC is failingThe 5 characteristics of an intelligence-driven SOCHow to understand and plan for your security needsWatch this Webinar Now!Ol ...
Follow
889
Fragmentation: The “Silent Killer” of Your Security Management Program
Fragmentation is the silent killer of your security program. Sounds serious, right? Well, it is. After more than a decade of research, innovation, and investment in the cybersecurity industry, the “Detection Deficit” between attackers and defenders is near an all-time high and trending wider. While many contributory factors exist, extreme fragmentation of enterprise security people, processes, and technologies is surely chief among them. In this paper we’ll take a look at the issues and la ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Why Do You Need a VPN?
Views: 766 / January 21, 2018
How to Evade AV with OWASP-ZSC – Part 1
Views: 1061 / January 20, 2018
Tracking IP info with its Metadata
Views: 1868 / January 19, 2018
UNMASKED: Skygofree, FISA, and Google
Views: 1508 / January 19, 2018
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel