HackDig : Dig high-quality web security articles for hacker

Follow The Money: Dissecting the Operations of the Cyber Crime Group FIN6

Cybercrime operations can be intricate and elaborate, with careful planning needed to navigate the various obstacles separating an attacker from a payout. Yet reports on these operations are often fragmentary, as the full scope of attacker activity typically occurs beyond the view of any one group of investigators. FireEye Threat Intelligence and iSIGHT Part
Publish At:2016-04-21 10:30 | Read:3652 | Comments:0 | Tags:iSIGHT Partners cyber crime cyber threat intelligence FIN6 h

Have You Pivoted Yet? Rapidly Move Between Data and Intelligence for Correlation and Alert Prioritization

This is Cool Stuff… When we launched the second revision of our ThreatScape API early this year, we were extremely excited about the pivot functionality we added as we heard from a number of customers doing security operations and incident response that they needed functionality to rapidly move between data and intelligence for correlation and alert pr
Publish At:2015-10-14 18:40 | Read:3373 | Comments:0 | Tags:iSIGHT Partners APIs for cyber threat intelligence CTI and A


Share high-quality web security related articles with you:)


Tag Cloud