Threat Content: Building a Better Mousetrap

What is “Threat Content”?

Where Does “Threat Content” Come From?

What are These “Problems”?

Meme: “There Must Be a Better Way!”

So, What’s the Solution?

The Anatomy of a Threat Package

Query Design

Use Cases

Contextualization

Deployment Documentation

Runbooks

Remediation

Emulation & Validation

Conclusion

--

--

--

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Our Partnership with Litentry

SUPER-SPAM TRYHACKME.COM

Threat Hunting Hypothesis Examples: Five Hunts to Start Out

CRODO.IO Roadmap. First quarter of 2022.

Follow-up interview question on security

{UPDATE} Flippy Hack Free Resources Generator

How do we define, value and better protect our online privacy?

Telegram is Not Better Than WhatsApp

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Cyborg Security

Cyborg Security

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

More from Medium

Profiling and Cyber Threat Intelligence — 3

Critical CVEs: Why Chasing Squirrels is Driving the Whole Industry Nuts

The Basics of Threat Modeling (Part I)

Cyber Kill Chain in Cyber Threat Intelligence