Further reading
Refer to the following for more details on the topics covered in this chapter:
- Operationalizing Threat Intelligence: https://www.packtpub.com/product/operationalizing-threat-intelligence/9781801814683
- What Is Threat Intelligence? Definition and Examples: https://www.recordedfuture.com/threat-intelligence-definition/Threats/Vulnerabilities: https://www.sans.org/reading-room/whitepapers/threats/paper/38790
- Yara GitHub repository: https://github.com/VirusTotal/yara
- Suricata: https://suricata-ids.org/
- The Zeek Network Security Monitor: https://www.zeek.org/
- Snort: https://www.snort.org/