Threat Intelligence
By now, you’ve been through a number of different phases in your journey toward a better security posture. In the last chapter, you learned about the importance of a good detection system, and now it’s time to move to the next level. The use of threat intelligence to better know the adversary and gain insights into the current threats is a valuable tool for the Blue Team. Although threat intelligence is a domain that has been gaining traction over the last few years, the use of intelligence to learn how the enemy is operating is an old concept. Bringing intelligence to the field of cybersecurity was a natural transition, mainly because, now, the threat landscape is so broad and the adversaries vary widely, from state-sponsored actors to cybercriminals extorting money from their victims.
In this chapter, we are going to cover the following topics:
- Introduction to threat intelligence
- Open-source tools for threat intelligence ...