Summary
In this chapter, we extensively covered the meaning and significance of threat intelligence in SOCs. We have also delved into the details of how to use various platforms such as VirusTotal, IBM X-Force, AbuseIPDB, and Google to investigate various cyber threat artifacts. To summarize, the following table highlights the preferred platforms to use to investigate different types of threat artifacts:
Artifact type |
VirusTotal |
X-Force |
AbuseIPDB |
|
Web domain |
✔ |
✔ |
✔ |
|
Outbound IP |
✔ |
✔ |
||
File hash |
✔ |
✔ |
... |