Pivot, Pivot! Using Open-Source Data to Support Shared Intelligence

Introduction: The Art of the Pivot In threat intelligence, the difference between a collection of indicators and a coherent threat picture often comes down to one skill: pivoting. Pivoting is the process of following digital breadcrumbs – domains to IP addresses, hashes to infrastructure, alias to forum post, following the Continue Reading