Pivot, Pivot! Using Open-Source Data to Support Shared Intelligence
Estimated difficulty: 💜🤍🤍🤍🤍 Introduction: The Art of the Pivot In threat intelligence, the difference between a collection of indicators and a comprehensive threat picture often comes down to one skill: pivoting. Pivoting is the process of following digital breadcrumbs – domains to IP addresses, hashes to infrastructure, alias to forum post, following the breadcrumbs to …
Read more “Pivot, Pivot! Using Open-Source Data to Support Shared Intelligence”