Sleigh Bells and Security Alerts: A Holiday Threat Forecast for Retail

Estimated difficulty: 💜💜🤍🤍🤍 The Most Wonderful (and Risky) Time of the Year For most retailers, the holiday period represents the peak of the business calendar – a time when transactions soar, new promotions launch daily, and digital infrastructure runs hot. Unfortunately, threat actors also know this and as retail teams focus on customer experience and …

Pivot, Pivot! Using Open-Source Data to Support Shared Intelligence

Estimated difficulty: 💜🤍🤍🤍🤍 Introduction: The Art of the Pivot In threat intelligence, the difference between a collection of indicators and a comprehensive threat picture often comes down to one skill: pivoting. Pivoting is the process of following digital breadcrumbs – domains to IP addresses, hashes to infrastructure, alias to forum post, following the breadcrumbs to …

No Pain, No Gain! Introducing the Pyramid of Pain

Estimated difficulty: 💜💜🤍🤍🤍 A nice quick read this month as we talk about the Cyber Threat Intelligence model the Pyramid of Pain. A long, long, time ago (2013) in a land far, far, away (the United States), David J. Bianco developed the Pyramid of Pain as a conceptual model to visually describe the challenges and …

Under ATT&CK: An introduction to MITRE ATT&CK

Estimated difficulty: 💜💜🤍🤍🤍 Welcome to another blog focusing on my journey into Threat Intelligence, this time introducing the MITRE ATT&CK framework and the concept of Tactic, Techniques and Procedures (TTPs). What are TTPs? Tactics, Techniques and Procedures are used to identify the methods or patterns of activity that are used by a threat actor or …

It’s the (Threat Intelligence) Circle of Life

Estimated difficulty: 💜🤍🤍🤍🤍 As some of you may now know, I’ve recently switched to the (potentially dark?) side of Cyber Threat Intelligence (CTI). Don’t worry, I’ll still be doing car hax – but also have a new found love for all things threat intelligence and open-source (OSINT)! As I start this new chapter of my …