Skip to content
Navigation menu
Search
Search
Log in
Create account
DEV Community
Close
#
threatintelligence
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Security Orchestration Automation and Response (SOAR)
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
May 31 '23
Security Orchestration Automation and Response (SOAR)
#
soar
#
threatintelligence
#
socanalys
#
infosectrain
Comments
Add Comment
2 min read
CYBER THREAT ANALYSIS OF STATE SPONSORED CYBER OPERATION: 2005-2022
rising_segun
rising_segun
rising_segun
Follow
Mar 27 '23
CYBER THREAT ANALYSIS OF STATE SPONSORED CYBER OPERATION: 2005-2022
#
cybersecurity
#
machinelearning
#
datascience
#
threatintelligence
Comments
1
 comment
6 min read
5 Threat Detection and Response Methods Baffling Cyber Attackers
yayabobi
yayabobi
yayabobi
Follow
Mar 8 '23
5 Threat Detection and Response Methods Baffling Cyber Attackers
#
cybersecurity
#
threatintelligence
#
behavioranalytics
#
devops
Comments
Add Comment
6 min read
Have you integrated CrowdSec into your XSOAR platform yet?🔓
Oli SPT
Oli SPT
Oli SPT
Follow
Jan 31 '23
Have you integrated CrowdSec into your XSOAR platform yet?🔓
#
threatintelligence
#
infosec
#
opensource
#
security
Comments
Add Comment
1 min read
STIX & TAXII - Complete Knowledge
Dimitar
Dimitar
Dimitar
Follow
Mar 28 '22
STIX & TAXII - Complete Knowledge
#
stix
#
taxii
#
cybersecurity
#
threatintelligence
4
 reactions
Comments
Add Comment
4 min read
Red Team Chronicles Episode 5 — Alert to Avoid Serious CompromiseRe
Carole Winqwist
Carole Winqwist
Carole Winqwist
Follow
for
GitGuardian
Nov 2 '21
Red Team Chronicles Episode 5 — Alert to Avoid Serious CompromiseRe
#
redteam
#
cybersecurity
#
threatintelligence
#
appsec
Comments
Add Comment
3 min read
Honeypot Data Visualization & Automation
Mat
Mat
Mat
Follow
Mar 5 '21
Honeypot Data Visualization & Automation
#
malware
#
honeypot
#
threatintelligence
#
security
1
 reaction
Comments
Add Comment
8 min read
Honeypot Deployment and Customization
Mat
Mat
Mat
Follow
Nov 24 '20
Honeypot Deployment and Customization
#
malware
#
honeypot
#
threatintelligence
#
security
7
 reactions
Comments
Add Comment
7 min read
What are Honeypots and why do I want them?
Mat
Mat
Mat
Follow
Jun 19 '20
What are Honeypots and why do I want them?
#
malware
#
honeypot
#
threatintelligence
#
security
4
 reactions
Comments
Add Comment
3 min read
Sending your Threat Indicators to Azure Sentinel
Mark Foppen
Mark Foppen
Mark Foppen
Follow
Sep 30 '19
Sending your Threat Indicators to Azure Sentinel
#
mdatp
#
security
#
threatintelligence
#
graphapi
6
 reactions
Comments
Add Comment
5 min read
Using Microsoft Defender ATP Streaming API with Misp
Mark Foppen
Mark Foppen
Mark Foppen
Follow
Jul 24 '19
Using Microsoft Defender ATP Streaming API with Misp
#
threatintelligence
#
microsoftazure
#
security
#
logicapps
5
 reactions
Comments
Add Comment
6 min read
Azure Sentinel: Taking Security To The Next Level
Mark Foppen
Mark Foppen
Mark Foppen
Follow
Jul 10 '19
Azure Sentinel: Taking Security To The Next Level
#
azuresentinel
#
threatintelligence
#
azure
#
security
6
 reactions
Comments
Add Comment
5 min read
How to create own threat intelligence platform with PHP, cURL and API
Uladzislau Murashka
Uladzislau Murashka
Uladzislau Murashka
Follow
Sep 5 '18
How to create own threat intelligence platform with PHP, cURL and API
#
threatintelligence
#
php
#
curl
#
infosec
19
 reactions
Comments
Add Comment
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account