In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …
Active usage of threat intelligence information supports effective prevention, mitigation and defence against cyberattacks by threat actors ranging from individual amateurs to state …
Incident response “playbooks” are structured sets of operational procedures organizations use to instruct humans or machines on performing countermeasures against cybersecurity …
SRB Mohd Kassim, S Li, B Arief - Digital Threats: Research and Practice, 2023 - dl.acm.org
National Computer Security Incident Response Teams (CSIRTs) have been established worldwide to coordinate responses to computer security incidents at the national level. While …
The latency reduction between the discovery of vulnerabilities, the build-up, and the dissemination of cyberattacks has put significant pressure on cybersecurity professionals …
D Pöhn, W Hommel - Security and Communication Networks, 2023 - Wiley Online Library
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐ from‐home possibilities permits flexibility for organizations and persons. At the same time, it …
This article describes three collective intelligence dynamics observed on ThreatFox, a free platform operated by abuse. ch that collects and shares indicators of compromise. These …
IY Alzahrani, S Lee, K Kim - Electronics, 2024 - mdpi.com
Cybercrime threat intelligence enables proactive measures against threat actors and informed, data-driven security decisions. This study proposes a practical implementation of …
R Machado da Silva, JJ Costa Gondim… - … on Computer Science …, 2022 - Springer
In cyberspace, boundaries are constantly being crossed in the name of progress and convenience, and invariably result in new vulnerabilities and potential attacks. Traditional …