heart Posts from the community...
Story
@rishika shared a post, 1 year, 7 months ago
Cyber Threat Researcher, CloudSEK

Cyber Threat Intelligence data types explained with examples

Tactical Threat IntelligenceBased on the analysis of the incident, the researcher here can try to identify the TTPs used by the threat actor group. Evidence indicates that the initial way to get access into the private network of the company was found to be compromised VPN credentials. Further, depl..

Cyber Threat Intelligence data types explained with examples