Overview
Books
BOOK: Cyber Mercenaries: The State, Hackers, and Power
Cyber Mercenaries explores the secretive relationships between states and hackers.
BOOK: Russian Cyber Operations: Coding the Boundaries of Conflict
Russia has deployed cyber operations to interfere in foreign elections, launch disinformation campaigns, and cripple neighboring...
BOOK: Dark Territory: The Secret History of Cyber War
In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the...
Courses
COURSE: SEC460: Enterprise and Cloud | Threat and Vulnerability Assessment
SEC460 will help you build your technical vulnerability assessment skills and techniques using time-tested, practical approaches to ensure true value...
COURSE: Introduction to Threat Intelligence and Attribution
This course is a fast-paced introduction to threat intelligence and attribution. It is designed to provide insight into attribution methodology...
Documents
REPORT: Homeland Threat Assessment
Open Source: Publicly available data from overt sources - Distinct from open-source software - But all software discussed today is FLOSS.
Definitions
DEFINITION: Insiders
Some threat actors can go as far as infiltrating your...
DEFINITION: Hacktivists
Hacktivists focus on bringing awareness. For example, almost all the information...
DEFINITION: Government-Sponsored / State-Sponsored Actors
These threat actors are funded, directed, or sponsored by nations....
Podcasts
MalwareTech Podcast
Malware Analysis, Exploitation, and Reverse Engineering.
The Threat Geek Podcast
The Threat Geek Podcast is a podcast produced by Fidelis Cybersecurity.
Recorded Future
Recorded Future takes you inside the world of cyber threat intelligence.
Quotes
“Every network is always under attack. It’s important to design these systems to prevent attacks…”
Timo Elliott - VP, Global Innovation Evangelist for SAP
“The effect on public infrastructure could be a power outage, or it could be something…”
Daniel Cohen Sason - SW Manager - IoT Cyber Security at Check Point Software Technologies, Ltd.
“I think today anything that is connected is a target…”
Tim Herbert - Executive Vice President, Research & Market Intelligence at CompTIA
Tools
TOOL: Threat-actor-intelligence-server
A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the known threat actors.
TOOL: Exabeam Threat Hunter
The Threat Hunter point-and-click interface simplifies the process of creating complex search queries.
TOOL: Pyioc
Pyioc is a set of tools to handle IOC files (openioc.org).