threat intelligence Sharing, Compared Part 2: Where Do We Share? In part 2 of this series, discover where practitioners share during CTI collaboration - from peer to peer trust groups to paid memberships.
threat intelligence Tool Guide: CyberChef 101 Learn how to use the versatile, open source utility CyberChef. This 101 includes an overview, operations, real-world walkthrough, and resources.
threat intelligence Sharing, Compared Part 1: How and Why Do We Connect? In the first of our four-part series, learn why practitioners prioritize human-to-human sharing and its benefits.
threat intelligence Balada Injector Dive into how Balada exploits vulnerabilities within WordPress plugins. This research blog analyzes how Balada injects malicious code and the functionality of the scripts used in the campaign.
threat intelligence CTI Networking Report 2024 "Sharing, Compared: A Study on the Changing Landscape of CTI Networking" is now available online.
threat intelligence PikaBot Rising Dive into the distribution methods and capabilities of Pikabot, a loader that has been growing in prevalence since early 2023.
pulsedive 2023 In Review Here's our 2023 roundup of cyber threat intelligence news: key exploited vulnerabilities, ransomware, and Pulsedive updates over the last year.
threat intelligence Analyzing DarkGate Loaders This blog examines three different loader types used in recent DarkGate infections.
threat intelligence Analyzing Agniane Stealer Agniane is an emerging infostealer identified in August 2023. Dive into how Agniane collects data, evades analysis, and expands operations in this blog.
malware Identifying Mystic Stealer Control Panels Learn how to research and identify control panels for Mystic Stealer, an information stealer that appeared on underground markets in April 2023.
malware Akira Ransomware Akira is an emergent ransomware group that has been active since April 2023, targeting small to medium organizations. Here's what you need to know.
threat intelligence Better Together: The Best Cyber Threat Intelligence Events Our roundup of the best cyber threat intelligence events you won't want to miss.
pulsedive Announcing Pulsedive 6.1: Custom Configuration & Enhanced Research The latest 6.1 release includes exciting upgrades to Pulsedive Community & Enterprise TIP - including custom configuration, expanded threat research, and flexible pivoting and updating.
threat intelligence Op-Ed: How to Make STIX Stickier As someone who has built import/export for STIX/TAXII from scratch, here are a few ways it can be improved.
passwords Threat Researcher Role Q&A Answers to some of the most frequently asked questions about the Threat Researcher role, including what it entails, expectations & requirements, and how we operate.
case study Featured Enriched, real-time phishing management Case Study: BSI's "PhishQueue" service leverages Pulsedive's Enterprise TIP to help clients detect, investigate, and defend against phishing attacks.
pulsedive Maximizing Insights While Streamlining Storage Pulsedive's approach to data storage with "Properties" enables richer insights, powerful querying, and faster onboarding of new enrichment sources.
pulsedive Screenshots for All We are excited to announce that Pulsedive is adding free screenshot capabilities to all of our community users.
pulsedive Announcing: Pulsedive 6 The latest release of Pulsedive's community platform introduces a much-demanded feature and improved functionality for all users.
threat intelligence Featured Tips for TIPs Researching and procuring TIPs can be tough. Here's some words of wisdom collected from real teams who have gone through the POC and implementation process.
pulsedive Announcing: Pulsedive Enterprise We've launched Pulsedive Enterprise, a dedicated threat intelligence platform that doesn't break the bank. Read on for details and FAQs.
pulsedive Updates: Features, Integrations, Mentions A round-up of all recent things Pulsedive. 5.1 release, Microsoft Sentinel and Cisco SecureX integrations, plus mentions in the news.
case study Operationalizing Cyber Threat Intelligence in a Managed SOC Case Study: Ingalls Information Security strategically develops their cyber threat intelligence program with Pulsedive solutions - all while scaling the SOC more than 10x over 2 years
pulsedive Announcing: Pulsedive 5 The latest release of Pulsedive's community platform comes with new and improved functionality for all of our users.
threat intelligence Featured CTI Networking Report "Is Sharing Caring? A report on current cyber threat intelligence networking practices, results, and attitudes" is now available online.