Added InfoStealers.com to Threat Intelligence Seminal Research

Added InfoStealers.com to Threat Intelligence Seminal Research
Этот коммит содержится в:
hudsonrock-partnerships 2024-08-24 21:00:05 +03:00 коммит произвёл GitHub
родитель d5931d67b3
Коммит 281b687a8d
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194

Просмотреть файл

@ -64,6 +64,7 @@ A collection of essential resources related to cyber threat intelligence theory.
| [Google Project Zero](https://twitter.com/ProjectZeroBugs) | GP0 has compiled a spreadsheet of 0day vulnerabilities leveraged in the wild by threat actors before the vendors were aware of them | [0days "In the Wild"](https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/view)|
| [Katie Nickels](https://twitter.com/likethecoins)| Analysts have compiled a list of court documents issued by the Department of Justice (DOJ) specifically regarding various threat actor charges and indictments, from APT group members to ransomware operators | [Legal Documents of Interest to CTI Analysts](https://docs.google.com/spreadsheets/d/12iZfDkc-DtVNXV5ZoOiKKZuNGcsb3yQ0V3DNBQIalSo/htmlview#gid=1677585875) |
| [Intel 471](https://intel471.com) | The CU-GIRH is a baseline tool to assist security professionals and teams in organizing, prioritizing, and producing cyber underground intelligence based on General Intelligence Requirements (GIRs) — a compilation of frequently asked intelligence requirements applicable to the cybercrime underground such as: forums, marketplaces, products, services, and threat actors. Access to the GIR Handbook includes an intelligence planning workbook (templates, samples) | [Cybercrime Underground General Intelligence Requirements Handbook (CU-GIRH)](https://intel471.com/resources/cu-girh-download-request) |
| [InfoStealers by Hudson Rock](https://www.infostealers.com/) | The all-around Infostealers hub with reports and recent news | [InfoStealers.com](https://www.infostealers.com)
| [Scott Small](https://twitter.com/IntelScott) | The Ultimate Guide To Cyber Threat Profiling | [Cyber_Threat_Profiling_Ebook.pdf](https://github.com/curated-intel/CTI-fundamentals/blob/main/Archive/Cyber_Threat_Profiling_Ebook.pdf) |
### `Running Enterprise Threat Intelligence Programs`