Using the Tools

A wide variety of tools are available for cyber security hunting, threat intelligence sharing, penetration testing, compromise assessments, darknet research and other tools of the trade.  And, importantly, there are multiple vendors developing very robust and highly functional threat intelligence platforms for aggregating indicators of compromise (IOCs) or more accurately known as cyber observables (COs) and performing data enrichments.

This toolkit provides links and summaries of some of the most popular tools currently in use by cyber threat analysts.

%d bloggers like this: