Chad WarnerOnline Operations Kill Chain in CTIThe Online Operations Kill Chain is meant to be a modern alternative to the Cyber Kill Chain to fit a wider range of cyber operations…Nov 7, 2023Nov 7, 2023
Chad WarnerFree Cyber Threat FeedsCyber threat feeds (or threat data feeds) are regularly-updated sources of data about cyber threats, such as malicious IP addresses…Oct 10, 20231Oct 10, 20231
Chad WarnerCyber Threat Actor Types & MotivesI’m often asked who is behind cyberattacks, and why they attack. It’s not a simple answer, because there’s a wide variety of threat actor…Sep 5, 2023Sep 5, 2023
Chad Warner“Cyber Threat Intelligence” by Martin Lee NotesCyber Threat Intelligence by Martin Lee is an informational cyber threat intelligence primer explaining the fundamentals and providing…Aug 10, 20231Aug 10, 20231
Chad WarnerinOSINT Team“Deep Dive: Exploring the Real-World Value of Open Source Intelligence” NotesDeep Dive: Exploring the Real-World Value of Open Source Intelligence by Rae Baker is a useful guide to a wide variety of OSINT techniques…Jul 25, 2023Jul 25, 2023
Chad WarnerinOSINT TeamIntelligence-Gathering Disciplines (OSINT, IMINT, GEOINT, etc.)If you spend any time in the intelligence community (IC), whether traditional intel (government/military) or cyber intel, you’ll run across…Jun 20, 2023Jun 20, 2023
Chad WarnerClop Ransomware: Who, What, Where, Why, HowThe name Clop (often stylized Cl0p) refers to both Ransomware-as-a-Service (RaaS) and the ransomware and extortion threat group that…Jun 6, 2023Jun 6, 2023
Chad WarnerCensys Search Engine IntroCensys is a search engine for Internet-connected hosts and certificates. It’s similar to Shodan. It’s a useful resource for OSINT and CTI.May 24, 2023May 24, 2023
Chad WarnerPulsedive Cyber Threat Intelligence Platform IntroPulsedive is a cyber threat intelligence platform (TIP) with many free features. It includes millions of IP addresses, URLs, and domains…May 9, 2023May 9, 2023
Chad WarnerMacUpdater Keeps Mac Apps UpdatedKeeping software updated is one of the most important ways to keep systems secure, because updates often include security improvements. On…May 2, 2023May 2, 2023