130 Threat Intelligence
130 Threat Intelligence
130 Threat Intelligence
Professional
Threat Intelligence
S e c t i o n 0 1 | M o d u l e 0 3
© Caendra Inc. 2020
All Rights Reserved
Table of Contents
Introduction
Now, we’ll go deeper into the first type of hunter, the one
that relies on threat intelligence.
“Threat Intelligence is data on threats.”
THPv2: Section 01, Module 03 - Caendra Inc. © 2020 | p.4
3.1 Introduction
Threat Intelligence
Reports and Research
There is an increase of
attacks on organizations that
had previously experienced a
security incident by the same
or similarly motivated attack
group.
You can visit the MISP Project for detailed information and
guidelines here.
Indicators of
Compromise
You can read more about Yara and download the tool here.
M-Trends 2020
https://www.fireeye.com/current-threats/annual-threat-report/mtrends.html
Exploits in the Wild for Citrix ADC and Citrix Gateway Directory
Traversal Vulnerability CVE-2019-19781
https://unit42.paloaltonetworks.com/exploits-in-the-wild-for-citrix-adc-and-citrix-gateway-
directory-traversal-vulnerability-cve-2019-19781/
THPv2: Section 01, Module 03 - Caendra Inc. © 2020 | p.54
References
Palo Alto Network’s Unit42
https://unit42.paloaltonetworks.com/
CVE-2019-19781
https://cve.MITRE.org/cgi-bin/cvename.cgi?name=CVE-2019-19781
CISA
https://www.us-cert.gov/
ThreatConnect
https://www.threatconnect.com/
MISP
http://www.misp-project.org/
Redline
https://www.fireeye.com/services/freeware/redline.html
YARA
https://virustotal.github.io/yara/
Note that all videos are only available in Full or Elite Editions of the course.
To upgrade, click LINK.
*Labs are only available in Full or Elite Editions of the course. To ACCESS your labs, go to the course
in your members area and click the labs drop-down in the appropriate module line. To UPGRADE to
gain access, click LINK.
THPv2: Section 01, Module 03 - Caendra Inc. © 2020 | p.59