Skip to content

Threat Intelligence

  • Alerts
  • Downloads
  • Links
  • IOC Feeds
Lengths hackers go to when hiding their exploits
Threat Intelligence Vulnerability WordPress

Lengths hackers go to when hiding their exploits

threatinfoOctober 26, 2023October 28, 2023

Long gone is the time when if your website was compromised you’d be eaisly able to spot a file out…

Securing your WordPress site: The essentials
WordPress

Securing your WordPress site: The essentials

threatinfoOctober 14, 2023October 14, 2023

WordPress is very user friendly and easy to learn content management system (CMS) for creating websites.  However the ease of…

Credential Stealer Malware Trends 2023
Malware Threat Intelligence

Credential Stealer Malware Trends 2023

threatinfoSeptember 25, 2023September 26, 2023

The usual credential stealing malware have consistently booked the top 4 spots each quarter of 2023, albeit jostling amongst themselves…

Website Search Result Poisoning
Vulnerability

Website Search Result Poisoning

threatinfoJune 11, 2023September 24, 2023

Its not hard to find search pages from websites with compromises. Its as simple as googling it. Actors are actively…

misp2sentinel: Invalid isoformat string
Threat Intelligence

misp2sentinel: Invalid isoformat string

threatinfoMay 21, 2022September 24, 2023

I’m having issues with the misp2sentinel script from cudeso which sends IOCs from the MISP API to sentinel via the…

Logstash – Sending Windows Event Logs
log siem

Logstash – Sending Windows Event Logs

threatinfoOctober 8, 2021September 24, 2023

Download Winlogbeat – Download here (64-bit) Step 1: Download and extract winlogbeat.zip to c:\program files\  (Should look like the image below) Step…

Recommended Windows Audit Policy Settings
log

Recommended Windows Audit Policy Settings

threatinfoSeptember 18, 2021October 28, 2023

This post includes recommend Windows audit policy settings.  No two environments are the same so after running for a week…

Vulnerability Management with Wazuh
Vulnerability

Vulnerability Management with Wazuh

threatinfoJanuary 18, 2020September 21, 2023

One of the great features in Wazuh is the vulnerabilities module.  Both comparing installed programs against NISTs vulnerability database as…

Posts navigation

Newer posts

Copyright © 2025 Threat Intelligence | Ace News by Ascendoor | Powered by WordPress.