Cyber Threat Intelligence
Creation and Discovery
Validation and Sharing
Expiration and Retirement
IP Addresses
Domain Names
File Hashes
URLs
Email Artifacts
Registry Keys
File Paths
SSL Certificates
Storage and Retrieval
Automation in Handling
Unusual Lateral Movement
Privilege Escalation Attempts
Suspicious Process Creation
TTP Definitions
Threat Actor TTP Mapping
Proactive Defense Applications
TTP Evolution and Tracking
Organizational Relevance
Threat Scoring and Prioritization
Previous
6. Threat Actors and Attribution
Go to top
Next
8. Intelligence Sharing and Platforms