ThreatSTOP security analysts work around the clock to ensure our threat intelligence include the most relevant and critical indicators of compromise (IOCs). Their analysis and research ensures TS block these IOCs and by extension protect customers from the vast spectrum of cyber threats and related infrastructure. We've asked our analysts to share their favorite free analysis tools for every step of the threat analysis journey, as well as tips and analysis use cases on infamous malware variants. You can view all this awesome info in our Open Source Analysis Tools Infographic, or below in our more extensive blog series.Read More
Check IOC is a security research tool that provides rich metadata, passive DNS and aggregated threat intelligence on IPs and domains. Check IOC also shows exclusive threat intelligence data provided by ThreatSTOP on over 24 million known malicious indicators from our database. Using Check IOC, you can search IPs and domains to vet their maliciousness, get more information on suspicious IOCs, or even upload your logs to see if threat actors are communicating with your network.
We are glad to announce that we have just launched a new and upgraded Check IOC tool! Features that were previously reserved for our Premium Portal and API users now have been added to the free version. The new Check IOC also sports an updated interface, smoother UX, and a more generous limit of 25 free lookups a day.Read More
Wondering what our readers were most interested in over the past year? Wonder no more! We've rounded up our most read articles of the year to save you time. Wrapping up the worldwide roller coaster that was 2020, we wish we were feeling a little more nostalgic. Covid-19 came in like a tornado and changed up our daily lives as we knew them. The security industry, accordingly, also had to change mindsets and processes to adjust to a new, distributed-access-focused reality.
The Best, according to you:Read More
The first step in IOC analysis is obtaining the indicators to analyze. Some analysts will opt to stick with one source, and analyze whichever IOCs come their way, while others may search various sources for a specific threat type such as Ransomware, or threat such as Lokibot. Threat exchanges are open and free community platforms for information sharing and collaboration, and are an excellent source for IOCs. Another source for IOC collection which may come off as less intuitive is social media, with Twitter being the best SM platform to find new, relevant IOCs.
In this post, we will describe our Top 5 Free IOC Sources for Analysis.
Welcome To Our New Weekly Series, Free Open Source Analysis Tools.
This Week's Topic: Free Open-Source Analysis Tools, Why Use IOCs?
Throughout this series, we'll be talking about a Security Analyst’s IOC analysis journey. From discovering relevant indicators and performing the analysis, to finding enrichments and new IOCs. We will also share recommendations for free open-source analysis tools and use cases completed by ThreatSTOP's Security and Research Team, showing how to utilize the various platforms and tools. Let's get started.Read More
Recently, there has been a lot of buzz over a flourishing ransomware that goes by the name of Locky, which encrypts a victim's data using a strong RSA-2048+AES-128 encryption and then demands between 0.5-2 bitcoins for the decryption of that data.Read More