• Home
  • Blog
  • AlphaHunt Intelligence
  • Privacy
  • TOS
CSIRTGadgets

The Good and the Bad of Threat Prediction Interfaces

The Good and the Bad of Threat Prediction Interfaces

When you bet on a game, do you check the line? or go with your instincts..? Do you find yourself pouring over endless research to make the right pick? Do you know something the bookies don’t?

5 Reasons You Should Pay For Your Free SOC Tools

5 Reasons You Should Pay For Your Free SOC Tools

You keep paying for that shinny #CISSP, does it actually make you any money?

Release Testing Threat Intel Platforms with Vagrant and Docker

Release Testing Threat Intel Platforms with Vagrant and Docker

How do you release a new Threat Intel platform in minutes, not months?

How to build smarter IOCs using Python3

How to build smarter IOCs using Python3

What could you build, if the #IOC was the #Platform ?

Hunting for malicious connections using Python and TensorFlow

Hunting for malicious connections using Python and TensorFlow

This takes #IDS and #Netflow anomaly detection to a whole new level…

Prototyping CIFv4 - Streaming YOUR Threat Intel out of the Box

Prototyping CIFv4 - Streaming YOUR Threat Intel out of the Box

Wouldn't it be cool, if you could stream #ThreatIntel YOU OWN into other things YOU OWN?

Prototyping CIFv4 - Developing a Threat Intel View using Graphs

Prototyping CIFv4 - Developing a Threat Intel View using Graphs

You’ve managed to collect all that threat intel.. here’s the easiest way to graph it..

Did you learn something new?
 

Categories

cif csirtg marketing rant research smrt tools
Newer Older
  • Contact
  • AlphaHunt Intelligence
© 2025 CSIRT Gadgets, LLC
All rights reserved